03:34:13 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000440)=[{{}, 0x5, 0x7ff, 0x6}, {{0x0, 0x7530}, 0x1f, 0xcb3, 0x5}, {{}, 0x16, 0x7, 0x6}, {{r1, r2/1000+10000}, 0x10, 0x4, 0x5}, {{r3, r4/1000+10000}, 0x17, 0x8ed, 0x1}, {{}, 0x16, 0xfffd, 0x35}, {{r5, r6/1000+10000}, 0x11, 0xfff, 0xf1}, {{r7, r8/1000+10000}, 0xc3672f7c650b8c98, 0xf1a}, {{0x77359400}, 0x8, 0x8, 0x7d0}], 0xd8) r9 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r9, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r11, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r10, 0x0, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x8, r11}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r13 = openat$cgroup_ro(r12, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r13, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 548.596865] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:13 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) prctl$PR_GET_SECCOMP(0x15) 03:34:13 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x3, 0x0, &(0x7f0000000100)={0x1f, 0x0, 0x0, 0x0, 0xfffe}, 0xffffffffffffff17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) close(r0) 03:34:13 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) ioctl$KVM_NMI(r0, 0xae9a) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 548.637705] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffe}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f00000000c0)=""/8) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:13 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) close(r0) 03:34:13 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r0, &(0x7f0000000040)={r4, 0xffffffffffffffff, 0xffffffff}) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) r10 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r10, 0x0, 0xffffffffffffffff, 0x0) sched_getattr(r10, &(0x7f00000004c0)={0x30}, 0x30, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r11, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) dup2(r8, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r13 = openat$cgroup_ro(r12, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r14 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40400, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r14, 0x5385, &(0x7f0000000400)={0xa1, ""/161}) preadv(r13, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:13 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) close(r0) [ 548.857202] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 548.868102] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:13 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {0x6}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) [ 548.908226] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 548.917464] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 548.950160] protocol 88fb is buggy, dev hsr_slave_0 [ 548.955370] protocol 88fb is buggy, dev hsr_slave_1 03:34:14 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x12}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:14 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0xd) 03:34:14 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {0x3}, 0x0, 0x0, &(0x7f0000000000)={0x5, 0x31, 0x5, 0xfffc}, 0x17a, 0x0, 0x2000, 0x0, 0xfffffffd, 0x0, 0x0}) write$rfkill(0xffffffffffffffff, &(0x7f0000000040)={0xffff64ca, 0x0, 0x3, 0x0, 0x1}, 0x8) close(r0) 03:34:14 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev\x00\x00\x00\x00\x00\x00\x00\x06/N\tD\v\xf0R\xafB', 0x9, 0x422020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) 03:34:14 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_TIMERSLACK(0x1d, 0x5d32) close(r0) 03:34:14 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {0x1}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) [ 549.322559] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 549.337651] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:14 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = socket$key(0xf, 0x3, 0x2) writev(r4, &(0x7f0000000140), 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f0000000040)='net/l2cap\x00') r8 = fcntl$dupfd(r3, 0x0, r5) getpeername$netlink(r7, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:14 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000140)={0x3, 0x1}) r1 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x400800) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x56, 0x1, 0x26, "a350d501143bef50d55fe5333c60fbfa", "489dd9ae813115471fc72ba6a6fa93644f77b69f6c5161e67e8b647ab726a7cee8e26513f32216decf430b5af290b77593bc9795b6b951ffeabee8af847dd4593d"}, 0x56, 0x1) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x100, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) getsockname$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) 03:34:14 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100)={0x24}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) [ 549.612439] vhci_hcd: default hub control req: 2400 v0000 i0000 l0 [ 549.625132] vhci_hcd: default hub control req: 2400 v0000 i0000 l0 03:34:14 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000000)={0xbb98, 0xffffffff, 0x7f, 0x186}) 03:34:14 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x41) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000040)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000080)='./bus\x00', &(0x7f0000000200)=[&(0x7f00000001c0)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00'], &(0x7f0000000880)=[&(0x7f0000000400)=']md5summime_typeppp1+#ppp0vboxnet0proc\x00', &(0x7f0000000440)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00', &(0x7f0000000480)='wlan0nodev([cgroup:+\x00', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`', &(0x7f0000000640)='\x00', &(0x7f0000000680)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`', &(0x7f0000000800)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00', &(0x7f0000000840)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00']) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) fsetxattr$security_smack_entry(r5, &(0x7f0000000980)='security.SMACK64\x00', &(0x7f00000009c0)='\x00', 0x1, 0x0) r6 = accept4(r4, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) r8 = openat(r7, &(0x7f00000008c0)='./bus\x00', 0x0, 0x31) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, r6) write$cgroup_type(r9, &(0x7f0000000940)='threaded\x00', 0x9) write$UHID_GET_REPORT_REPLY(r8, &(0x7f0000000900)={0xa, 0xa, 0xff, 0x2f}, 0xa) r10 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r10, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 549.744439] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:14 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x9) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) write$char_usb(r5, &(0x7f0000000080)="fb6064aafc2ae0ced48e69852e17bc4644008ac35978b84a07d97f360907d40a43fc52c7610490344f5b7b2cdb7c52ad0e711fb03d06d409a4a36439546407eb1e7948d197", 0x45) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:15 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$VIDIOC_S_AUDOUT(r5, 0x40345632, &(0x7f00000000c0)={0x5, "03004c376f3b906abdddc2c79c97bc80bc2b1b475b523596e21199be6f9320a2", 0x2, 0x3}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r8, 0xc034564b, &(0x7f0000000100)={0x4000000, 0x30395056, 0x200, 0x3, 0x2, @discrete={0x3, 0x7}}) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x100) 03:34:15 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r4, 0x300, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x40, @link='syz1\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10082}, 0x14004010) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r3, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:15 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r3 = dup2(r2, r0) ioctl$KVM_SMI(r3, 0xaeb7) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$RNDZAPENTCNT(r6, 0x5204, &(0x7f0000000080)=0x6) r7 = accept4(r1, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r10, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r12, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) bind$isdn_base(r10, &(0x7f00000000c0)={0x22, 0x4f, 0x1, 0x0, 0x1}, 0x6) sendfile(r7, r8, 0x0, 0x50000000000443) 03:34:15 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x907, 0x70040) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7f}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0}) close(r0) 03:34:15 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040), 0x10) r5 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 550.544661] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:15 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x40000) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000040)={0x3, 0x8000}) 03:34:15 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = socket$netlink(0x10, 0x3, 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x30, r6, 0x23f, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50a0100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x1c, r6, 0x2, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4) r7 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x280800, 0x0) preadv(r7, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 550.643309] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 550.676693] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:15 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000380)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0xffffff7f00000000, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote}}]}, 0x50}}, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) renameat(r0, &(0x7f00000000c0)='./file2\x00', 0xffffffffffffff9c, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000700)) syz_open_dev$midi(0x0, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@initdev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x62, &(0x7f0000000580)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532322c72713d307830303030303030303030303030303030303030303030306666662c61ffff7b3d3078303030303030303030303030303030322c6673636f6e746578743d73797374656d5f752c66756e633d4d4d41505f434845434b2c6f626a5f726f6c653d6e65742f756470002c00"/157]) dup(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x0, 0x9) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000400)={0x3, 0xff06ff, "5f2dddb287f4dd4ffcabc509ad4cde506ffffb6892aff32c", {0x7ff, 0xfa}, 0x1f}) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000680), &(0x7f00000006c0)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x523) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x4800) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000180)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') r5 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r5) 03:34:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r1, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r2, &(0x7f0000000200), 0x8) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') openat$cgroup_ro(r4, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/75, 0x1e}], 0x1, 0x20001079) ioctl$IMSETDEVNAME(r4, 0x80184947, &(0x7f00000001c0)={0xe38, 'syz1\x00'}) 03:34:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800, 0x7f}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x100000) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvfrom$rxrpc(r2, &(0x7f0000000080)=""/3, 0x3, 0x28100, &(0x7f00000000c0)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @broadcast}}, 0x24) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) accept4$netrom(r5, &(0x7f00000002c0)={{0x3, @netrom}, [@default, @remote, @bcast, @null, @null, @netrom, @remote, @rose]}, &(0x7f0000000180)=0x48, 0x800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) 03:34:15 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) getgid() writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 551.007577] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 551.030142] protocol 88fb is buggy, dev hsr_slave_0 [ 551.035294] protocol 88fb is buggy, dev hsr_slave_1 [ 551.078734] overlayfs: filesystem on './file0' not supported as upperdir [ 551.115023] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:16 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$USBDEVFS_REAPURB(r3, 0x4008550c, &(0x7f0000000080)) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x101342) write$FUSE_INTERRUPT(r4, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@typedef={0x8}, @union={0xd, 0x9, 0x0, 0x5, 0x0, 0x1, [{0xf, 0x0, 0x5}, {0x3, 0x5, 0xffffffff}, {0x5, 0x4, 0x1}, {0xb, 0x2}, {0x7, 0x2, 0x3}, {0x10, 0x3, 0x1}, {0xd, 0x0, 0x4}, {0xa, 0x3, 0x1}, {0xd, 0x7fff, 0x100}]}]}, {0x0, [0x30, 0x2e]}}, &(0x7f0000000580)=""/99, 0xa0, 0x63, 0x1}, 0x20) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x189280, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r10 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x189280, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000002140)=[{0x0, 0x0, [0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x857, 0x0, 0x0, 0x0, 0x0, 0x80000]}], r11, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r10, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {0x0, r11}}, 0x18) r12 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x189280, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000001bc0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000002140)=[{}], r13, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r12, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {0x0, r13}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000001bc0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140)=0x1, r13, 0x0, 0x2, 0x4}}, 0x397) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {0x0, r9}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r9, 0x7}}, 0x18) 03:34:16 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r6, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r7, 0x6611) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r13, 0x84, 0x20, &(0x7f0000000040)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 551.242552] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') [ 551.665905] kauditd_printk_skb: 23 callbacks suppressed [ 551.665914] audit: type=1804 audit(2000000056.600:336): pid=22964 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/690/bus" dev="sda1" ino=16742 res=1 [ 551.671722] protocol 88fb is buggy, dev hsr_slave_0 [ 551.671805] protocol 88fb is buggy, dev hsr_slave_1 03:34:16 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000006840)='/dev/vsock\x00', 0x10000, 0x0) sendmmsg(r2, &(0x7f0000009a00)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="30d67589d568efc1e16e4bc39b228fcbfa6b4812f0b636914d69950e1587930c572096e9bfcd4fb3bfc19fdac5381fef5e427f7b3035b5cdaaa97d76965fdb793945cc6d4db7", 0x46}], 0x1, &(0x7f0000009c40)=[{0x68, 0x11a, 0x9, "fcb9b13c02761bee65827faf81f2adf4eeef4ae585389beb0a1b80662fb7e6e62803808c4ee01631746543a51abf7647ed9b8f5732fcd961978c27cea219bff9bbefde4c85607f4623e98c56bc6232c7d5"}, {0x80, 0x104, 0x10001, "4787a4fed647e1fce72165e07e4b0d6a1b7d0b1d7a96650ed1c021a08e1e77dcc94bfa15f25a8e7c3c56d4671d180e7b864ddad56511131e6a72fdc48facdec71a8495c2ae90b57738127fc1ade0309fff8de53e086dc16f6da7596ca8417850bf3f0fcf9f8074fd7e0e6d64"}, {0x98, 0x101, 0x7, "cd43d8ceb9f74193b6890f530daa91b494e1f162228b784e8f4c013592684b2c8a898ea85fc824feb8fc9467313d22fb26efb6f3ddb3d57ee2398a430056269a7dce86e023bcee9d6511ece14d80dc3ac35afbd0939bcc384513c25bc08f3387c5ff36744ff71eb525a85d04702f16cd9309c4ba73020e86ee1ba9e734db02f3f7aaccce13"}, {0xb8, 0x30e, 0x30d, "58e530dc08ffdc6cf7b3ada61efe2bb8757b2b76227bc072965320be41b916987f18041e52517b8a138f918160c45c7cac0468c1464fc84286714a7674c3c4fe7b2811404e3d4dcbb836bbb3bbd1c05fdad90ced8dcbf80061c2aaa061cd81b73c95a570e9ffada94a3f7181f0a63bcee45d32cc832c9b01a4f02b11e3ad5c3ecc70b2eec50d3ebad9a3f6783f5ec0ad185bc878c6af49cbb36b68c77c5848b2ecbf73beddae9a"}, {0x30, 0x10a, 0x9, "4ded545f7ee26e2e8f101f49e2560a23feabf624325d3b159f"}, {0xf8, 0x10a, 0x9, "431ac0114c87c7c4799b6eb2ffe2fbe3ed8d3ff66dc6bb3496680d683ee30c2a1e96b717a30e1df2263b545a7b7086ebef3af026a9fe87d1ba79a3b266ce2c1d7797560f68d015453245cccdd13475e76600c745d2159a43a8ce10d2fbb1e0d9c099a68ae30ef08f815eabc9c434a867978d31c529a8d62af4bfd02f19f8332ebae4a35b9d79585c41d9489d2926d422dfe75a753db89712bd79dbfd3e89707ad5fa12cb13bc3c35109c8403e868f3f47a14e21339b66fedbfc4ddfc3e5956f1f733cfae2781fd632181d7106c586a971847234749c2d8cc67ed4dad8e8ae3df66627c"}, {0xc8, 0x85, 0xffff, "9c989771a20c5991134151bde6cabdfe51a0b5707c5b7e88ef063f40b0c840647b9af77ea73d42e2510a870a0e7d4ee9782233ce1e551f318c06595a111374a2b9be5f80671dd630151e7600ef5d1e4d7eef709f4b0f6b3f5b34442a60d323441753b933e777b96851e959f77212a12983a28f1a45ea37e12cac52041abcca19aa7dad213469862062cb7056191b86fd0d288c67291449d53b2d97519a0f4b1f765a6c91bd18549df79da059f0c85d77d8"}, {0x98, 0x88, 0x0, "255ba53e9cfa6d193107502a3a4443576985832de3b084c25824509aa42f45ff88e5e334b834e1e1b2ea7846f7631148850af4623a99e9a5894333faccde130bc61d525f4702383a6dbeba38dfc58114b7b48ca39549f4d63d13bf475621800c968ac0363eb0606289d723f74f9f500bf41b3008e1d3e3aa6a66b001c000a58f19abe209c2"}], 0x4c0}}, {{&(0x7f00000002c0)=@ax25={{0x3, @default, 0x4}, [@default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="75f6fe9ad02356a148466d0c13a4783f664a8de16622ecdda36f3fb48a7639e1062fb86c9044db1de1c246d41c9e84b6aad01927fa01bd6e5aca51c87c84c234340b1efc5e2f26a1c4", 0x49}, {&(0x7f0000000200)="7ad9acaa40acc8dc8d0ad9fd157e15b2bb98b38020", 0x15}, {&(0x7f00000013c0)="d4bd02aaf51e43c904fb072358b8f0fe7a56cf63476397db2b6919738a790cd086116ba8675358046308d07ecae4f310d133b9367955946559e4a2a643e48bbc71acc5668fd55384a6779a693f845b04a3d804dc49d348eddbd05fbbb7f100341e5bc1139532333d725b92768779344a1edbc62da9e8718b1e4e69bf5789c5a17b778f3d92c74070b208fbf25cf439d24e33cd895cdf9260facd1d8c2be894877b666ab318d10eb39fdd464f13a7532409dde63da9f995727fb90ba30686f202a3f486bf97f709a5c6f2fd52979efca6f87629", 0xd3}, {&(0x7f00000014c0)="2b8a04fbc0464ef36da9d3c104eb920310416de94be695182ea82209b131d2d3e28c86bafaeb74653593073087969f26b3cc050378bd2333eca0fe1b6a1f612fbcf5a39ccd9021e4e33fbaf3cb926529d4f5f18c76c5961dc175fd2b8c5add0c877367d1df2e5aa91187e8e9845a75e940688362b9e16080c0e0d6f1419ee7c8cf766cec3ea58c10e9195c5543dad109337fa701178dd22943b81ba48e4eef", 0x9f}], 0x5, &(0x7f0000001600)=[{0xb0, 0x10d, 0x5, "c31355e94586231c6a9139e60c988d76bca93ae1dc570999e38445b8e93dd1221f7581a2a798aeaeb4a41726a845bab5bf37f9c41c595ba7d15674a8b2efd01bbe3aef04b602764e0deaa9829abc9ee60cc6840f33f05284e20642ba3739470dff427a23c198e506de8261f5cc6ca77696a0f128d3d7bb4032c0dd93b3fecc78abf9773fdff630fffa603601469cb5f30d2b05dedb3e423fe57eeddc"}, {0x38, 0x108, 0x100, "5377613a0cde417862265cb7f15079b3c0aad0b5191fa423cc50828522024d137b1fda23869e91c1"}, {0xa8, 0x80, 0x6, "d471730f975d7d0e636f2cb98a3e68e45fe9c075a107dffacac9864df5a14704891d6998560b5e4c2f2304d33c69e94f9e6bc5c2ad76c5a37d4552dc4b7e8e6683cfa4022208a0bd8c15d5fe6849ca8f83690e696b96185ac6a07cc955692d028fb5ee1e58d0a8f3d0ca964868236090d550e00e65746e2416332d239e8ec47fe5f84e763efa7b8d866c14965b210d84bb66"}, {0x40, 0x104, 0x3, "ae7100db72b40190466830b8bcdbb3b554f20db15faf3ca201e62804ea903cb2a5220e84a23040927c"}, {0xe8, 0x84, 0x3f, "556ea16acee4dfa04563f4296cf95f3ac59a55c3fe5d3b2956549f236411a8bc47feef8510b68dcf195886c18c56a1ff79f4060dac0f52b108f9fe67792135713e04307c41bcc9573bbe1eb3125ed5eb5f860bbfc954f7f555e02a0229bb6c5afc97f3ff1ce53419a75e4826a952d20125a7222d36a5796f87f1c4144e04d26f0e4a8f32f1b919e158b0cf717c493684819b3c95dad0756b2fcbb9568f419ba9411488952f983d6d8daa9d5268e7b3f1ba71474c8007b18cefd75d7f6b1c887edbd2bbf7e3b85fa88b8918fdc9a632691aa7ab2f"}, {0xb8, 0x74, 0xc4, "d09c0237b455ffd7261246d4375423c9a5f250590eaca6180fb2d7cf97363a8b5636e5551cfc44b4a06d8677e977fd2ab3d54fccde035a42a8b7a735f1ccac6c81dc445e659cca98e1e4f8e2e2ad29f32cea54dba66a52b55dc4b6656b8820fd41b9611bd6a563d888ac0a56c1d8e8f91bc2a562b0242b087fd61c721785bb77f6004137d3c2a5530ae3ff679181cb43530bbfaeefa62375467fa5a70c415529469b"}, {0x1010, 0x105, 0x8, "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"}], 0x1380}}, {{&(0x7f0000002980)=@in6={0xa, 0x4e24, 0xd1, @mcast2, 0xc4}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002a00)="831d3cbe73f9237be8b08a5c43cdef1c1daa11eeeae7b53693715cbdf10f83f5daf09e26dca7c52c5aa6994abe120f0bec7aa413", 0x34}, {&(0x7f0000002a40)="fceeba5404425c794953b068394f2f2d45ac0528ae2ec78a94bcdbd501ca866b172f4e67db0939b90544825b749f4ee4b1e2bd1c858fb29cf336b6c351a751ffa7dddf168e73071260a086d2330a84225e8ec56871a194410c961201", 0x5c}, {&(0x7f0000002ac0)="de56d5c35da3cc10ad5c0aae3b9edfffc41a40b8f301adb8634640015fd2981914b5fa52e6f27a23e4a19d45d7b6ea235192a1cb5f9de825b87689eabceda1acc5d80731422404544a7dd4d9bf77064f020e46834e51889a2e020396d8af4843a3d3d4ce88f3dd5e61be163e4a2a0f9e70947e258627e1314242381ab877478ae70a8ac1e8775349d781a1e098e01a5eb37db34fee5d0c7c25c3be282b8751ef09c77590e40d32297c7a1a541142deacd99d8721a4c6a60241ed50b6ac20cc", 0xbf}, {&(0x7f0000002b80)="25be240f86eef0205c4cac02dfcc3b84d18a0201da446f17039c24fb8f9c0b82428d37d313cc956ae7c1669bde61da1142b8f15f5485855273baa84d32bbddcbefeda8f9569f8618a2cf5df3100f2592491f09af9c2a2490cf165cb4d61e1fdc7d4521fdc7d8321faee9da3fc25f5c0dfdda7cc0e76d090a80eb764dda2b8ed5e3a59cb9ac9fda336e51a26fd85378a0878d0a30daed94a67e6b80186ba90c72b8216f026a8040d1790b39983bcdc21bba6bf94f14526b11fde469ab625f64fecb15f8d7463b113dc6dbd0e99549fd9d97", 0xd1}, {&(0x7f0000002c80)="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", 0x1000}, {&(0x7f0000003c80)="d652cb0c9f8bb5fe0d70ecccd62b0abee07ac7d254cceb3f4ef1e44f351b980a7d1dbf41ce2de7d39c0dc0063d81d71de102b2140e89515d8a8595e30fc1cb3c30a89ee18911cae2efacd655cc96922c984ae9838b1ddea0bffe806f5677b2c09a32f775286e7d7931e03ca47d6ac91851b042fdce268c512f13361b74d15b410c47d26db0d04cbf675c1d7b02ba7f93f51a02cc0f97569770beb97631d787f367a786fd2b8aeb4482d0747f3cea8e87eb83ec1e5801fc5a02088c04473536a6201cd2b1", 0xc4}], 0x6, &(0x7f0000003e00)=[{0x50, 0x6, 0x1, "0cdbcc704277cca7a63a325a79654bcc3961911d95b8de4e3b072971b9a716ef9205cca11c2d1d749161d78ae7a3e3d4f1e0d1da9a60ba0fb3a9d28e5e53c7"}, {0x68, 0x38d, 0x3, "32ddbbf809eacbc971cca3948008110c13688e2c82d382d5c20d717bc458562ce1c318a2dd2297ae43a11d53b26a9c40651f86cd0e42f4ba0a6a417f7581addc0a9c8b42c42d497904a24b68eb0a6d07d6fc1374b75136"}, {0x80, 0x103, 0x6, "bc6ad714b770434636865bff75f2b375e5909347e3acee03fdbc2b49b76862da9345909cab0a2247a69aac05489e2ce55bea3482d6fe1b1d8d781e389748d7428a5c8fdd9a919106d2190dfee4f03e8b3215a3b25965ebab17f770e3be8794db5aea442d8433903f7500450ada"}, {0x20, 0x113, 0x78a1, "0724dab9dbd30f5a04c4d4a82452"}, {0x60, 0x103, 0x4, "00e86f1a6784e59041885c586367cca314e561c81020b37bf181ba0a88586d2f8e92d18356226ba232e38e27b898f755f748aa5df495d9d22f8897bea5d02d66b37562bae22cd251c0db88"}], 0x1b8}}, {{&(0x7f0000003fc0)=@llc={0x1a, 0x7da7e7bbccd5532a, 0xbc, 0x8, 0x6, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xb194e30dfaddada3}}, 0x80, &(0x7f00000043c0)=[{&(0x7f0000004040)="e964bbfaf2c3f8127aaa7d7d3614455f0e25cf47503eef22c909417b22bfdf2d96728f1a9acc09b5e9d2310bf75137dd0298701417253628dad163c5b44cd4864018ecb4047068aa7ef3b65bb7d0e9e263ffb6", 0x53}, {&(0x7f00000040c0)="66410dba8eed9436a87468b7baaf4e08547d400b0c317137942cb98e6b00ec8a8cab62ad880f668c460edef1f878ab69092c66bd2309450024e1a65a59bfca9bbf0143875e450d399a40f54ae6d7c75d5de82f978abee031eee01fc2592db56c593fbdc134fa1114467d25d650f83e99bfa674f0ff427f9a38cb398a2ecf2f3a8c3e3b4190332f812e4b4f9f13ca0cd3e14aa6f19553fbefdf58d0844f14af30d11ba56fe737c10e180bbbd55e67503b4d942a969c4000be146d16f6d636bf4b1925f43dc21f5b58abf3a2af", 0xcc}, {&(0x7f00000041c0)="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", 0xfa}, {&(0x7f00000042c0)="8bb008eed3b1e3990def86", 0xb}, {&(0x7f0000004300)="ae85dc1575ba96623cc4332099", 0xd}, {&(0x7f0000004340)="279838e0cd538e0b11ff3d81c0116fa46cb57416158739c14c1355cf6915596d89eeacac151ba3cfd896b894a2b6ce4f51f8e1d55192fd8822f86e6de114a5790807800eb302ba59898adf48ee05fa444ee474403d3c5d038af3834c0967c3cb79181f6e8719ec30d5254cd282cfc1", 0x6f}], 0x6, &(0x7f0000004440)=[{0x48, 0x84, 0x9, "37a0db073da6bc905f0e0324fed1baf2067f901e0d8a95af29c43bbc3414f100c59bace50a161530c80990d936a550455a"}, {0xd8, 0x108, 0x8000, "eac07ef619705fe84c8eec56b9368ad52dc83893e5eff403790e5a6ee8e06f4d5b28d969adcdc5bfe00a3663c92993cdba26ae2dcec44048fadbbbea942d0ef273cd3c71b55a1dadc24fe8e856053d54d1182f0f79d2f2f476ace7109f6f347af936fe8fd91d2b7acb1cc452631b6357e853568e7d8370635f246bf72e40970c9ab614ed4ea970ff941cdc902cc18571b207f9d295aedd7abc16102a2de87adfe7feaf6c89b7dde832bd7362d07a5cda70ca00528d8bf77c336b42ffdc48056b33b4bd"}], 0x120}}, {{0x0, 0x0, &(0x7f0000004a40)=[{&(0x7f0000004580)="b1bfb4f23da68d023d98a81a37536db18db595cfc65bf84f6e880f4935047e35a29be4527dcb7accd1843d50fcd851742cc6727aebffca51573724", 0x3b}, {&(0x7f00000045c0)="8eafb008287ba275c560ecb9e5", 0xd}, {&(0x7f0000004600)="6c2ba448723aabfb1356fcb39df8640f89c71946eac86f6c51e7947d7670c7eb624540099ad742abdbcc136df29cb0b4ccf74dc0a0f6d0b98962314c6cdb52c0d4d2bbab364494a847ad330f3fe4baf3d39a783b87c22b9662424d9d", 0x5c}, {&(0x7f0000004680)="ad3d729526477140d647867ce94e943b4e7cef0f2c5acadf24311a8a3c22ba5c58f5dba99196278efd49a5d2a173f405d576b29ce364b938f9791c68bec0db2d23925c48d3fb9b92c66f303f3416abfa15e529df805da3ab219b24c757730f124ee370110352b27b609ffc6f1eac4d93405aeebf41b750294fe5d8975c8e098d84e9f275e0d7415508bffe18dbeb011b76f170e2b3e05faac0251723d906e6e1d8acab88e32c18155b9129912459c09cdd0328bb0357755ea9ccce4903322e17719a", 0xc2}, {&(0x7f0000004780)="0a2685a38143e85a182255d101777508122ab179502c126dda17b1ebfd17713c65884593a44ae02765dd3a3b0d62be11646dcf69d50fe5c7f42fd8bd6ce2f4e72467", 0x42}, {&(0x7f0000004800)="8b1bb74b1cf6828e47a9f8ef71050d906d34aab712d5844957abfac187d9d297fe56fcf17dd8091a45c492e79c64e3cf62d5e11a46e7fa4b2299ad83d4edb3f3b01bf897de06a7eeaf219b3616ffe9afc387cdb2991c5e740a94d7af9d3bb8bb5238b5a51d7f11e2ff4da12f1338ec12a6f641b35a2b0dfc70ffea6e9fca0836e38703e545e676b7a666d7b1529d30788aff6a6877f898aa5cb2e290286516f4d9d4649d03d071135e6b3dd66abfa35dcec23a3e91130a8e91dd50d31dd157f83b56584d683295a63cba5b9588f2006f52c725ab14fba6462d3de782fd297bcaa7633659fd25409bad1f99b807fd0bf391", 0xf1}, {&(0x7f0000004900)="053aa766b1ab304b0f68e2bfd2c383bf593f61858628dfaf94d4826086089127120758c7ce5043cf321ce0daa4db264667c6a17c96184bf191416334c94ac3d7443eacdbd5f0fad77b44ac90037114c6d439ba94c45e206fae6a50f5414e6a285a8b431984d5690c76ed466f2bacd562eee8984d8437eea28fc16cd2468f5b6f017575ed8c90e3c9be118292e4476936b92fa1c0995464a3a69944259fa248df136979d3ff7a617243190d61b8bf1516638ddec289dd10863c49003a", 0xbc}, {&(0x7f00000049c0)="73af51b3e12461bdef51ca5e9fcded6e87d2d16ef94ed294a1fc6db62f9097e461daed1c871c1d929cea90b1ff882eb327c78bec1729e11e472dbe4e93ed81691c3bd5d2ec2391", 0x47}], 0x8, &(0x7f0000004ac0)=[{0x50, 0x101, 0x8, "cf22b502a5aab935b108d6f5b1d6cad981fcc83305353855c548e121b47de408cf3dd6636d80ac6c0cec12b63ef853c4b8eed37dd43725e5ad15f0b0a112"}, {0x88, 0x186f9be6c05e0060, 0x4, "ca66449e92a69d88ab8388a0285cdc10f899861edd1a8bc27cc5da11847eb4a4d563e8387231eff87ff8767b61596a294281d9480b90bbb11f77802ea1e1e467c662b01db37bc45946d73991598cf441973926e5ba5828f49ab177722cc8d0e88671af32c101e856618cadc1f405527271d664f3c134"}, {0xb0, 0x111, 0xcd, "c9b3e0cedef83840336b05a39ab7937d2a4851a4c3edf4cee53a1b093cfef3972a205f3549ca0b7146ac44b22867511e6cedace930576067b67171c05df7bff4ee9a6471cfac7288207601b2700861235ee46c71163b575ebcf735a8a88d6e8c36af232a360d25596197fc761470236cb36438ee72d8878c85d1421976b0dbadb6dbb9e7fdbac93265d189a4ed7ff989bf8300172cc6675b185c2388e2e4a220"}, {0x108, 0x0, 0x7, "f25e2290cb1ccbafd9efc80844708ab7df9622b5ed1ac517f5e665acacf6f3c4da31e4557c8c37e9d847402379b686a3e24fcd42abbf94b229d3dcfe5ea72765b89cf37cbee85f98ca0e861f45031b6f2dc74be1cee1d8da68aec14312904fe3aad1c04dff465af955a068335cdce7ccb02b433cff739093c124a43d4f6711fe477cc1fb1409fab7fe22bf27da91ae90ad7e6e59afc5cebea18e0e921550b980cf118e4a6647c6bf085dbfa24113858d2d314208ecc3fe4b00f38e33cef3484ca83430d6409653c19c3b54182b6c871fe58f6495d93fa7893624120325395ae860789f2c0d6207991a8909b2bc6fdc1f063aadc375ab60"}, {0xc8, 0xff, 0x5, "e9d1c306569d909646e1bf3f73cda464fe4a35460a141f7492dd9c8518a7b09d8cac13658e2c466404804c01149dd8de97a8aebbc02bc98f75d0eca70257ae00be5fc6dc32de71cdb49659c439b9abe36d41c9e0a721d2caba070518bb7f7dc997f08e63a729e36a235fe0bb92bef0c48e3887afaf630d741af9ae0b966d4159a56cda7626594aecea183feec7d93ec61864476cc43cbbb9e67820b38852a29600f1df2f13b890f254bdd523e678f85dd5a7"}, {0xf8, 0x0, 0x0, "757f8a30c7e9d686170b4ff0c3e18301b42d6456e433236e6bb6b3f7e5055f8a7218cbd20df7b6b4462d5472677c736bdbabcca9bd6f5e20fcfc6b0aea367b3bdce6ddd176420ee7d390ccfb72bd6b53b564c6f85a7640503c05c1bbcc540619a10aca1b786e6da1f96e4c0de66b65280beaeaca133d87c11b6ae62d62bf4a7e66e5267dcc16a1387b432be1bb3b3748bf5f7a37e3a301e688bf5516b5909ca6bc30ab0a06fd0ce5ab56fac192c34c76a3735e13ec4ddda828bf1fc9cfcf0cd7af579922a8e3b414e6983b54b53e73659139509027e7189a0ad9821ec8e877e6162c92"}, {0xd0, 0x108, 0x800, "24cff78069e2e2bfc007ed203fb398d06572c922c91e22a6e445284f48f61ab2d3ca4230b67404e94916abcd74940130ea12b275e018df482d6823b4d5b60cdff13803c64a4166a67b8305cfe381fa91c3255c7bde3707d5a5e7bc04c9c98c778fc06a140f137f2fd1e61e90c089a58c5e9c020cfb2831b7d7a3fda2fc0fe57f73a1c1f05a7f0e48ad4982a57120ea909f83f44a6269404be9c8b4846f36147cb95a85ec612b8f8b4d9904a0adf5b035a4d910116309a7a9588319569cf8"}], 0x520}}, {{&(0x7f0000005000)=@in6={0xa, 0x4e23, 0x101, @mcast2, 0x2}, 0x80, &(0x7f00000052c0)=[{&(0x7f0000005080)="6cd56f23234a1cd12074873630ca579f753fb028b125a1e575bc403a0ef0edc44a797ca637b422acb09fc20fff1c8475c9519d26c1d2461f7aa34cc0185a704567eaea57449f94536324638db002a5d15647529d6a42a52548410c9bd5224e7b0fa26197b78cd4eff7c450798e455f4c0c6924dd9b4ed7c06744db99c63c2096ba3313f724a0571e773c1eb95085d6f205a08e4aeb1ec16fec0f4b9bdcf8e90546dd360f54a10ca7408c0059f12e4c9f228d", 0xb2}, {&(0x7f0000005140)="016f6ff28c6d93fe5136c38fdb9df50ced93566c4a509d08d2c86047e634bf6ea5b25058a0385763a339775edd6500136a6004eb08a0086cda49f7e55e44d523f1ff8e711a3d7c0d19c3dc3d8646d8b1f90457544f081e232947c0ced6bb9c85e3949a37069b0502466c8f1ab96b92e3ec5de9a5d536771db2f1d34d0acf925cc850c869e04bcc15", 0x88}, {&(0x7f0000005200)="21204c5fb9851ebcc3ed025fac6538196e2609b42713ab6b03babd853694b7b9b8ef83a752a8b50ab782919cc2bd3be885e9248060a004ba0523562c34226890176970ee1ea20cfc8f5fc5447ca8fce19da85452abbc70bd90415ee8d8722cba372df0d64106d1953a", 0x69}, {&(0x7f0000005280)="0f", 0x1}], 0x4, &(0x7f0000005300)=[{0xf8, 0x105, 0x101, "71d177790746422bac95e161a8f552b7d464f8b14694aa8077077e577bc8c52ed50fa86d4704eafd88fa1d4110c3b4476ae2d30b5e7d6d2689b9f7bfa0ed159b319e91219ae30041e408707230320a97fc1c627125c02bb7f99c89a3db489a6b8864753189835a2bd29a5f4ef5bdf3fc3092d2b9291f591887942101c3b5e69a80c55c4a5766616b8ad198603bca75f52150414163ecebdaffe8ce83da17fdee1fac17a4eedd4a2dff43e4cce08af1ee508e342cf9691734ccf38e2bc7f7bda08caf81866102905c34824db45ac7335649b89832e1b59032c064c187a0dc20dd9f"}, {0x1010, 0x102, 0x8000, "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"}, {0xe8, 0x1aa, 0x9, "792664e323ccd15e370f40be890a569cbfe2b4506057bd0fd06874478df404129c34d272afcced1358b3e404fa62be0886cc1fe3fc9a6c6c465a71006c19a3581b56eab1a11d6d45e9cec108f3e183880278fe31914c2a5f1af0af948e4af8dabbaca6751493e88f2303fac590c2b3ff88e77e93914de12526a9b68e5330a4a410fca51aae11239f2e67db3db04e06e1f419bc62d403fa61f896fef50610d6a6301a09f0ec243102c72aa6bbef3b816604f09d38b7bf58da8112548d75cb7da60da57f34972bbc1e0f15bbbb78ccd940a2706a446a05a593"}, {0x78, 0x10d, 0x5353, "4dfa79fc35f8562623b0bb99bc0804c61fa3f941f6aee494c014fd3cfbbf5be900e6dc3bd90c7da99be85da0300179f02e144137cf2b520767da3b7f73079570768f282bc804f054291886641977c845aa4cf25e612bfd9427169c2fdd085fda95264aa1"}, {0x98, 0x12, 0x0, "f13717f7e376a44ce5d7ed840c514c89bf24a7ced1325e9c0ee125020aec8fb321dd4e6a13205a287d108ab0338d4b96fa74fd15469a260e3ecd54d67cf9f31808ee8a319942d9625b45edc7c3f7006db5552d66d675266dfc5239d5b364fcb968319ce3bfb62ba75ce93c414226b14184b15372a3c2ac89a1751648b3b9ad9036dc7c547a17"}, {0x38, 0x38a, 0x54, "6921f428ad3e0a9cbf2c315bfa1e94d998a958435e4bce30df411b25e52ff5b9501f98"}, {0x108, 0x10a, 0x10000, "531b2b3bc46b85393bf3f1d9d23ad6f26ca6ec9378175b9793564091df7fb48e9a76345a43344b0340b205da1aa93f57023a2a380dd2f95c094975ad45f9cbc1be546045d4eb68573a33b31d4e4c351201565f26f4f61a7e9e1f71f5c2c629fc6daa983aedfc3266ae8cc66fd8828b1d4c31a4b2515eaeb763086cf70d8f5cc95e7d7c1a80ecbbc2e56c387c4bf581560eefdb2962fca37b695eb590004cfe667518fb414faf30750c9851cd06a0cb9473cb565280576e21b5e64cb7085153f802c08e844f99de287e1131abf2ea716f8f1ccd5469f8fcee772e98f48fe7bddc10a4d025e5c5e5f5caf59aad43b0889460"}, {0x48, 0x0, 0x10001, "e1a1a7c29391c2097c729d6f1f289bf71bce0314d826243d263f4d9e89ed6ad507322d188f57a82d3420605db3f939d3d5"}, {0xb8, 0x3a, 0x7, "ed4199e116f3b5bc019e2287d83ed3734d385eb6e515251dc9252f9cc548f3fdc8b1c3dc48175025662a6ee68a0d6ee2c4486c645423f1269194c03469cb04924043b311104084ea6e0b1811c98b9a26ced93e260445435b8de46fb33278d031673152106acf01d3a397afffd131ced6d9066d97b50257eaf62939d890bac351d035156258b7d459e00ac6ca4f959d0948c4241a0cdfce4dec1ac87c0e80322002e16d7798baad"}], 0x1540}}, {{&(0x7f0000006880)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x4, 0x1, 0x0, 0x3, {0xa, 0x4e24, 0x0, @mcast2, 0x3}}}, 0x80, &(0x7f0000006980)=[{&(0x7f0000006900)="6099142a382715303e793ce4cbee2e6cc3dc569739847f", 0x17}, {&(0x7f0000006940)="bc2089e55534f16a0631cdb3cf90e30d24862e5cbfc745e96f0d203735b60ba94d07a4cdbeac4d077839f460f4074a822ff0b98a95171e09bdcc53bde7fde6", 0x3f}], 0x2, &(0x7f00000069c0)=[{0x58, 0x115, 0x656, "1eceba4f978724994325e3c3e7a3704387841fcf0702b0ed2a439f9ad00a651b4fa05c9fe2022903bea3f6ebaf6cf54bfc2f5edfffc5958e6326d5c22171de97a4eee4e3d421"}, {0x48, 0x10a, 0x0, "a969a82cca69354969ca43178d3a5db86c1910bb584c27351f254b38d0ca752b372ccb103ad40b5db1f23e9134733f5924"}, {0xa8, 0x88, 0x0, "1d3bdc3a96c5bb72961be3d719071d86759c9ece6dfe89d02931f88c900d2c2cf16b7cc07e16299fecfb675f69453b6109b2ba372806bc86ca5d7084b19224c60711857f8ea068edab039fe340b128a8196c2f3fc4d97b511b505f199e1b469820b8de24609d4a4c224d23fceb1b1e4602b6323ead2110a2d6e729f786435c5cbb86de2734c1700c982647201c64b73635db"}, {0xa0, 0x0, 0x8, "f08b939898bb28f797b7adc5482d97e949b165cd73b562af51534f06905955c2cdf1da5461b592a8b42e68ce432ca39686a2c2241bda4fdbc077edc436113a1c67c13afbaa49df4bc7886eecb353084cf866edfc243f3d622b2e8f16c13973ad9b1774440ec64ad59710f80efa703f6642f1e482dbe160f6467593085fb1e360e59a393e8856091566"}, {0xf0, 0x114, 0x2, "9e41d79668ede3b14b78b608682132c9d8837b043f21acf96bcc6c39618f22fa7a568a9ef8e60834c342fecd0d219ea8b3153ce743572573907c53787449dc95827ceba70d90237aa0e35cd2a252575adb678c9b88739f8b17d4a39bf8886a5081e3eae39def7aaae01ab95d7cd6270e043dd9a88da6baa0bd26c588d4903a0dc2885146be0fb6c16b929cea7ee72f556706788fad925a06dca456495a2b82c01f99a8d4606304c6f0f2dd70c879498a66955e62d3fb907fef74233b7dbc02914561c5987fa7676a7016b712ab42e3155af16f3b6dc00b2d54ab4f9c"}, {0xd0, 0x10a, 0x3, "7be519997e2d578f403ee593909d929faf1ebfd3c8e62ccaafdd51cbc3b4c1818038684b8d4d383b33ab156e0b4dc29f19aec1864dc1661914705b0df6ba5d63d6c65fe4685f94a809b517b632c535bea17bcbde25d5e6143f241e50b30a5541e0f69dc174df0982750986edf9ab2623bac3679b4bbb3be78eb8648d22c3c48e2f25567545274d8bac3057926869713d576756e3b99c9e2effd027716c196d67220cbc0d86df26efd7d22e7b6776a65c5902e3b8b598d69a05"}, {0xf0, 0x103, 0x0, "c4cd4ed09d88df7ca578d00822d3115e163afd8c2d307fbf416358cf6d3f7e501754ac2b094f9a290189bd2f37542cb29dada05b5ca7b1890f541e8cc10f12bdad0112698c5cb29a9bb44e2067224929463c14b4fa516559c0e36b5e098d7454d00de54ded04ab889bab0e7b49ef6decbb53d9469e292fd054ac6d79f02f306ffaf9fa5c7d8d587e2257cb526d5be5c0cf24cfa2858d8b90f916280caa51aadb7cc285ba804e7eac7459c9707dedd337c4c590ed695e144a5d84619909d4063c1da4b3dd6db1663cdf9161e470879af2c2aea6b770862686e2316150"}, {0xe8, 0x1, 0x8, "b3e56359af7092dbb2880f86fa280384594f1a227407cad6f9e63f8a58eb2df5e0dde4b9c02adc5abad1805fc6d63aee09c3678815bf82ccb32b1873b7d4b43b35bd99eaf1ff8a0efda515a0283d661711237b4747cce6f9bfbe4f882c888ab20fb7029f01b1e7c8ecb614f75b3dec4c7c4c436f15b1242d123c06b6058efd84b8fab722b666ef897ce9770c8ba14f7f490c4d342bb5e3b36083a3ceff1c29b484213f901a2d841d83dbbf96947cbab6747b238d9085ce53757e3efd7c5ee3c3731f2096a8c8bcc8117da362ee4f6a5ea0496f281b4bf1"}, {0x98, 0x117, 0x4, "56aa4601b3b8968c89df0accf1de0d73329aeec4bb37e77f5a22434fc0259eddb8a7661ff2f53dface2997dbfd61f503996eaef151887874fdef8f7d9e0d0b4748c64998c18d3d9531fbc64079e6596effa77d4f5a02b12f17a8ad52836a469b2bd1fa5317ea2397e4b412e5d48463a62ab257592196ca0b2bf5c7181439458c8af1"}, {0x1010, 0x114, 0x3, "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"}], 0x1628}}, {{&(0x7f0000008000)=@tipc=@name={0x1e, 0x2, 0x60ffd36d207f4ad7, {{0xd6d529c09ecf5dd3, 0x3}, 0x3}}, 0x80, &(0x7f0000009380)=[{&(0x7f0000008080)="d71fe53194b6f327ed85d199a67ed169beb0f9b60b762da75abd9425a48a53af7d5abe626e77d285a0a6a5de5f8c0e22a9c7dff44f28210a7d0f99eb4917c86ac356589283780daf41d1f29043f1730f219ab6277b21d196f53dc42b769fe9038d91157a208d4a9584860cb8", 0x6c}, {&(0x7f0000008100)}, {&(0x7f0000008140)="32528e303f59dad33352846fb9135ec683c7061cd8ab258edef428fe91f6005bb9b0c2241eba2c3fe9abff73bb5380f9bd88535803b70a8d76f7c52d2a8ad7434c692dcd687293ce334856addcefe8e23e4c1d831f941235597872fedc48eca55b6671700df8dd279e013a80069f800d0d22d0e044c04f42101713ee4e3a7142b652b0505e59276af5ab3e90810855156cf0dd570848532fe332ca170b5ccf87013e1584c82ae299039f06e5a13f8bf751", 0xb1}, {&(0x7f0000008200)="b9c8fad70f5ba939ed706ea6f8b084e490deaa73b03d1a1fe2919457ab50859becd101fad9369da231d7e95ff69691c11904a4554c4b80bf60357fd965255536ac07a557419170371ba38438585e8342f39d72d395d10c90", 0x58}, {&(0x7f0000008280)="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", 0x1000}, {&(0x7f0000009280)="cd480646640773e50f55c19de7dc79bc9f4057e276d7bc71fa75e24944e2e19cf4326d3316f878e5a650019dd4992b35f07d08adc253795670a9b4a6d248794069062422fd88877a7ae0298c13d2ae6ce0f0343ab138561a73e213abb827ab71bb5c62e5994cf0c9a1d4626221cd96c5ecadc9a07d3f8f4033bc323fac83a47b07c645f205c34931e2cc3d080e0ba29e2eceb60ae82f1d438db1b316152eddad9e47e0914709befa4617d1d1a97b0895f4fe1db46a4173bd379acbf8bb5ac9c78420a9f2be73e2755f61be4d0c37005feba4bf11179e", 0xd6}], 0x6, &(0x7f0000009400)=[{0xb8, 0x114, 0x5, "83ff4a2d0b01ba1a82c4ef5585f5251804ff6b73b17c95f4d63810ad1b19f740b1a866fb9db2dea6b8d3913afff8b4096387f6d350ef0fe3cf99b386ef6a9b8e760d3158277e22bd7a20ee83cb0e6aec5226703dc9eed4fc65299b3b82c88eb05b755b8040883d0a464b6400b95c5f0cedaff53a19f185786142c236fa76eceaf3d879f3082eba7133925a4aedd2f2f9e2032186dd75aebff831584271d1f7159931"}], 0xb8}}, {{&(0x7f00000094c0)=@ethernet={0x1}, 0x80, &(0x7f0000009980)=[{&(0x7f0000009540)="b93eec3fac4e930cab67fce3c066d7d7ab4f37c35e85943d7f0e4ff02de7bebafc9cfc9b850d4a2691", 0x29}, {&(0x7f0000009580)="e7bad1f4d859b28ce2847ce946109e378fb197f45ce5d84a9d3527ecab1f707c42e2ce1b51f5713dc19753e3ba539cdb024db387ec3f627790261d33f97b9ed998f73c5ba62156452cb0146a1a3a2bbe9304abadb469e9b17740e4654fff043f27172b7ad69ca82adc671ca20a1addead9b641b69c893c76b426ff5b156d5ccb043ecbce6e842d7f59e11962d5f15b9f6f6fe7eeede5979d8c2761837a18fd3bcd0162a670f523da4a6fb2225f3ebb7fd53acece60ca95eaed7d1003b61574f73e203f260fda7c072c2e764b94925c8d32eed9a4d8ecaa7a337db8d4aaba56f36281628b2642c567ba8c771f1f", 0xed}, {&(0x7f0000009680)="c4b19b1288e3a6523740993ff5a7bac1ac8949a453498dc63c5a6fad475fc1cdd99584717218e9f3c09eb6bc95c9b5193e55f78afa1f2f0a2c69722ffbb7c10faa1198d8038113b5cb724b6af9e8314a7a4a2e44cff6fe5dbda7f7eedd748434ce9714f1c6e89413", 0x68}, {&(0x7f0000009700)="0c267503f242b4ad9e6c284b5f11d8fe31728700632bccd73c9274cf2647bcbca62a710580c15a59c4b6e6b748776f40812005c3e2c02956cfced9f7defbefd5f09ae59f76b867b0999754e135506bce1a570b53fd33820bc62d67c873ca5a5282bc12c5abe971c944db9222bc69103b8b23a5993f05a90c924c80", 0x7b}, {&(0x7f0000009780)="012bdc742fcdde55c19f351a336cea027187fe1f0fbb0f50c28d4f3b1b7cdf583f04d862e2b411dfb09b8eeb02d6ae80f1b2ccd24ff1a8939e832ca875cf6a3ceb1967dea0a1339fd1aa1ea295dbbcf7ed76299948c12f57a77eb0c8e75fdb58bf761d97f79a827682e944283b44713a5fafcb7948d95f3139042ae0cb91836a07cd881ae5626beea08ced4b78747698f8b0c11cc4ac93a3daa80a844472e89438c5aa50e2034245fae7293104b291be9aa076fac74d07cd74e24604195d476e94a23afdbedf5cd9fd84fcf0241e238f0f5af02bc5a3327b641464028105597534d11d1a5b4b7a155efce262d692a5dbe6fc5d9d99", 0xf5}, {&(0x7f0000009880)="2b2765ce1808d7e3686c51f880719d7ed1787b1679ff71270f6300cdd0ce3c4e3db08d1ab1d1f91263f401171d4a8811b368fe455ef6c74e0b6164171e61894cad7efc5980edc42c91f468e1464730c8d2c49306247cfb98b237aefa3b2ed4227976", 0x62}, {&(0x7f0000009900)="0f0e3aafc121e4f03c23b1b932a5f28d4e1967cfdf969bae605e3311957127cf8d7cb1d39ea573330a85e87bdd58736e92ceddd9b415e8dcb33c007211fe06346b35154fb5468ad2deebe99a64", 0x4d}], 0x7}}], 0x9, 0x687a2b7616c77cb2) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)=0x0) r5 = syz_open_procfs(r4, &(0x7f00000001c0)='stat\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$KVM_GET_DEBUGREGS(r8, 0x8080aea1, &(0x7f000000a100)) sendfile(r1, r5, 0x0, 0x50000000000443) [ 551.709941] audit: type=1804 audit(2000000056.650:337): pid=22964 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/690/bus" dev="sda1" ino=16742 res=1 03:34:16 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) readahead(r1, 0x2, 0x81) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:16 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 551.839921] audit: type=1804 audit(2000000056.770:338): pid=23011 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/691/bus" dev="sda1" ino=16724 res=1 03:34:16 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f0000000040)={{0x3, 0x0, @reserved="d38501e47121c9c2b320727470cd8ac596636e7b49dd4ef250d9639ab1a0deca"}}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 551.903318] audit: type=1804 audit(2000000056.810:339): pid=23011 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/691/bus" dev="sda1" ino=16724 res=1 [ 551.940134] protocol 88fb is buggy, dev hsr_slave_0 [ 551.942486] audit: type=1804 audit(2000000056.810:340): pid=23013 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/691/bus" dev="sda1" ino=16724 res=1 [ 551.945290] protocol 88fb is buggy, dev hsr_slave_1 [ 551.985630] audit: type=1804 audit(2000000056.920:341): pid=23016 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/692/bus" dev="sda1" ino=16724 res=1 [ 552.022226] audit: type=1804 audit(2000000056.960:342): pid=23016 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/692/bus" dev="sda1" ino=16724 res=1 03:34:17 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x400) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x3}) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 552.055573] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 552.071763] audit: type=1804 audit(2000000056.960:343): pid=23017 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/692/bus" dev="sda1" ino=16724 res=1 03:34:17 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f0000000200)='./file0\x00', 0x210542, 0xf7464dc4523fa8d8) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000040)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:17 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000640)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000009000000380003000800040000b2b7d411a95c896090248f57bb750000001400020069726c616e30000000000000000000000800010000000008002c3800b987fe94e6d193a9ba1f0e32f3bc9011435a499f2934e9a4d14f29171efbb0d06d8ee9484130f837f55bda7f189aa6b2ed80e9332889f1582a978d8a2d1b1edeff4cf88b2184f9e2aaf95147509d17d7f390b63c042be76002f4ed3f414bac3a2727d5a459f721c3abbd8ea413dca9e2a97a055f99553978bb3809b3201f6fe07adbb839c47627706556e1f398964b5804279903a84d68d60a08e68c8ce315703f1996fe2ed41b"], 0x4c}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="f7010000", @ANYRES16=r2, @ANYBLOB="000126bd7000fbdbdf250c000000080004000002000008000500020000000c000200080002004e210000"], 0x30}, 0x1, 0x0, 0x0, 0x40048}, 0x2005c804) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x1) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) recvfrom$ax25(r8, &(0x7f0000000400)=""/152, 0x98, 0x10002, 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r5, 0xc008561b, &(0x7f0000000000)={0x5, 0x5}) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r11, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x48065}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x78, r12, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xef}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa00000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x1}, 0x4000) close(r0) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r13, 0x0, 0x0, 0x0) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r14, 0x100, 0x70bd2a, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20) fstat(r13, &(0x7f0000000040)) 03:34:17 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r3, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) r8 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="85b6794340baab64005e00241ef5489bb3ac6fd8bf5a569706778996c2af6a95fbc497e72c5538545f67682e85a86c6ae27eb56c35cfff93351ceead253549251c028d5522e90a592b2bda4540a9228755b7915f7b45e3b94aa7d6835b92389c1b095c1ac38522f7f75d5dab179f907d9435d488cbf1e24c22fee2687b008f3319247a5bbf1aae7607c8b979efcb891a7f9821679debbb337c8be26f7271fd2eb353f8b1826cedbe523c8d", @ANYBLOB="629a609f244608e59e9beb7d359e218e63c0bd61487b3cda628ef67b4992422627fb4e67ef283dda5f74504db5aabc0d48283fd938867c87623f21a61a67bcd35de452cb5ba7dcef3aa9fab20713df6a3631f25389837dd575555ad8f9b7d436326aeb42ffd8917946030117d510cf7fa2e64cd031e2fb4f83215c449721476592b6d97cb262ba", @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRESOCT=r7, @ANYRESOCT=r6, @ANYRESDEC=0x0, @ANYRES64=r8, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRES64, @ANYRES16=r4, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r4, @ANYPTR, @ANYPTR64, @ANYRES16], @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r11], @ANYRES16=0x0], @ANYBLOB="a24b2ed326d27ae181dc46aa8b80d5a7571379bde8ec3d2e8b3302a939b145c5227c2a0de98750f8bf55c7a01b3e5e7757ca283c2bdb343c7839f788b95f0b9aebd558bceffeca7ff90a9c93f627f04543102539db93b2d1316160c3daa2ae", @ANYRES64=r1, @ANYRES32=r11, @ANYRES32=0x0], 0x1aa) [ 552.171087] audit: type=1804 audit(2000000057.110:344): pid=23026 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/693/bus" dev="sda1" ino=16689 res=1 [ 552.229258] audit: type=1804 audit(2000000057.110:345): pid=23026 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/693/bus" dev="sda1" ino=16689 res=1 [ 552.262603] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 03:34:17 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80400, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) perf_event_open(&(0x7f0000000140)={0x5, 0x2a, 0x200000000d8, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1000000000000, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 552.273581] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:17 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r6, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r8, @ANYBLOB="000326bd7000fbdbdf2514000000980001000800030042000000100001007564703a73797a3000000000380004001400010002004e24ac1414bb0000000000000000200002000a004e2000000001fe880000000000000000000000000001030000000800030020000000100001007564703a73797a32000000002c0004001400010002004e20ac14141400000000000000001400020002004e23ac1414aa00000000000000001c00020008000200280c104b0400040008000100830d0000040004003c000100380004001400010002004e21ac1e00010000000000000000200002000a004e23000003ffff020000000000000000000000000001000400002400050008000100657468000800010069620000080001006962000008000100756470008c000500080001007564700044000200080004001f00000008000200ff07000008000100070000000800030003000000080001001e00000008000300010000800800010004000000080001000600000008000100696200002c000200080001000500000008000200090000000800040001800000080001001f000000080002000500000008000100756470000c00020008000100060000004000010008000300ffffffff08000300030000002c00020008000200ff010000080004000900000013000300080000000800030003000000080001000d000000300006000400020008000100400000000400020008000100000000000400020004000200080001000100000004000200"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r9 = socket$isdn(0x22, 0x3, 0x8c27c227a20ed9c) poll(&(0x7f0000000440)=[{r4, 0x200}, {r6, 0x4}, {r9, 0x20}, {r0, 0x2010}, {r2}, {0xffffffffffffffff, 0x240c}, {r3, 0x180}], 0x7, 0x4) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x30, r10, 0x23f, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r10, 0x400, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) ioctl$VFIO_SET_IOMMU(r2, 0x3b66, 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r12 = openat$cgroup_ro(r11, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r12, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 552.386162] selinux_nlmsg_perm: 171 callbacks suppressed [ 552.386174] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47680 sclass=netlink_route_socket pig=23035 comm=syz-executor.2 03:34:17 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') socket$pppoe(0x18, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$KVM_SET_XSAVE(r6, 0x5000aea5, &(0x7f00000002c0)={"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"}) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$VIDIOC_SUBSCRIBE_EVENT(r8, 0x4020565a, &(0x7f0000000080)={0x8001006, 0xffff, 0x1}) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:17 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000000c0)={0x0, 0x357, &(0x7f0000000080)={&(0x7f0000000100)={0x64, r4, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r5}, {0x48, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x64}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007640)=0x14) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r10, @ANYBLOB="000326bd7000fbdbdf2514000000980001000800030042000000100001007564703a73797a3000000000380004001400010002004e24ac1414bb0000000000000000200002000a004e2000000001fe880000000000000000000000000001030000000800030020000000100001007564703a73797a32000000002c0004001400010002004e20ac14141400000000000000001400020002004e23ac1414aa00000000000000001c00020008000200280c104b0400040008000100830d0000040004003c000100380004001400010002004e21ac1e00010000000000000000200002000a004e23000003ffff020000000000000000000000000001000400002400050008000100657468000800010069620000080001006962000008000100756470008c000500080001007564700044000200080004001f00000008000200ff07000008000100070000000800030003000000080001001e00000008000300010000800800010004000000080001000600000008000100696200002c000200080001000500000008000200090000000800040001800000080001001f000000080002000500000008000100756470000c00020008000100060000004000010008000300ffffffff08000300030000002c00020008000200ff010000080004000900000013000300080000000800030003000000080001000d000000300006000400020008000100400000000400020008000100000000000400020004000200080001000100000004000200"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) accept$packet(r8, &(0x7f0000007700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007740)=0x14) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r16, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r17 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r17, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r16, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r16}}, 0x20}}, 0x0) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r22, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r19, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r22, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r23 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r23, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r22, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r18, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r22}}, 0x20}}, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket$nl_route(0x10, 0x3, 0x0) r26 = socket$netlink(0x10, 0x3, 0x0) r27 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r27, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r27, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r26, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r28, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r25, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r28, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r29 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r29, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r28, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r24, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r28}}, 0x20}}, 0x0) r30 = socket$netlink(0x10, 0x3, 0x0) r31 = socket$nl_route(0x10, 0x3, 0x0) r32 = socket$netlink(0x10, 0x3, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r33, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r32, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r34, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r31, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r34, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r35 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r35, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r34, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r30, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r34}}, 0x20}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000007780)={@dev, 0x0}, &(0x7f00000077c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000007b00)={&(0x7f0000000000), 0xc, &(0x7f0000007ac0)={&(0x7f0000007800)={0x2bc, r4, 0x100, 0x70bd29, 0x25dfdbfe, {}, [{{0x8, 0x1, r6}, {0x258, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x3d, 0x20, 0x9f, 0xfffffffa}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}]}}, {{0x8, 0x1, r34}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r36}}}]}}]}, 0x2bc}, 0x1, 0x0, 0x0, 0xfb74125327271b33}, 0x40000) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)="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", 0xfe}, {&(0x7f0000000140)}, {&(0x7f00000001c0)}, {&(0x7f0000000200)="88b6b840073f1e543e5ea44648b4b56623210500ffefa485206c63f122cdbec61efa574ea6b53869627ef008b9468c26b033702c55e8ffea8183e23d6fd879efd62a3a4c", 0x44}], 0x4) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 552.694867] team0: No ports can be present during mode change [ 552.897636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23063 comm=syz-executor.0 [ 552.910827] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23063 comm=syz-executor.0 [ 552.924502] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23063 comm=syz-executor.0 [ 552.937067] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23063 comm=syz-executor.0 [ 552.949658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23063 comm=syz-executor.0 [ 552.962425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23063 comm=syz-executor.0 [ 552.975658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23063 comm=syz-executor.0 03:34:18 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x745d79ffbfcc4dd, 0x84) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f00000001c0)={0x7, 0x1}) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4b97, 0x8000) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000140)=&(0x7f00000000c0)) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x0, @rand_addr=0x2}}, 0x1e) r3 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000040)={0x8, 0x3, 0x416215da, 0x7f, 0x9, 0x1}) close(r0) [ 552.988290] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23063 comm=syz-executor.0 [ 553.000687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23063 comm=syz-executor.0 [ 553.028806] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 553.030685] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:18 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='09\x00', 0x90a, 0x8a5c1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000280)=@urb_type_iso={0x0, {0xc, 0x1}, 0x4, 0x44, &(0x7f0000000000)="84c8c9862f709c1bd010bf3cfdd3915e5fe23500fba84d0ab62610fc5ff70c67947a8400d8413e7e7ca33dfcb1429d41837fd708f054b6b7e8cb96cfca32a0968aa180298ca052e724a907c37f322d962dd7a4fc68c0a9f520194d7a9689409eecd27a814bf1074c2a04a3f86b18c29059019a1265794e9917446fcf730fe970d2aaea452378", 0x86, 0xff, 0x1000, 0x69, 0x80000001, 0x7fff, &(0x7f0000000140)="448c93b1852a93fd5de1fd53fcde6f898583971274028954dabc6465d84b50003bb54ebfc13e418a6ec4b391fb1e49fcc926f29056a5ad4dd0b3e938dcf55061ce8972f9cb87428567fc5a9828260c1e647caf", [{0x1, 0x4, 0x3}, {0x7, 0xffffffff, 0xfffeffff}, {0x1ff, 0x8, 0x1000}, {0x7, 0x4, 0x100}, {0x9, 0x9, 0x1}, {0x1000, 0xfffff796, 0x6}, {0x7, 0x0, 0xfffffff7}, {0x0, 0x3, 0x6}, {0x2, 0x7, 0x100}, {0x0, 0x7, 0xfffffff9}, {0x0, 0x8, 0xb3}, {0xe448, 0x1, 0x200}, {0x8, 0x8, 0x80000001}, {0x7, 0x9, 0x7ff}, {0x28000000, 0x1, 0x10000}, {0x2, 0x100, 0x12de}, {0x3ff, 0xfdd1, 0x2}, {0xff, 0x2, 0x2}, {0xb43c, 0xe78, 0x8}, {0x5, 0x4}, {0x7fffffff, 0x80000001, 0x7fff}, {0x80000001, 0x1, 0x7ff}, {0x9, 0x10000, 0x800}, {0x10000, 0x9, 0x3a4}, {0x3f, 0x6, 0x1000}, {0x3f, 0x200}, {0x1, 0x8ca}, {0x7, 0x2, 0x8}, {0xb1, 0x400}, {0x400, 0x1, 0x4}, {0x1, 0x101, 0x9}, {0x8, 0x7, 0x5}, {0x5, 0x3f3e, 0x2}, {0x3, 0x1}, {0x6, 0x101, 0x3}, {0x6, 0x800, 0x6}, {0x2000, 0x1, 0x1}, {0x400, 0x800, 0x6}, {0x3b64, 0x8, 0x2}, {0x20, 0x7, 0x3}, {0x5e, 0xa8d5, 0x8}, {0x40, 0x120f, 0x80000000}, {0x1, 0x7fffffff, 0x1e4}, {0x5f48, 0x7, 0x9}, {0x1, 0x2, 0x1}, {0xff, 0x5, 0x8000}, {0x8, 0x0, 0x40}, {0x7fffffff, 0x3, 0x1000}, {0x9, 0x7, 0x401}, {0x6, 0x1e62, 0x4df}, {0x2, 0x5f, 0x7ff}, {0x8000, 0x5, 0x8}, {0x1, 0x3f, 0x5}, {0x5, 0x8, 0x400}, {0x2, 0x7, 0x7}, {0x5, 0x5, 0x2}, {0x3, 0x6, 0x7}, {0xbe, 0x2313, 0xffff}, {0x40, 0x80, 0x3}, {0x2, 0x8, 0x8}, {0x0, 0x7ff, 0x8}, {0x20, 0x4, 0x4ce}, {0x1, 0x3}, {0x3, 0x10000, 0x1}, {0x7ff, 0x4, 0x2}, {0x6, 0x0, 0x401}, {0x3f, 0x120, 0x10000}, {0x8, 0x6, 0x9}, {0x7f, 0x3, 0x5}, {0x5, 0x5, 0x8}, {0x10001, 0x2, 0x2}, {0x6, 0x7, 0x61b}, {0x3, 0xfff, 0x6}, {0x20, 0x2, 0x7}, {0x9, 0x1, 0x7}, {0x100, 0x200, 0xfffffffe}, {0x0, 0x7fffffff, 0x10000}, {0x7, 0x3, 0x40}, {0x5, 0x401, 0xffff}, {0x6fd, 0x400, 0x1}, {0x7, 0x1, 0x5}, {0x4, 0x6, 0x3}, {0x8, 0x3, 0x5}, {0x8001, 0x6, 0x22}, {0x9, 0x8d0000, 0x622}, {0x1000, 0x4, 0x6}, {0x800, 0xffff, 0x7}, {0x3, 0x9, 0x9}, {0x300c, 0x7, 0x10001}, {0x4, 0x8, 0x1000}, {0x0, 0x3f, 0x9b9c}, {0x3, 0x3f, 0x8}, {0x401, 0x90e9, 0x400080}, {0xfa, 0x3, 0x8}, {0x3f, 0x9, 0xe8f}, {0x1000, 0x9, 0x7}, {0x3dc, 0x1b3, 0x6}, {0x9, 0x3f, 0x1}, {0x9, 0x0, 0x8f}, {0xe627, 0x3, 0xb9e}, {0x4, 0x1, 0x2}, {0x0, 0x1, 0x81}, {0x1f, 0x4, 0x5b7}, {0x101, 0x6}, {0x9, 0xf5, 0x4}]}) close(r0) [ 553.074364] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 553.090217] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:18 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r4, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0xfc, 0x8, 0xb5a, 0x7fff}, 0x10) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100)={0x80}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000000)={0x1, 0x3, 0xffffffff, 0x9}) 03:34:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') prctl$PR_SET_TIMERSLACK(0x1d, 0xf) sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000080)) 03:34:18 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000040)) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r10 = dup3(r9, r6, 0x80000) r11 = openat$cgroup_int(r1, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) sendfile(r10, r11, &(0x7f0000000140), 0x2) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f00000000c0)=0x7, 0x4) r12 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:18 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) flock(0xffffffffffffffff, 0x3) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:18 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x4, 0x1f, 0x1, 0x2, 0x8, 0x9}}, 0x8) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:18 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x440, 0x42) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000180)={0x1, r3}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x16, 0x12, r4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000080)=0x4) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r7 = openat$cgroup_ro(r6, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) mremap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) preadv(r7, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/73, 0x49}], 0x1, 0x0) 03:34:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) tee(r2, 0xffffffffffffffff, 0x8001, 0x8) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) ioctl$FIGETBSZ(r5, 0x2, &(0x7f00000003c0)) r6 = socket$nl_route(0x10, 0x3, 0x0) write$char_usb(r2, &(0x7f0000000100)="3266aa5ceb1ed4bdb978898175689505ebb62e7aa4aa7a3fb70573cfe1ec17b3bd23b29b85e71ae2aaa13d5ff8e78a66f128dcc83acc110a199adeab4915131af1aac6eb14b53fe397aee9f29b85e9f22bc3ee133db671892d25d114619d22c2745bc91616e97d40a9ae25402559c4a8c3e54f63490d29964fc5a85251", 0x7d) splice(r3, 0x0, r6, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r10, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xffc1, 0x5, [0x1, 0x2, 0x42, 0x56ab, 0x0]}, &(0x7f0000000300)=0x12) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000340)={r11, 0x2, 0x6, [0x5, 0x7fff, 0xb7b1, 0x8, 0x1, 0x4]}, &(0x7f0000000380)=0x14) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "3221951ae655a1818111a723b2a7b2f7996dda58"}, 0x15, 0x1) write$binfmt_elf64(r4, &(0x7f0000000200)=ANY=[@ANYRESDEC=0x0], 0x14) 03:34:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r6, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x9, @ipv4={[], [], @broadcast}, 0x8}, @in6={0xa, 0x4e21, 0x98b5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000}, @in6={0xa, 0x4e20, 0xe45, @remote, 0x5}], 0x74) 03:34:18 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="2900000b2000190000003fffffffda060200000000e80003040000040d0014", 0x1f}], 0x10000000000003dd) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 553.750219] net_ratelimit: 6 callbacks suppressed [ 553.750225] protocol 88fb is buggy, dev hsr_slave_0 [ 553.760373] protocol 88fb is buggy, dev hsr_slave_1 03:34:18 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) personality(0xd380019) 03:34:19 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) r1 = socket(0x11, 0xa, 0x6) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000400)={r4, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0xfff8, 0x6, 0x0, 0x8, 0xf7eb, 0x1, 0x10000, 0x0, r4}, 0x20) [ 553.990123] protocol 88fb is buggy, dev hsr_slave_0 [ 553.995252] protocol 88fb is buggy, dev hsr_slave_1 [ 554.017433] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 554.026289] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffd99, 0x81, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}}, 0x0, 0x0, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) 03:34:19 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x7) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 554.123700] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:19 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x20081, 0x0) r4 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, r0, 0x0, 0x15, &(0x7f0000000080)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00'}, 0x30) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000200)=r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r7 = openat$cgroup_ro(r6, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r7, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:19 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/2, 0x2) close(r3) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:19 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$BLKREPORTZONE(r7, 0xc0101282, &(0x7f0000000400)={0xffffffffffffff74}) 03:34:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x22402) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000180)) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000540)={0x5, 0x1, 0x12, 0x6, 0x5}, 0xc) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r7, 0x0, 0x0, 0x0) getpeername(r7, &(0x7f00000004c0)=@can, &(0x7f00000003c0)=0x80) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r6, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) setsockopt$sock_int(r6, 0x1, 0x0, &(0x7f0000000580)=0x1, 0x40) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000440)={0x0, 0x8001, 0x5, 0xd, &(0x7f0000ffb000/0x3000)=nil, 0x3}) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) write$binfmt_misc(r4, &(0x7f00000002c0)={'syz1', "7aa3c240d499133987a5183c2f93e6eac47699fec00a364c14ec94a1d77dc68513c1d5813d1f3613eb6d7786a6983c29dc60aa03e417473ee4c0be67f0f057138f0ce352c6f588d56125a36e6760e0a2cf7bfa590362b1aad79595856c28235ba8e95f3702bd855568930fa7a9b3e54aa7206dc63402339abf62fa7f55aadbe181e7c1cfe1d6a3356f9fed48afd1ab0902f3285468919927ee7b345836e3ec2574ddc6d441fccb5d4d11d10015b9e3016cf52605ecf7e5bca02987157cd851b70a34df38ad5a269d26a0c8ebb645ee9fac8bc106e661d349203e51ffac56b0d24089bb08e5360f49"}, 0xec) sendfile(r1, r3, 0x0, 0x50000000000443) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)={0x2, 0x9, 0xf5, 0x3, 0x2a, 0x0, 0x70bd28, 0x25dfdbff, [@sadb_x_sec_ctx={0x3, 0x18, 0x0, 0x81, 0xd4, "8cbba26f76dfe813f11e33f4b1aa63a307ed20dddf53610d8cc107c327f26d5a47c6e13045b3531f8c3633a9dbe61f36745ee1201e9389b8135e54dcce0e2044e93c0495fbb7fd288b11fe01d7efdea8ef8c86508637508eb65d802fa8297e398c301e249d73c9a0b6191a6cf956bfcf313acbbf526b02696251ca1b796ef4999dd62b2a26e94e785da33c45f94bf126716b9d5febfd2f912bd4197e2e0e2f79dda27169373c2d89c1e8491d80800275750e1d9d62b90cfc0e5bd1316d6f91b3e6c413c1df75ea77769183d66c02229f720d48fe"}, @sadb_ident={0x0, 0xb, 0x3dd0, 0x0, 0xffffffff00000000}, @sadb_x_nat_t_type={0x0, 0x14, 0x2}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e20, @rand_addr=0x6}, @in6={0xa, 0x4e21, 0x3fe, @ipv4={[], [], @remote}, 0x7fff}}]}, 0x150}}, 0x42011) 03:34:19 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r6, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) getsockname$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x18840) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) accept4$bt_l2cap(r2, 0x0, &(0x7f0000000480), 0x37bf10532199a68f) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/qat_adf_ctl\x00', 0x202, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xe}}, 0xffffffffffffffe0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r7, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r8, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r8, &(0x7f00000008c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66baf507983f5a161d67175b71b352aa0c17d788415b9a555cc482a79d00d5c3a711", 0x6d, 0xc00004f, 0x0, 0x0) sendfile(r2, r8, 0x0, 0x50020000400444) r9 = socket$inet6(0xa, 0x6, 0x7d) sendmmsg(r9, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xfffffdb0, &(0x7f0000000940)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r13 = socket$inet6(0xa, 0x3, 0x3) getsockopt$sock_timeval(r13, 0x1, 0x14, &(0x7f0000000540), &(0x7f0000000580)=0x10) sendmsg$nfc_llcp(r11, &(0x7f0000000500)={&(0x7f00000000c0)={0x27, 0x1, 0x2, 0x3, 0x94, 0x1, "677fe81dbdd1db2c125ed0980f06b933d1fdfbeccd93067491eee1e613696a31d12811a88153946cbb8e1eb426724d631fc2c072a101d57398261ae98b8603", 0x17}, 0x60, &(0x7f0000000400)=[{&(0x7f0000000140)="3e6e4dbea810df2d491ec98847abbc1c847d35e4f87149d837dff3a14b7ab0e8b96f226f7d42162e9fcbc7c968a822c2ef5e2325a6bba3", 0x37}, {&(0x7f0000000180)="a80b94bb80d3986d1a959523", 0xc}, {&(0x7f00000002c0)="c1145122867ed6ca5908b382833beb6770311aeeeffdea3fe8d4b2777c26a362e6963cf8460b8c81143f81c634b3cc455f84f2c453c3769149a37bd015b9f4d334a92620afe5ae7f3a1063eb23d7812ebc74a784a2edfcc63934277a9f5b89ff04b453b6cda724690fb75e5212f5fb452b89eeeeffe31520c83b33ab03da19dcda0a6d25a3772e53fcf4380394748e84ec0622dbdb9ceb056427f7ff0230bd17db26f1ae0b856de2d3d36e2930b4278411615b989c39163d22cc8820028af31088893e1eb49781745365f2bea58d2c57c81199b17c5c0f83429741baf9c13c5dd99a", 0xe2}, {&(0x7f0000000200)}, {&(0x7f00000003c0)="7801cc20c243cbb58caa683f6f2e0f66fe433c1e85485579516c5ad9c430f5f1a3c772", 0x23}], 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="700000000000000009000000120200009bbf56ace064088147f46716679a0879d2819c0817ced6193b19fb6e8bd52dc4866c1406d5ae79ee7eac81b81b386890bb1a7c6db0020083577cd48d5b570fca06e082c69d1dbbafb2f77210d84c20ca8c39ed8a220a9a00cb1b3a830d65050db8bd7767a0141e6a3898317856"], 0x70, 0x1010}, 0x4000000) close(r9) 03:34:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r5, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0xa755e0cfa4c0c1ed}, 0x1) r7 = socket$alg(0x26, 0x5, 0x0) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f00000002c0)) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) 03:34:19 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) io_setup(0xd, &(0x7f00000000c0)=0x0) preadv(r6, &(0x7f0000000180)=[{&(0x7f0000000040)=""/41, 0x29}], 0x1, 0x0) io_submit(r7, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x60ffffffffff, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000001c0)="10000000000000000086770000000000", 0x10}]) io_cancel(r7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x7, 0xffffffffffffffff, &(0x7f0000000100)="3e73dda28f0ce72f1a518a6c6f02766729301ce53c2619592974f495bfc3c53c78a797ff2aecc7dc75325cd06683c32e065e80bd50cdebf1dcfff6cddcf2cd909300633c6116a42ae83528207e2bcf74c38da913a3817d90df984699a3bfbd05e8ac70a6ad280acf251ebb6ec55f1d5770a4ccb88bdc6602494ac8", 0x7b, 0x5, 0x0, 0x5, r1}, &(0x7f00000001c0)) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) signalfd(r5, &(0x7f0000000040)={0x6}, 0x8) r8 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:19 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x80000) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x9, 0x400) ioctl$USBDEVFS_REAPURB(r2, 0x4008550c, &(0x7f00000001c0)) accept4(r1, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3, 0x1000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="69b9d5ced7b268819995fa81e7febb9ff97d184692f4c8c8e0beb89e54769c10abd402b5a5f7f8febb978b2de8b9dd46555cdc051f19eeba25b25f7c6a8739cbac40526b32a55c02289e223b17b2f65f0adc5ff9ae3e1225c9c639607b1e4e17bb46af8f6ea441a7e0cded93e65f2182d8bc46b58f5a5dadfc48c0ebb5ae7e1d1682a6ab57a2adc66dd951275faeda0d09720568e3568570f9bfe976d56eb575f7be339832cc42ce44d000ad857fc52e75491c3a378eaacbace932d497ca71d56bd35572b85e6202f465d83a8fef9043bd26866a810c24966c145686f3bb553aa2d00b559f783a4779a6b51a65c73febefa6e33fdb", 0xf5) close(r0) [ 554.964737] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r4 = dup(r3) write$P9_RSYMLINK(r4, &(0x7f0000000080)={0x14, 0x11, 0x2, {0x2, 0x0, 0x6}}, 0x14) 03:34:20 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'vlan0\x00', 0x2000}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x20800) fcntl$notify(r1, 0x402, 0x28) close(r0) r2 = dup2(r0, r0) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f0000000040)={0x10}) 03:34:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x20001) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) [ 555.128756] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 555.139382] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) [ 555.186774] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 555.195101] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:20 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x3, r5, 0x0) keyctl$revoke(0x3, r5) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:20 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0x0) [ 555.265521] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 555.276095] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x2, 0x0, &(0x7f0000000100)={0x0, 0x32, 0xfc, 0x1}, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0}) close(0xffffffffffffffff) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000400)={r5, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000000)={r5, @in={{0x2, 0x4e23, @multicast2}}, 0x1, 0x1, 0x3, 0x5, 0x8}, &(0x7f00000000c0)=0x98) 03:34:20 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=@newtaction={0xd0, 0x30, 0x4, 0x70bd25, 0x25dfdbfc, {}, [{0xbc, 0x1, @m_gact={0xb8, 0x5, {{0xc, 0x1, 'gact\x00'}, {0x1c, 0x2, [@TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1721, 0x20000000}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x58f, 0x15}}]}, {0x88, 0x6, "7e94c71f0a56a3ff135cf4327b0160023fa940efa509a0f172c81da78b391ef9686d4929de128ea8cc55ccfb3928829f0a8d403c556e903c09d138225431a03a547d9fd48a0140287c1600a0f999d53f05691be1a723a4452c05d191e6f9d1c278fb2f383e2febf28e82dd411ecbcd98417e7e09d4445034a407f5c6ba4fdda1d3ef7e"}}}}]}, 0xd0}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x800, 0x70bd2a, 0x25dfdbff, {0x0, r10, {0x0, 0xb}, {0xf, 0xd79384f6cd705a5b}, {0xfff1, 0xc}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0xd2251cbcf121428c) 03:34:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) write$selinux_attr(r3, &(0x7f00000000c0)='system_u:object_r:netcontrol_device_t:s0\x00', 0x29) 03:34:20 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='auxv\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400203) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r7 = openat$cgroup_ro(r6, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r8, &(0x7f0000001b00)=[{{&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @loopback}, 0x1, 0x4, 0x4, 0x1}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000a00)="1dcc7d277ebe15d74e05e3abcb96060e620496c0404fc59da80b9eb38891a77b901995fcdfc1a8117a6c819dd610aa8af07fc8c067a0897bfeb28168314f826b9bf4b30d1c9cc00d496c184ace3fa7b0e0a81ad26e413708935c2779ccefe6c854014c1163f3bc928d15173f1f3034811e73b6a480514f4a4be09bd13824ee998129a87ef006", 0x86}, {&(0x7f0000000ac0)="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", 0x1000}], 0x2}}], 0x1, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000400)=0xc) r10 = geteuid() setreuid(r10, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/autofs\x00', 0x42002, 0x0) r11 = geteuid() mount$9p_virtio(&(0x7f0000000040)='\x00', &(0x7f0000000080)='./bus\x00', &(0x7f00000001c0)='9p\x00', 0x800000, &(0x7f0000001b80)=ANY=[@ANYBLOB="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", @ANYRESDEC=r9, @ANYBLOB="a27569643e", @ANYRESDEC=r10, @ANYBLOB="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", @ANYRESDEC=r11, @ANYBLOB="2c6673636f6e746578743d73797361646d5f752c646f6e745f684773682c00ff2c89059462db0c049072a6fbede24e2aabc001e9072868647dcc25d338cc29286c568a6abe88faa9f0f645d768c9c06a56cbc74bd4e055f4446a75b6b2bcd5b3a0aab9ad7b97e1e7a1e1bdb40361af2b2a3afaec"]) preadv(r7, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:20 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./bus\x00', 0xc4fe17c105c1b3a2, 0xa4) mmap(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x8, 0x12, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 555.582773] 9pnet_virtio: no channels available for device [ 555.596192] 9pnet_virtio: no channels available for device 03:34:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x65a043, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="30020000", @ANYRES16=r6, @ANYBLOB="000326bd7000fbdbdf2514000000980001000800030042000000100001007564703a73797a30001400010002004e24ac1414bb0000000000000000200002000a004e2000000001fe52abc6f1a7de408ae7eb4b880000000000000000000000000001030000000800030064703a73797a32000000002c0004001400010002004e20ac14141400000000000000001400020002004e23ac1414aa00000000000000001c00020008000200280c104b0400040008000100830d0000040004003c000100380004001400010002004e21ac1e00010000000000000000200002000a004e23000003ffff020000000000000000000000000001000400002400050008000100657468000800010069620000080001006962000008000100756470008c000500080001007564700044000200080004001f00000008000200ff07000008000100070000000800030003000000080001001e00000008000300010000800800010004000000080001000600000008000100696200002c000200080001000500000008000200090000000800040001800000080001001f000000080002000500000008000100756470000c00020008000100060000004000010008000300ffffffff08000300030000002c00020008000200ff010000080004000900000013000300080000000800030003000000080001000d000000300006000400020008000100400000000400020008000100000000000400020004000200080001000100000004000200"/558], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) bind$unix(r4, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:20 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x41842, 0x10) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x1d) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$TUNSETLINK(r5, 0x400454cd, 0x313) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r7 = openat$cgroup_ro(r6, &(0x7f0000000080)='mem\x00aC.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r7, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$BLKRESETZONE(r8, 0x40101283, &(0x7f0000000040)={0x4, 0x3f}) 03:34:20 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3d0c, 0x2000) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = geteuid() setreuid(r4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) r6 = geteuid() setreuid(r6, 0x0) write$P9_RSTATu(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYRES32=0xee00, @ANYRES32=r5, @ANYRES32=r6], 0x445) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$nl_route(0x10, 0x3, 0x0) splice(r7, 0x0, r9, 0x0, 0xffff, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000500)='/uc\x00\x00\x00\x00\x06\x00\x00\x00\x00\x02\x00', 0x0, 0x0) recvfrom$netrom(r12, &(0x7f0000000680)=""/140, 0x8c, 0x40000000, &(0x7f0000000600)={{0x3, @null, 0x1}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r13, 0x0, 0x50000000000443) sendmsg$unix(r13, &(0x7f0000000200)={&(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000480)="ec23a472c0283ff5570e4dac69b3347e206819d2a53bda33026396631fd53c54848ee2b408566691dc25b97ca471d7cd4c026f4384e3c67aaeef56aca51a77927649d5f5c14481577ffad259a11c8873cbfcccdd95cd11574d2c8eb25fc6094f17ae551483cb929fb3691167c4f5dbbc4b5b7c1b", 0x74}], 0x1, 0x0, 0x0, 0x80}, 0x4004004) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r15 = socket$inet6(0xa, 0x2, 0x0) io_setup(0xefb9, &(0x7f0000000100)) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:21 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000040)={0x3}) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000300)=ANY=[@ANYBLOB="7c2bd7008000002c19310b96ced837000000", @ANYRES16=r5, @ANYBLOB="01000000000000000000090000003800030008000400000000001400020069726c616e3000000000000000000000080001000000000008000300000000000800070000000000"], 0x4c}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x120, r5, 0x30, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffe}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x290}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x26}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x5ee80fd23b97c647}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x89}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x500000}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x8000}, 0x40) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:21 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x205d2f90c7f67953, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0xff, 0x4) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x20}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) 03:34:21 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x1f8, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xdf, 0xa0000) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0xd) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) bind$alg(r6, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(xeta)\x00'}, 0x58) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$TIOCGSOFTCAR(r8, 0x5419, &(0x7f0000000080)) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r9, 0x0, 0x50000000000443) 03:34:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') prctl$PR_GET_NO_NEW_PRIVS(0x27) sendfile(r1, r2, 0x0, 0x50000000000443) [ 556.751607] kauditd_printk_skb: 30 callbacks suppressed [ 556.751618] audit: type=1804 audit(2000000061.690:376): pid=23264 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/706/bus" dev="sda1" ino=16691 res=1 03:34:21 executing program 4: ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000200)=""/17) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x800) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r2, 0x2, 0x7, 0x1, 0x400}) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r6 = openat$cgroup_ro(r5, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r6, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 556.786778] audit: type=1804 audit(2000000061.690:377): pid=23290 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/706/bus" dev="sda1" ino=16691 res=1 [ 556.840282] audit: type=1804 audit(2000000061.770:378): pid=23294 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/707/bus" dev="sda1" ino=16691 res=1 [ 556.867846] audit: type=1804 audit(2000000061.780:379): pid=23294 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/707/bus" dev="sda1" ino=16691 res=1 03:34:21 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') connect$ax25(r2, &(0x7f0000000040)={{0x3, @bcast, 0x2}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$sock_ax25_SIOCADDRT(r5, 0x890b, &(0x7f0000000400)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1f, [@default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @default, @bcast, @bcast]}) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000200)={0x0, 0x1, 0x81, 0x9}) r7 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r7, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000001c0)=0x100000000) [ 556.895485] audit: type=1804 audit(2000000061.780:380): pid=23294 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/707/bus" dev="sda1" ino=16691 res=1 03:34:21 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x4) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 556.936834] audit: type=1804 audit(2000000061.870:381): pid=23297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/708/bus" dev="sda1" ino=16691 res=1 03:34:21 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xfffd, 0x3) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="290000002000190000003effdfff00e80001040000040d0014", 0x19}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYRESDEC], 0x12) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x1, 0x2) accept4(r5, &(0x7f0000000a00)=@xdp, &(0x7f0000000a80)=0x80, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_LOCK(r6, 0x4008642a, &(0x7f0000000240)={r7, 0x18}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000009c0)={r7, 0x4, &(0x7f00000000c0)=[0x8, 0x1, 0x81, 0x400], &(0x7f0000000100)=[0x1, 0xffffffff, 0x40008000], 0x2, 0x4, 0x0, &(0x7f0000000140)=[0x400, 0x10001, 0xd5e4, 0xffffffff], &(0x7f0000000980)=[0x8]}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/1956], 0x794) 03:34:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 03:34:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x100000001, 0x28083) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {0x20}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x1}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) close(r1) [ 557.138446] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 557.147560] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_interrupt={0x1, {0xa, 0x1}, 0x3ff, 0x80, &(0x7f00000002c0)="5413ac7c821d4a94638a474901326b986dfb6baf438009d2d21d6edfd2d1d2083738aad44bc24cb49722438100446b5b328533d777c95d291e4a73a012dff89a9095f02d3d98da4519234466abb5dc5effd18bc70074549104e5f65fe24dd5f3c115b5da93741b718dbe53b1edc09d37a7d943da8dac5e5d12672c9848c90fb52a79984a5e0082cdb8e8886ca274ed8c80b2b4b35914d73dcf3d0495a9a46636bfb55ee59280541709ce81cbb24b1b4dbb52b58f032766dc70aacfbe80b3c2c4ce0111eb672a64400a6195", 0xcb, 0x5fffffff, 0x1, 0x0, 0x6, 0x0, &(0x7f0000000140)="1cae4d7178900c1097f55afac004751a77b8691c350a21aa58a3cd78280c2eca6c2e7b3b1877deecc75cc0ac6d1006cdd1bbb25aacc7d113cd9b3f74fac024e8fc2a"}) close(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x40000, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000400)={r4, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={r4, 0x7, 0x1, [0xffcc]}, 0xa) r5 = creat(&(0x7f0000000040)='./file0\x00', 0xa0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) vmsplice(r5, &(0x7f00000003c0)=[{&(0x7f0000000880)="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", 0x1000}, {&(0x7f00000004c0)="8ef7444f85943b050afa6d1586f15f5a1be295cb0edb16c6e30b13b7353f53df2fc435d9fe564844dc4ea773f2203b9a566603da781c92a99750ecba5f3fca0d077e86a0b09c2ccae2ffdbc69a2977404ab9b3e738170555419ad065320a2189077d46eee0a2599381153ff017352f631e", 0x71}], 0x2, 0x1) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$VIDIOC_ENUMINPUT(r8, 0xc050561a, &(0x7f0000000080)={0x9, "91d63a928a4fd0f7458f88fad10bb315b608a322ae6fb6bf00230fef28287e94", 0x0, 0x1ff, 0x4, 0x1100, 0x10, 0x2}) 03:34:22 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="341f3136e8a7f09fa860e1079207de4ea330bb7885e0e84731", 0x19) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x20410, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x5, 0x5, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x100000000}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = eventfd2(0x0, 0x0) dup(r4) fcntl$setpipe(r3, 0x407, 0x0) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, 0x0, 0x0) listen(r5, 0xfc0004) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x0, 0x10}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000100)=@v2={0x2, @aes256, 0x3, [], "ddd9742c88ebcca31d6aaa992341adc5"}) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0xffffff98) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000080), 0x4) sendfile(r8, r9, 0x0, 0x50000000000443) [ 557.728954] audit: type=1804 audit(2000000062.660:382): pid=23302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/708/bus" dev="sda1" ino=16691 res=1 03:34:22 executing program 4: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x220682) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000200)={0x9, 0x7, 0x1ff800, 0x6, 0x9, "7878bd6290aa3ed2606c27a4e9fddb44fb0a11", 0x8001, 0x4fdb}) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$RTC_RD_TIME(r5, 0x80247009, &(0x7f0000000040)) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') openat$cgroup_ro(r6, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) [ 557.755846] audit: type=1804 audit(2000000062.680:383): pid=23337 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/708/bus" dev="sda1" ino=16691 res=1 03:34:22 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x189280, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000001bc0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000002140)=[{0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff7fe]}], r5, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r5, 0xcf7e77dc90f34735}}, 0x18) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r3, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$cgroup_ro(r6, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r13, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r15 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r13, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r15, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) setsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000140)={r16, @broadcast, @dev={0xac, 0x14, 0x14, 0xa}}, 0xc) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:22 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') openat$cgroup_ro(r3, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/125}, {&(0x7f00000001c0)=""/89}, {&(0x7f0000000400)=""/86}, {&(0x7f0000000480)=""/157}], 0x1000000000000093, 0x2000107c) 03:34:22 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = gettid() tkill(r3, 0x2d) [ 557.846249] audit: type=1804 audit(2000000062.780:384): pid=23342 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/709/bus" dev="sda1" ino=16610 res=1 [ 557.944834] audit: type=1804 audit(2000000062.880:385): pid=23353 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/710/bus" dev="sda1" ino=16755 res=1 [ 557.979345] selinux_nlmsg_perm: 128 callbacks suppressed 03:34:22 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 557.979353] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 [ 558.000735] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 [ 558.022941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 [ 558.036367] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 [ 558.052931] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 03:34:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_bulk={0x3, {0xd, 0x1}, 0x0, 0x501594eea9e2724f, &(0x7f0000000000)="d96f1bc64f8624ff611097471755ced69ba5fa900560827dba586ab756d8d4c67c7ba7605618dc17e3a645a7eea015a86cafabeaabd76c63c3af5d5bdf95f70749b7d8d2782987c759f35d697aff2c45cd0d73e148d6cf25ff995c277543df95e22e50c9e54aa71d4409ee7b04d9def4845d79d4b447aed678ced13cd9d0b344e074", 0x82, 0xffff, 0x499, 0x0, 0x101, 0x9, &(0x7f0000000140)="a7770780312a3b5c6f89819dd79678f0e56de31769268ac55634e1af203f7a9aabeef22ba7eee8e32a7dd3c59a51c04fb7449f1f0ba416879678355accd5ae0018037e1c6a70af5ef22970441194e24c508ea7421248ae30500432697c90b21f399f51332bce6e391fdc769af1a6957f5cb272"}) close(r0) r1 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r1, 0x0) r2 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000340)=""/159) [ 558.088124] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 [ 558.110797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 03:34:23 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8, 0x5, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff7ffff, 0x0, @perf_bp={0x0}, 0x1}, r0, 0x9, r3, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) [ 558.126893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 [ 558.148109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 03:34:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x4, 0x1}, 0x401, 0x1, &(0x7f0000000040)="75e4b8a1", 0x4, 0x0, 0x80, 0x5, 0x80000000, 0x808, &(0x7f0000000080)="60547f66df5d2ede14e005701872f7ca4c08c8303fbca68a09ad2ea6997964ef236f86b5ed33c4dc98c3cc709f49c81816c364b9cab25472e1e195d3eb23df1f2142a6b0db962c8f191bca5083dd9ece5ec528f1702d0e3c", [{0x1, 0xfff}, {0x8, 0xfffffffb, 0x6}, {0x0, 0x8, 0x80}, {0x10001, 0xc2cb, 0xf86c}, {0x5, 0xff, 0x1}]}) close(r0) 03:34:23 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES32=r1], @ANYRESDEC=r3, @ANYRESHEX=0x0, @ANYBLOB="974f93a1586ddae943b9146b22d8291b59dffd5921263c31c153c2ed0b738d7c5a1d2d1fdf046230591cb5c7a7d9fb0c40be7a8bc60fc7c31db57ce185787003e8d53be3339097d8f28fcd47d51a489c4a2cf6a16c33c1fbdb847adc327478ce5b4a33bd398d69c46abfbdb81f9e00507e3048730b65d79176f200f38157851538de4a2206659a5b308fde00e9de29284c"], 0xbf) [ 558.180010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23351 comm=syz-executor.0 03:34:23 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0xffffffffffffffda, 0x7, {0x7}}, 0x18) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) getegid() ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0xffffffff, 0x0, &(0x7f0000000100)={0xc801aa73d3c0543, 0x3}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)) close(r1) 03:34:23 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:23 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x37b4) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r5, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)=0x100) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:23 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x101000, 0x0) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r6, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r7, 0x10, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x100}, 0x4000043) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/0\x1e#\x00', 0x6, 0x204203) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000140)=""/239) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000001440)=@urb_type_iso={0x0, {0xd, 0x1}, 0x81, 0xc0, &(0x7f0000001380)="8bef697d68b7cfdd501ae3077d1192fae9772c3b362001b906c545413d2eabec175e8d0d926b2357ad6bdfb9449de99c69125c5de6d13a757a8f323426097cc192bca0f51437dcdd12064a3566784da1ceb749a2a48a2b42964f2543bd1bf62d564016905b87fbdfdca569cc79728af199cb37c1caf0d0ca15cd61579702ed43752eaa51136b9fd76da754558c1fe5be5d3bc55a", 0x94, 0x139, 0x8, 0x7b, 0x6, 0x3, &(0x7f0000000080)="f473a8011f0185451687ccf59122a4fca5f2aa5a1504b0e217d3dd55b73f542060d338d866d8f36c4c3c64d5ff092c0112ef78a5533bc1579e", [{0x3, 0x4, 0xff}, {0xe000000, 0x1, 0x40}, {0x0, 0x7, 0x800}, {0xffffffff, 0x200, 0x8}, {0x552, 0xda, 0x1000}, {0x20, 0x8, 0x7fff}, {0x0, 0x5, 0xc59}, {0x81, 0x7, 0x1}, {0xfffffffd, 0xb91, 0x40}, {0x4a70effc, 0x63, 0x32f}, {0x9, 0xffffffc1, 0x9}, {0x5, 0x5, 0x80000001}, {0xffffffff, 0x0, 0x8}, {0xb, 0x1000000, 0x101}, {0x1, 0x7ff, 0x8}, {0xe7, 0x5, 0x3}, {0x1, 0x2, 0x7}, {0x80, 0x7f, 0x1}, {0x5, 0xff, 0x7b}, {0x800, 0x6, 0x5}, {0x9, 0x6, 0x23fe1306}, {0x2, 0x93, 0x81}, {0x8000, 0xff, 0x1}, {0x7, 0x7fff, 0x4}, {0xffffffff, 0x6, 0x5}, {0x514, 0x2, 0x4}, {0xfffff5ac, 0x2, 0x7f}, {0x10001, 0x8, 0x8000}, {0xa, 0xfffffffa, 0x5}, {0x3, 0x6}, {0x7, 0x80, 0x3831}, {0x10000, 0x80}, {0x35e, 0x7fff, 0x4}, {0x19, 0x9, 0xed}, {0x1, 0x200, 0x7}, {0x81, 0x7fffffff, 0x32d8}, {0x101, 0x755efbf8, 0xbbd}, {0xff, 0x3999404e, 0x401}, {0x0, 0x7, 0x9}, {0x1, 0x1f, 0x7}, {0xffffffff, 0x8, 0x400}, {0x541, 0x1, 0x7}, {0x8000, 0x9, 0x101}, {0x0, 0x80, 0x1}, {0x6, 0x4, 0xed}, {0x97, 0x0, 0x1f}, {0x7ff, 0x1}, {0x5, 0x100, 0x3}, {0x80000001, 0xffffff00, 0x87f}, {0x3, 0x100, 0x400}, {0x8, 0x81, 0x6}, {0x828, 0x5, 0x40}, {0x0, 0x3000, 0x3bb}, {0xffffffff, 0x1}, {0xd82, 0xff}, {0x9, 0x56, 0x10000}, {0x10200000, 0xffffffff, 0x2e}, {0x80000001, 0x0, 0x7}, {0x7, 0x9, 0x1}, {0x5a, 0x80000001, 0x8001}, {0x2, 0x4, 0x8}, {0xada, 0x1ff, 0xa01}, {0xffff8000, 0x3, 0x6}, {0x2, 0x20, 0x3}, {0x54be, 0x7a9, 0x1}, {0x6, 0x5, 0x2eb7b569}, {0x1, 0x1e1e00, 0x1}, {0x1000, 0xfffffffa, 0x6}, {0xfffffe01, 0x1000, 0x8}, {0x8, 0x7, 0x10000}, {0x5, 0xfffffffe, 0x7fffffff}, {0x4, 0x4, 0x4}, {0x0, 0x0, 0x7}, {0x1000, 0x9ced, 0x1}, {0x7f, 0xffff, 0x8}, {0x600, 0x200, 0x2}, {0x1000, 0x1, 0x80200000}, {0x80000001, 0x7ff, 0xd5e5}, {0x5, 0x1, 0x800}, {0x6457, 0x6, 0x8000}, {0x5, 0x10001, 0x7fca4cfa}, {0x2, 0x4, 0x88}, {0x5, 0x2, 0x8}, {0x8, 0x4, 0xfffff03b}, {0xffff, 0x6, 0x8ac}, {0x4, 0x4}, {0x7, 0x1, 0x91d4}, {0x6, 0x0, 0xfc}, {0x6, 0xca, 0x6}, {0x36, 0xc5f9, 0xfffffffb}, {0xba, 0x1, 0xef5e}, {0x6, 0x5373, 0xfffffff8}, {0x5ef, 0x5, 0xfff}, {0x0, 0x2}, {0x2cd7, 0x5, 0x8}, {0x4, 0x1, 0x3}, {0x8, 0x400, 0x3}, {0x6, 0x7fff, 0x6}, {0x0, 0x20003600, 0x8}, {0x7fff, 0x0, 0x80}, {0x40, 0x7ff, 0x335}, {0x5, 0x9, 0x80000000}, {0x8001, 0x3, 0x9}, {0x247, 0x0, 0x1}, {0x3, 0x4, 0x3}, {0x0, 0x2, 0xfffffff8}, {0x4, 0x3, 0x2}, {0x20, 0x5, 0xfffffffc}, {0x27, 0x2, 0x6}, {0x4, 0x0, 0xffffffff}, {0x24, 0x5, 0xffffffc0}, {0x1, 0x7, 0x98f}, {0xdab4fd8, 0x8, 0x1f}, {0x0, 0x18b3, 0xfffffff8}, {0x7fc, 0x6}, {0xffff, 0xad6, 0x2}, {0xc5, 0xfffffffd, 0x8}, {0x20, 0x24000000, 0x40}, {0x4000, 0x400}, {0x80, 0x84, 0x7ff}, {0x2, 0xf, 0x80000000}, {0x0, 0xfffffff8, 0x78}, {0xffffffed, 0x4}]}) close(r0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r5, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 03:34:23 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$CAPI_NCCI_GETUNIT(r3, 0x80044327, &(0x7f00000001c0)=0x34c) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r4, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000040)=ANY=[@ANYBLOB="0200700088811b150c20b7bf9623c79f27b171c7309ddb667d807dee3fa6c584001b6be95ce052740b7bb7aede7cc4e180cd697a7b5dc2b286fd1f79b1891f18bdec68692e3bfe126268b1621f9527b3781bf9c7239d8dc2d3d159ae47ca71ef31bceedd5f429342358d8583"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r10, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) read(r8, &(0x7f0000000400)=""/137, 0x89) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r12 = openat$cgroup_ro(r11, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r12, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:23 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x101000, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000400)={r5, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000480)={r5, 0x1000, "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"}, &(0x7f0000000200)=0x1008) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000001580)={0x0, @bt={0x1ff, 0x2, 0x1, 0x2, 0x9464, 0x4992, 0x5, 0x0, 0x5, 0x8, 0x10000004, 0x9, 0x111, 0x70, 0xd85cc7e9a20b9fda, 0x10}}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x8, 0x4, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd60f71e2886b8251}, r0, 0x4, 0xffffffffffffffff, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_ifreq(r6, 0x8916, &(0x7f00000000c0)={'ip6tnl0\x00', @ifru_flags=0x4000}) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = semget$private(0x0, 0x351b3599425a71fc, 0x0) semctl$GETNCNT(r8, 0x0, 0xe, &(0x7f0000000380)=""/247) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') accept$alg(0xffffffffffffffff, 0x0, 0x0) sendfile(r7, r9, 0x0, 0x50000000000443) 03:34:24 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) preadv(r6, &(0x7f0000000300), 0x0, 0x25) getsockname$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) ioctl$MON_IOCX_GET(r9, 0x40189206, &(0x7f0000000200)={&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000140)=""/26, 0x1a}) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) write$cgroup_type(r10, &(0x7f0000000340)='threaded\x00', 0x9) 03:34:24 executing program 3: lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'user.', 'cgroupvboxnet1#!{\x00'}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:24 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x63, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) 03:34:24 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4860, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x4, 0x40, 0x47, 0x9}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x3}, 0x8) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$llc_int(r0, 0x10c, 0xa, &(0x7f0000000200)=0x10000, 0x4) socketpair(0x8, 0xe350b5b91de3690a, 0x5, &(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) membarrier(0x4, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000840)={0x4c, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8}]}]}, 0x4c}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x3f1d4ccca5c04e17}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r6, @ANYBLOB="20002cbd7000ffdbdf25010000000800040009000000080005000700000008000600000000007c00030008000400ffff000014000600ff01000000000002000000000000000114000200931c7fa3355489540000000000000000088d07004e200000659b0400ffff0000080004000900000014000600fe8000000000000000000000000000bb1400020076657468305fb92aca5ae82bf0eb7f6a74b45f6272696467650008000100020000007b2ee2b59751ca86e8054d253681e8285407ac1643e14e46e8198d1ab07947fb388ab4fd399ceee6a364b7821431"], 0xa8}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000804) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000001c0)={0x4, 0x40000ff, 0xfffffffa, 0x7, 0xfffff85b}) close(r2) open(&(0x7f0000000440)='./file0\x00', 0x2000, 0x80) 03:34:24 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140), 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r7 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)={0x4c, r7, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x100000001}]}, 0x4c}, 0x1, 0x0, 0x0, 0xb19e8b65a03c809}, 0x44224c56e855d4da) sendmsg$NBD_CMD_STATUS(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, r7, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6b2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffffffe}]}, 0x50}, 0x1, 0x0, 0x0, 0x400}, 0x4008000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r9 = openat$cgroup_ro(r8, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r9, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 559.590798] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 559.617363] IPVS: Unknown mcast interface: irlan0 03:34:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x20100) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000040)) [ 559.636420] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 559.642225] IPVS: Unknown mcast interface: irlan0 [ 559.680665] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = eventfd2(0x0, 0x40000) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='personality\x00') r5 = accept$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x1c) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x10000}) r6 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet_smc(0x2b, 0x1, 0x0) r7 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r7, 0x1, &(0x7f0000f00f88)) msgsnd(r7, &(0x7f0000000680)=ANY=[@ANYBLOB='*'], 0x1, 0x0) msgrcv(r7, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r7, 0x1, &(0x7f00000003c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe430}) msgctl$IPC_INFO(r7, 0x3, &(0x7f0000000140)=""/148) close(r6) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) [ 559.696425] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 559.755801] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:24 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000400)={r3, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e24, @empty}}}, &(0x7f0000000180)=0x84) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) fcntl$getown(r8, 0x9) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) getsockopt$ARPT_SO_GET_ENTRIES(r14, 0x0, 0x61, &(0x7f00000004c0)={'filter\x00', 0x44, "17133e6e6373d8b675eb985b15c2e0f1b311f4003e6dd25b2fbd0b42f1b892d88aa2190ad078062fb5a4222b8191f876bc143b56439de74794ccc6a20082b0089f810173"}, &(0x7f0000000340)=0x68) sendfile(r10, r11, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r15 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r10, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r15, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r4, 0x1}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r10, 0x84, 0x13, &(0x7f00000002c0)={r16, 0x1}, &(0x7f0000000300)=0x8) r17 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r17, 0x0, 0x50000000000443) 03:34:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100)={0x4}, 0x8, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0}) close(r0) [ 559.906431] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) splice(r0, &(0x7f0000000080), r3, &(0x7f00000000c0), 0x48, 0x4) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r4, 0x80045505, &(0x7f0000000040)=0x9e2) [ 559.972863] vhci_hcd: default hub control req: 0400 v0000 i0000 l0 03:34:25 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r6, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r10, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r14 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r12, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r14, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r15, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYRESDEC=r6, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYBLOB="964aef2ce1f684175792f413895517fa47bf8d2a57b29fac3c1a706061071b34188585b11ca9d7d39ebfc8f9c9585f842aa69dc189f7395443d258f7760d217d1f0424640d9fb3492d0bfec59b00bdc0d7f74eb7c3dad507253a72e21400ed18"], @ANYRESDEC, @ANYRESHEX=0x0, @ANYRESHEX=r4, @ANYRES16=r15, @ANYBLOB="e9d8dca855efa3a553e6f8b04bdd698bf8fc3fb3a9f292e9c2954e4fe2144e95583187908ab20cad95506da669f857c7db27833900c147d42804b43a288db2e732e8267699391f449136efe406dc42695846f4d8537bae17f0c1ba38fda4f53b599dc05a59d814cf4f65f1e9e5440974eb7ba9034a6758ba845151114d8d0a5c59a381a6f12753b305ec42b4408859c55d141c8322b54e7bc4088ee49b866c50570756022779a0c9d0f702cbf581095bb516ddce3dfb561271d32044ad3a1e0d934fabac987422ec6218e143", @ANYBLOB="471ce1983e914662fb81fb0fb7c5119e1b13bd5f64661e155cc3a2353847533b3c1241573ba41fa0fa6efdfa3aadfb5a050481b8f4da2f00cf0c0be2dd99943d22112a1ce13545ad99fdb6c4ca4e94d28dc3e52d0075bf4f7d108fc08152da45dcad222622728837c362c27cf27e71f5"], 0x10966153) [ 560.025079] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000100)={0x2, 0x4, [{0xfffffffe, 0x0, 0xc1a}, {0x0, 0x0, 0x5}]}) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:25 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) writev(0xffffffffffffffff, &(0x7f0000000100), 0x100000000000024f) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x9, [0x0, 0x7ff, 0x0, 0x3, 0x1, 0x1, 0x4, 0xff, 0x2]}, &(0x7f0000000080)=0x16) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0xe09, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:25 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$TIOCLINUX2(r8, 0x541c, &(0x7f0000000080)={0x2, 0x4, 0x800, 0x7650, 0x6, 0x6dd0}) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000400)=0x0) r10 = getuid() r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) getresuid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)=0x0) sendmsg$netlink(r1, &(0x7f0000002e40)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb, 0x44000}, 0xc, &(0x7f0000002dc0)=[{&(0x7f0000002e80)=ANY=[@ANYBLOB="18000000100600000000ff0000011896ddc7df250802000000000000ef6cb1da3446e1eb017c3a541d36897644ac28399945b28465d87240e466b3eb00"], 0x18}, {&(0x7f00000001c0)=ANY=[@ANYBLOB="38000000110008002bbd7000ffdbdf250d32ddac5a495d925f4c84408dc8e62706b3bbf8c1732d86057ed7b04908f5b10000"], 0x38}, {&(0x7f0000000200)={0x24, 0x3d, 0x0, 0x70bd26, 0x25dfdbfd, "", [@typed={0x8, 0x62, @fd=r2}, @typed={0xc, 0x37, @u64=0xa4}]}, 0x24}, {&(0x7f0000000440)={0x2580, 0x24, 0x10, 0x70bd26, 0x25dfdbfb, "", [@nested={0x1030, 0x21, [@typed={0x1c, 0x2d, @str='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00'}, @typed={0xc, 0x7c, @u64=0x9}, @typed={0x4, 0x60}, @generic="b197f6dcbdfb69973548412a1ce7978aec4a381318fbf63d162fbbc9b34a1b98d7b4fca49673cc20d666746b89eae2b93a795aa3c5e1de9f346eadf3880119dbd054349eba7991bdc544bf2fda928288d50df1818d9fda08cd591c6964d1988dfe4b4d05150ec408da7de259afbd4143e369852ae95cc9094579fca11d674bc0517dbed2c21376bd42f6831684957a0cff43e7ae1c95cfb6de590559f3138320b71cffd03bd815bc41f731819ce99f36fa224c10509038ff2d0690a96d160e6c0e3298579e7a266803987eddf0be8bed3d98253e96c516bf1d3930689097acde942658b283f526f704a4258aa97c64854fdb9b42e29d12a5bc87176bcb03035d5484aadd013215cbb781b73cf2a009ac2a545c65dbbda8fd1ffcb7e30eb6371e5b83f88eb57d78ba3b8e58f363034b49a785d6b438193da333ecdd058d3b0c41656b36c57e21957889f208dad91a224adcadbba3180679089048ae41eaeb95f17c6f83c8dded540398c9f29ff1902f0ab338441df7ae197a6bd8282738847c257a0b8d54d6bbf2ce493dcf9c37e79a918ca881ca8fdb4be45b682c47176dea39c8c94091e874e77f4e42f7b2bd491190fbd3a39e2e58f792da03766a618faa7aed7aaed4aed714a25dafff3718c4d71a38e18d46e6750d633a10ed5b9a9cd33d2b04b9a1ca80f9856feadfeca0a0f9d264d67d9c9fc14c13440a1437c82a45897230d28614080120f169365018a546a7250580cd0356eb2ce6d5e69fcc0b5ed1dd56cbdcd843cb856d6646a09108c1f1fbd338b57db95848e5359d1f78513f30a52bd0857838183ff0a15a3a7a6ea52bf36716cb447c4faee1a98aa5655c45d4e1d28a799f829daf50d273ca288176823bb4839bc4d32a6b325493a6ea0d2906bfb0dcda90c4cfefe0df43b1121a3eb69ed5ae5235b45a273cf730589d51c26ae6c0473b44209911291a9807da99f5bf46b94bcd31c27db5d86aab5c8455d70fdc48d8b9adf361d210bc5c2628a2d28de372a4973178e05a1c5a501c9f63852998f7b350595c324f59bd2672f015a9d38012b3d6369936d7de7543d20024c1b0ee63a7b875b57e8d0a758cb021676040abbf4022174c072f268113a467271254dabe5d1e4729bfeec564b2d65e57f99c69029562a1ef03e9bf9dced6383de755175386bcaba4b15dec0bc0479bdcd68f0c406eb2238aded5c6080d253d7dccfaaf9e4417fd5948073099e57d466e096f283e376536477fbdab07b58180609fd105334338183c8e65f98a47f6aa3656d18c966515f3ce6702dcbee5d1ed1e5ca322d59a2c73cb2de31944d10a72c09b9e18a2636041bd292959d75c82f2708a712ec98228ba85c5157fcb0a9decb3608b472065d067c66dccaa38e494aba4c74d9870c77b5223462a97ecf6880439f511d219c2422ba5418eb886053ddfdb4e719dc0a49b4a1e198519d627001c11b4bc849202d5116d48589181e0ed3fcbe14ebb5994eff92bef65de25b92b683e414b3567044393548df9ffb2c04d73329524a023a35fe29a7472d39f8a6f7731104b2c95f0267df7b8f66801428871e16549bfdec683ba24aacf3efd5825cb8325f2002f6b486de8862edc1639b189a440e6c6f41a10a902cded23f1a8468941519aa53ee9c0f17084739b97aac047e967fbfc5c1bdd4d0c0d58a337f85f4092494f0b38a0dfa8c37a0f8ca4ea3666b7947d71a21b03e2df6c79fbcca2850368f2c626b16446fce5f1f86a1271f4aa16ba1f3b24faf69436b64eaceeeaf6afe95b662347c2fd30ac4a8321c84493d9c6a3dbd11a550763c4b66aa9508ddfd7d59a952be98ed55ec7d3f2efc532ab56f42190055d4bb0c9723f5815eda8088f1259c5c15ff1c568da850bbf2f42588eed68d942e9b75ea0c6a4e6b72525b1631d05163753f9daf9197252e717728a9339e2ffaed34e66dcfc85c36bf4b163efd22111080001decfc253d15151a1bf4cddd8ffb05d4eb2712cd74c928fed97098241a9e95c56bcffaceb8d8bf2c8e084709769ee2bfa9565a3ce717e5bdf469c1e79733b6b0e3e672be1d460b15c35dc0c8df9ed4f4f9d39f0caaba9722130a56f27bdbba908524a629c1781b04d22e5a239f7f969e97d838a4aeb83b1091b2b01e847b5a039eec5fc38930c91bfd7150b8d7d3bbe7336c85e9064c7f3d2b7547565bc7d357a97c48ded0f4205d27f506146c95ead12485b24dd53bdf9631f5fb67f69b16b2db277363fe991fa8253ad5760f23588db44e9ae041df8b5b7469184ff3bf3052ce303e1545c6cbc63048cb18fa2d7dbef44f8139e8c290f178e9c48f56792b1a95fd3245417444ce1f12fd120dd6b9cf0fb09bf2732f60a7d09fe8e280e66b4a0e106ff26d6ff53dc61c99ea7e1cd8dbb3957731fbf2c16613f1295bbc4fede51788c1d993672c1e451270267385202eec96312fb1fd1b9d627b901fe8d295897bd85c01ea6c2e224abd5e556eeb1d6b9b1551750c00929f7d664373cdf35e32adbee07fee6832d71510592fce5a3d17d87fad255dcca04f0ff6a5f5b98b5db9d1bfa436e1d08b229396fe9f2d65e99385c763106e9dbe48ad6e842286d7bc3f40e2d4c1d47652fee0d361ad6ba8dab61c2e92e85ebd87bf0323d08bd8439f8850bf1343126e53d49900d355fd055490c90a7ba4cfdadfa9c3bd92746ba8c65b14e0ccb058e525bbb6e82bdd9fbc4dd6272d2127d6a04ec5571048896e13c5c6258d58fcbe76139630cf767686af71e1240a7aae5ddfc2405407eceb4de35c767b553c9c607d69ea0f579f5956a974c442d7412e0052b2425d3234913703953e0be8bb7e34d71727823059101afea770a09ea5d0cb136b0792d2e168f404a0792b85d40a4dbb2d10a7c47fca12a0a30788f7fbc797d4162730e6f7e053850b210e5b3dba6b58d273acd0cf75848e80579d60cc4ee178f2ae2cfa996a6ae8066eb82bf1249889a29067078213a21d6654077997838a1f96f4b190f1e618c5ac79927bf22c1917d9753053dca85f842ac2f4e6a8198f919b7f49d0672f2dd06cfe0d11d95ca8e02807aec9d20f1a5689ead0c73ea1ec387b57b1a2501268a66f190daa912fc0e64874002c8657acc6a18a14b07daacc39c1880f590f6a25b7023011621fb07529a602891f10e718bba250c60c8f256f016ee2c3d3e6e5c271c41ac1752c92925510c1554a544267f0d2a4fea7db3e9da57ef7c77b12d9f68638a59110811330b05121143ccd5f75dce0641e92c7c00d1f114111c1203c0a0095ca905ad18f3ec3f26b39b10d7b7583b3e7b74f8aefb786e644ff3ce0a8482a17fc3ff962b6bb0f9b3d5b7b4008558843918419a0fd252b292006ba8b501700500402f7f985ebbce6ac051ab0c03045ed84f94f914fe8b966e97bd6499633bd4e0c82991d89ea1ab43f16386f84950763e2c5602247ea5728d56622fc58d6c685caddb59903184f376c3b135fbbcb436c8b479082efed48a54b97d0a85e9b3c5ef24927f39009100e5a98d2aefc7f7a47cb4a9d06ef8b54c369b02b938c8fdf16c73182bce80a84cd25caffa176a20047eb37f29cf332e12a77d1adc3c2663dc6f82247a489a4a14bbfb74de1998978676cb01bceeee30300a53901181b42d2436bc94b3f384d66f92098a11a76d58ed4d8a1d178e1e1e1064f9d7e52447f1ac1cfc072bdcfc6debe7875485d0b96efaab89ae5ca3dca16073e104cd4341d05f17f275813feb8524bc0e476749e00ca17d90c0ebf816a01d42792fd0b14553b66fbe026fa0c98cb2d03ba3b5bde14b414db6d5ee7fef2ecb8e129afa2da6c9b762c1eb694cac19cf79fdcf846ae764d2a9d4465391312af33f8fd2cf9688177cd0ef739bc9c07b6bdd5af747907e2b60f53d8e1317321a49f583af001dcccdc7844dd13f9afcfb35c6223822abdd319b9e79e7034a92085dc7ed81b121a2d11295585d9125de97b552a9467f5708907c7dba8aff270c366394b08b6a817508bb888cedfdc3408890599c449e830d6f523196848609e39bc59ccf47f96ecf8a999a65dde641b36f2a26b99f1c0ba3551bfb0779ba15b7545c675e398125381df954bd91bf8fafe2b472b6add9c5a00fd6a1001ff28210dc9936d9204a28eaea684a833ed8dfe555c6d1dd8a07870a809232e3b6b16b1938f101c40aae3a4082cb054c4d005930e9e1a145c79b80852b03d0a35cfb3b9f5fabcfe4a68585daec6513d953dfb14c0095b4903bded39ae6efcb64e9879a5556e9039bbf90abcc530b291ecf67b2b8de5e3a590aa7496e430cf4db50f5be406e888c2852fdb018468e4979d27834cf857e2078227d6dd6d899c60e618b8ffa69ec6ecfb4cc680ace80a00f39c300b90d1c0c22db7a32791a846f325c5bf6788dbf2b5b557c6781fedbc64ac25306b22f6d214bca5f648ed4084d198fad1a6fc516a84096db436f80c59e2081c25560cb0f57dc3d531abdbe93c4557980aec0dfec0703c82f8ef3c5469235b4127759806fa2c1ebc8b880d738f3689bccf6fdf5b9c0a8c2ae4f79b69c8e390f93add8041f78554ada68a93a2e54b3a8f1ddfb915cc3a5130bdc50e542f546259ce6c1c31bba164cf066917b6af5d3c44cf5526a420fe360ec23275155adced3895127082724a7517d71f60ea0c2fe0c4e57e0846c71d554374e1325a5cee0449ca2d70fe7865cacbce414eaf0628fcd64aa5fc3c40df248b8058452a88939aa2a4c0b6647466617454a946bc3bd2f2251f61a02029fbb22f847ff409fd24071f757f1ae54e2647e0159991d9d54ad4d0de50e0ff65aa3fcec0235a06961aaaab58cb12517c0eec0ede4d3ebfd7f291fa9cf8bc360bfe246bec922784720b1523cc0375038884ca14b3cfd46f6dc17bcbdf5121e1c3feabb5997421a719dd04fdc7f66281b735fc5ce52a495b2a408f4244a02346c7eb2d76f1286a28eebe67238a0bfb00412717fd9abeb2786421439a7acc35afaf5da6174da50f9c6ed33aba4314a193b2099eae8f6a4b9843964803fa3891809eb2e558bbdf4c213ed10fe667f40c126b23870d4bc7917f5492adb803b0182decb2de23297d079fdc9b66f7eb1aaf5775548d11c53ec731e0d72c14480a2f469e206f6c2129da094e28c96d50ad4793d5ca9636c668a0c357a22362f37c57a3a7d34612f19a0276616272581dc6a8c306f7d206ac2dbce6777c2363aaff59d94e774ba28f8b2538c0cb9ec1f62dca8cf839b5d7937e3a7e7797c0c48b54ef67c94dec809cd3ad90c419f6bc270257f40680a4a1fe86b4b688b2c7d694c457dd05c093b083dd36933d226cb498416118c48bb05f12cd11967e3656621f87facb707dba00ecd7132b9bcf627b0002d32fdbce1a21af5b288ed2e8800a2a12704d9e4e3483961ad4148be48f72e17a7a9915f3609be34f72316c79502dc61119d85cbc5434c24a1bb0d3c6ec6c141ff1d3cf5171d48c3123b6fd08e0365d11bed045bb635f543a54121ece0fc126c88ca1910348368b9203e6392eedbeeb58f41ea12b0e1b2808c30da15bfbed80646ad01972af0464303908af6e38bcfe1a02f9a23b83526ee158458a021ed8345153ce4fafeba05bd637611bb2f0be33a65df488ba593a57878837a28eb74643a63a2d8e012df22a2ead72dba8eac50d17f1cdae365f64c5489d4ad1335e2091a725d3dbf1cf61fdc29d0e95cf1cf9ad54777d16f8f7ace14a5183a1836a1275849b83404a827dc0b13680ed178b41dc21e4972e8773a3a5c102426bd7d657f09c9437839a9b19bdef75f"]}, @generic="6d42304c13274337a51b44d7860efd3acea29c1215b0f64b9fef384b27fe22751673859cf91317568cf899bdd928a37c3235b0ea570e9e469f2c99fc297a866d209f9c8592b64865bf405d7b342b7491555b2e77b5f32383849d2c97827904f13ff9da8925782e795c8717bd01594065623d7ad71785e3f4d48912623391ca62666e25397e1feaf0c1cca35df7589e520416b8b3a23bf2ef12fa3084adfe9c5e1aab29b59e200c4241f9c2ca51ee54e01089", @nested={0x324, 0x42, [@generic="4c704a6f91ffb80644b27a45efd230b5dca3491131767d17fa6ccd08b1b2bc8d92b6257f57764ec54c12ccb2f417e41fa9ae3c3b2442425fb27c329623a5a878af533be6b2c4869a9f8174b2ef6e472a310b1cfbf15841d95be24929d2ec5e3e6974635bc72248c91c8b96596c616a05e3f5492516a0b79ab5f4ba7081aa21aa07b0a31ed35cb5c43bf1e68001d9db45e7c37e9b37464516f1ec5124f4378092fbc1766eb76cccfc80b967cfa83ee7a5bee8cbb381f9f8c61a904cc11f9a522dd1e744cb345968db733b18ea182e54842072c775d3f6f0538f536d597aece2c189477a40b9a5f99eb5ebd3a19386605f", @typed={0x8, 0x6a, @pid=r9}, @typed={0xdc, 0x29, @binary="1559eae79ee496429a5f19a469daff790643b18845b799435fc9384c53f248c0ec5a5f10ab258334c645526b7c6ae3996b838ec547cd4cf37d4c01a42a0336b3290405c8c8e370aff4ae793f16078acbc6c98f370074990b0d98bd0de0b9a7785d678989773bb5f67b38e20dc355804295659d22234bb8e8c49952b40c0be0630cc67c0e80ec2908d951e83c55ad2bad0d5de46834c2609ac9180b42b21a37365d8c9b2b35c058c5303966ae8d3abed53f29094cca2a632580d6484b38ea143ec1b31f046c826a3268043189e7e0281e879268e7737aa192"}, @generic="69199d3cb0e3447f9a34f3d30778ab8d5958dbc137aabfc4efae957f9bdf5908a41895209ffa747a4c40c05a190cbebfca4cc642b01cb6bc5145b7af080fef4f52e25f8326d6fcdebaadada5d18bf103959b0080f05f4b5a03fd09fd2e0eec5b6709e1a906cb76f70ce9e47b0648ee496e093e613dc143caf4f1ab", @typed={0xc8, 0xb, @binary="33ebeb25e69aee34f63129fc7122e67cf2c68c11dc2bfb311bb0f778b8ef2bfb8c01c923d59741a48c77d5d87915c73f81fb72091ac22ade0159ebf7eec8e59bcff39fb49da202002e0761facd549d9c25d4e7575c1dc2864842fd177ba8c90d19ba598e7537de0e5322a8833b3be3360474edb75b2e8caf904069fbad5e230e627ca2f63715518b0ced1df329e753506933453c14860fa9038c432a54fbab2e57e61597a4ced7ff5bb4b1b301b7facaab21972bdfec256b92ec3ad3197db247d76fc842"}, @typed={0x8, 0x28, @str='[+\x00'}]}, @generic="d4174c5068b30d7e6debef5ffab04e9c71bfc138d597e22831f51fa6622e009086fb16f7167797ab2a69d988ed0aaecd23287ac8e45b08e57331dd80dd4efe2f7e7cefb9e3d2d651d738376060c277", @nested={0x10d0, 0xd, [@generic="f1218bbef18e1cffdcb0c9f04486c33bec", @typed={0x14, 0x2d, @ipv6=@mcast1}, @generic="2937ae1099eb1542b474cdfb04af5e5f9211143ebe2a50c16cfbea5e72b6dd7dd92e20a2a7a6d7b48f1b9ff0fd80826ea384366600787dbea9d90b306b47e4d6b898af1aa31730d00d611eb1dd045f7bfd6d4c3fe26a3bd16413d1ea586032e0c207f357d5a4ffea9e15f5bc7ecb2504ae491e8d6fc37521b4419c39d93f563cbd22477c0ff23d0058942b79fbcfa77deced4a21fcdba92cf20d871272d16e1b816ffbd90956408954e1d7cf0b5c7572b57ac06eecbf5ad3c158a8332d53fc70218890fdf9fe200588feefbb57e7a021de8351683f01c5197c6faa421e3154d541348e6eaed2d526558ca3540c7727aff56c27d4ac3afd253e3dee8a340e7bb5e65cda269d4d1b626d543ec8975184113a176ca541c2e886649af0c0c190c03b8a8e432feeb6a308b098f7765f3cdab2151ad2ac197c7e51ca565a20eb70899d31ce6338c0ec706b878f75db240afc8279bb99de220511fd25abfd4385c55bbc99c0f39581df81b6792d21eaa5b2eea817a115477a7e283a25814cf9306c8381333bf8aeced9bf237fd84fffb57c358e510ead536a2de667e7abe494ad410cbc03fb974ead4005fe289d3cdef9886912e9586e568ebb0941404fac83f1a388545edae5525b2693745074a07fa2f5967d2544b808d0dfb877801fb53ec8a0e0ba6487d4a0b813191169e422b7c18b1d44343ce4dc0a1f91965e2b24857d3d6c4656579b28643236141c54b485365f77543dd46688f4c175962b52b046ae0b82629117656ad4bf3ed740486dc71199c9f79bea51ba9d0b2b87a4392e7791254dccd4a0d9c43b357c5a0193469ea7afab7628a3ecf0b359ee70e51c3cda394faa25ba27cb32ca3747c671f2a601f3e424eeceadfeb2c0d2a0eeb2648b93a1822fc7d63743bded5232b756c5724a79b2db26056aa1f9274b9868fc8b09bb469a52ee260029516a9afdf4c8065dc2980dbd0a29503a79b8e8116a11f988953f2c682c19ddb043fb8ea5a757350b2b4e16a8379d7c685515d14848b6edad79bef93153a06dc1c8fb0edf110cab98b10e6f1dcca8afa8d17c61400b1ff0f795892fa69eb32f16ee334ba9e67836fb30e2f2b022c116c687e7bf05f86cc487e2d933cf98ddced15f8615c7fe941a0d082e4e2c61e5e380a46c99d8ba47eb8b8bf8666e0a2b2a59ff8c72318114488e3aeeb8d44239fc7485ff385aba98f01e7aad226492d202ca8a3ecfbc5cc424e5d32bbe61e53c26cc0df4b2bdac6062b36891b31faf7c11dced6963da5186aadaeacf7c3544e2a9e45d396ca3fc0db1e55dba024f0cf468a261e697b71ff872662ec6421dcba9bfdf4b567c97229fc549e287f3c956ca1de5bc59399f8b9732e42e472dd480cd2f242bc123c9cb29a32f3c97d197dc72962b362ed4f4c72005ec63f6f48883624dc12bf6e175c7bdf14046f31a2b21c83ffd5611815f68a95ccff01df2418ff72186a4aa3d8de93624b9ecd46b470efda66821ae7b33566c0d432ad76fb0f5dd95d6a23f3f8d471d4a59d6a90e0990e9b98338b885ab419f69a24c1616aaa3461007641f1e088fac38cd0b785bff2a9ad424d8b8354c770f4d7554d92576a266388bbe4bb365e7ae756b94deae20f3fca291a1cc3289fef4ce29c4015aabbb9acdcc79f894ea7f8bb4216c0f1d480ae4bb6e2093b6c7a59054508c0d667978b0e15955bbd4079c3c344ca07d7168d7f375f1a9839e42081546c63dc7ace19704c8cfa58efa2852ef22c686b176f5abb710ec127df4da1f909ceda8ef72f89d4613905381c73df1532ac133fe48e2ae838b9e2bc5f3d63ecd1ab3d853b024557102b9b63f23eb716232f10e1c861e5b6da76582324fe5e41f415008037ca2e58b65fb7ef2f6c3e9431a87022409c350629f5ed1b01e5199f3b6fc6746c7dbb240928aff99f891ca3296fe2b7bbdb45dd25dff3aafc80580c5a768b0fe287dc041615b0c97be2db93b972f4e87a9be5371379812d312b2fa02bb7e99e20b0f05d67c47fe3ba5edd1e97f5a222b6f65d6e5f4cd59ec2a15fec719ef1024e45f810659416d58ee716095aecefdae72f94b7a7a6b97257730ccc02208785fdf56a5fec082e65b404ba36bc8ae58f0e65c5ea9e1b53909694caefcca0c9602e6bbd7559c6e267f20f1e8d075faa8ab3f7fed06e87576ea38e73663ba5887761b148c6e63d7f5a85c16760317fd3bcc1d07ee7257bf13f0deaf83a34760383bf106eb8b91d227a6fb1a0e874e7ee7d99b58147cb79c2a53e7bee4ef2f7d7df6ac8c259e23ca54b326e60e8a33fcef8171e9a3f23de89c81f9613b2602871c1ebc4dac7e5901a9773db23ba57f943c1b45377b67a9830a87cb1599c77fc107be389e9ce948d9d752605acf445b9127a7ec9cf8bf59b40083e6e78d3a8bcc7138d513ace7ec58ed78f4b9c2379525686b240efa552a31f9a2a56580ae0b03a82325155f840638b74b8a5fde422cb6e7267fd2524890614f18e53f4072948db0b39ba2f62c765baecdf4e9d7631d361cb34bf09f92c3bc01dd46c6823c2002070f25b72fcf5f3e314bf2d5236ab05ad6f8def30801600c5a93eb652cbcca54c4e7aeb40bb742fc4e0d18309ea56ace11af319dbdfc78a4501b811babab75f76d5ad2389f280c0a1ef191d9110eb0637cc6d85b10b13c4f90488964b3293d0c50a0a6c75ba6abf327bf6d6ac36d1810a4a23c17ba54e3dc34f95c21d17df58797b9bd2bc2e0622876004bb458b44e82e6108189013b471a8af6a3f94e8640c2d7ef839fdc8a4a594ef814b11a2339b7472eed32e609e72708b57d757f6aa0452490e9e54f5bb136c9b8d05fa117dd598b52e17986971d180ccafd84619ac0c599f23684a8cf8f8e9df506b628c0ccb6b820197287eaf9cf47d8e3f3b1f0522d5b0013ccf6f8d33015ef4ea75c310b1eb179087132a93af763a97bbf96457228bab54f83f2c88446689bdf8fd0f56b2345ab440d5eed6d7b06b759c62c69b200d1f86a08f35a6a9e23710d69eb20a51ea3acdac03e879e83f556d8c73ccb6638d997da65ca738932f8ed5eff68cb2678d86da7943ab265bee4056ef00e0bcd504c96a828a34c270a8230146ba91ffbdd613212d2a77a7d8d7c5dbe2fa38831cc78939da72825069bceb0dcb28481822f4449d826911973e6da47594fd71cab56d5037b99b13f0a909e4567b91bfefedc616ac8644cf9debbbe94cd6a2621d9e518c4f17e62cf71f56a6d24cdc9bc2be86d858e2e4402848f1183dc93f1b48c3def8d33c55a7443e7473b92a62a4716bb997f0f0d21212acdd3bb55cf556734b441d78e68f538e2f243ee085a02c2fb594e3987a1cb822ad35f4eda1f0165821bd7e04d3b39d4481b49faa0302a4aa0ceb41ce90a9bb6166c7c6a378fa50c23ac2dc863098f9ec6cfcee82cfc31ed263c30b78be2662a80e3c6e3538bbc331fea608721b34c7dafb3ccfc360d9678d9df007d3366241bf07726034bbf161f176838336bb1fab3849b7f0d37cf3e54ebae9251eead59657496e4581590dbc18ed2cfea1133cd3d0d9aa648b21dbdef2d4ff8121b36ed951c3f8afb663936108596961e958b44af2255bb0949261e75a3bff6994ef2b9aaeafbeb0e677253097f03d8f0256ab98e5bd2882634f6b72b6bd36cdcc019ce419b4b9dc5b11110ca8c3a4c82655f69d357f386a31af7e733c0c006235015ff1350eebc407369f4c287944c84be30715b11c7c8650502dfce1c3b3cf053d52633a38ff32cee52217d78fbcfc7e8e0026fe62c5ccb1193c0b02ad525353995b3ca9529794aa8c241a415e0f27f3b7eabea70e97fa573238028576596a5947fa0b9f8b56b26c363774879aad76a8626c08fba14e8346d37e0bb3dba1412f4a939983779f257d4749ba58cc5466cb6b921e2976d8342587e5b013a663f777f4be633fcf1a01438c0288b4079e5a13abe8215a09e6f9e66105932eee6c8a9f03c05c23c9eb37a39edaf50411b5393417617c046b8acc7c0ebf4d639c34db017b6842c74361ae2760c13628141d7e8767259d9d23a90057ecc0f0fa7eea414e6b158488e1688530e4118c118d984f7a1b2e47108bb5be10e3c2620abf51adab30233f5eb224aa5f9f6b76b0c0bc96fb5ad49691aebcb85d318993738117bded50a012d3cbae7b19b67faf5646cacb49e2fcd95bcd91881a4aa853dfe641a7a210700d5becf3759c4758903442e46e3e0cd54e8d442b00c57edad17172dc6c17421ddd7fb367f20c3134303686a82781c8348ff6805621e530661c2e2bd7cd14f1de3a1c65d51d6ce14b27bec9bee612acbc895e7c9eed622cf38016a40f719075fda738cc6a2ba5d7d2f709a271a345bebf0895dbcacea4a77419bfed36d41419adb8c562a10c2579cad83a809ae5ee4e4f392c71a7ecc0034fc40b27a54f31e640775185c35f73eb5dd95a53e0c399f2b607b9d4a1fd1792cb6bb800f72d2ea5b5ccf6df3cac2546246a52483e53f456d908ec873497f9cb022223e79e88a8884efe5b5b7b07c97e3e326728494e03d3fdd5921c25e01a8829abbb56b90fcc99e421e84791a8beb996d0dd24be9d8aa9262119c87353c5ca343a63f801e99b90601f778c86f9e5e796a2612e6f5afa17791c403580290b484c36ed98ea0bb0dcf4dde29e14f0ae195ab76a3d43db84ffa07548a4503c4fa4f3c09e0834182e1cb84c14b52efb13a9917b2ac42ab7d3fc8ef948875fa0ff13e396c2aaf3a0edd958427034f13815ee61ccd60444023fa637c73f9da6d6841b39ee8e9e8802da9ca17f084672fb78c28bf3cb9971b8fb1a179a71388fb9c0897e7cb7c6ee8fd76a4ed9d1950c458be297cf7d7d3a2b449021ba28719bb8aae49387f697134fcf6c99a05c5e356c08baf13a36415615efce25dc11f45bc2f48a7f28b1416997a9296886c6fa9166c42c143b3943a6332afae0f4bdae05a28c711ba1802ed259ddbdd884d34e72d2e33130f50b208efd44703701be3434e42b7f8b1a2388ec5cbb9a3a4ce7eea0a9df8af7928db85423eeadb650ab74263f4b466d3aadabd4e5ebf50cfc624c29fc739845280382666214f35b45904fb5f479ee7b02fe073031f9f1d9febca0796be223542a1d7ad2756922595ec2c656d6788bfa8ff8add168f40de0542d04ab13b7df32f8b83d74aabf97260feb9723e5286c52a297db1b023ee8b15056eb643581a370881f397a243e9662e4a59c63a0ecf00c47acb4415e44e248f72cd98dc13275bcce18917cf18e1ea5c622043af56f487f0c51db9087fc30457761d553dfbe4253c98c9215038a5f31226b68e7b9098f97cc4c2070c4d8d0b7d7c3ea4a3af8a0eb6de9ce72c6b0a6b6c50c17e66c9df55364dc99a92785836e825d393bfe5259a1e2327cc6f030b97fcc690dcecb31f926b2f946b820cdc2dfae983d1cd4e8e2173a5f5c395f9f122626c4d59fffb6b7d2a910156c02028502d2c21739abec0080ec315d622a59730e1a343cc984a43e6a31b2f77693526e003bfce7c704efd33354bd3c795658a48329088d30fac8abafd100ec55a2c777e34ab51a92378eb9e78d66c282ef0ebdd209d7b69c6349753a433312da680d86d8e32996d4799f4eccd24bf0b681047ca97884d3a011dc7c543b6ca0a4579e3f8dae0ca4ffb3c7fb3c4aa5d3848ba213cac6bfe18f24592ccf1b906b21fc6dd92902c767ae73ab915f1549864bc5650a9ae0596fa2f51f8c38d1f50d0e42334a5713133183ef279f2f99b632af98f5ab6f7086b90c3088d1826323ac046019a9303", @generic="482e7463450069f79d31baeb78d5cadef9955f493a75931b6070d6797097537a87330f7acedc9af02b0723986c106f70b551b671ab4651dba2dc483cfe5f8d4d6990f9bc0f7ea172b553108beabb01317124b5d1de1009222654b65a0e5652279b4930dd3b353675e6a9622bd738a7b0f0c2609ccd58497048ce0d8bc8eaa51128e869d9f47be0588438a66e59bb9807d5cf589deb5801d59ba8ef4c0d68d3ff757f11f650c78e"]}, @generic="ec44f7945208a18202a9dd425b0e5c374636411b2141710c7d9b4ee450a9f5082d0cddeaf2b189b73a7d90bd98ae490a7adf1c7b9e720d56adc4a4173720", @generic="90079175e36e337a69b816546c"]}, 0x2580}, {&(0x7f00000029c0)={0x60, 0x14, 0x157, 0x70bd27, 0x25dfdbfd, "", [@typed={0x8, 0x69, @uid=r10}, @generic="0bbd3fa42f56dbecd495d212c0dfad7445028f3c7900892365eca4ea237e92810b756e8cce7f00462877d4d49e1b187719c65cb0512307c65b6e3c8cf795", @typed={0x8, 0x47, @fd=r13}]}, 0x60}, {&(0x7f0000002b00)={0x18, 0x3b, 0x300, 0x70bd25, 0x25dfdbfd, "", [@typed={0x8, 0x55, @uid=r14}]}, 0x18}, {&(0x7f0000002b40)={0x260, 0x28, 0x800, 0x70bd2d, 0x25dfdbff, "", [@nested={0x9c, 0x38, [@typed={0x8c, 0x16, @binary="4a5d664483ad06b6c8eec82ecd79851b43a900b95ff1f67e9aec30655d186d56bd8fc7b31fa1019bcadc6396b8450c48f999214409ee69ab53f82144e96457cb6d3267fbb3ffeab6c780dc181d993bee49c3070ca588a5971cac99d336a5d16e87cf49ab41f6073b05ba0e6cd61cb42ad2968df0dd940d8c486437c61207b1f7c4488b25e0278b"}, @typed={0xc, 0x28, @u64}]}, @nested={0x174, 0x52, [@generic="e904521848d5dcb68fcac2ccae4c6f7734bbf59d72c49908bc4393f15c09564c8c06f87d2b2b7b64fd1867ad4cf82fc82fabbb252946f13e7df00f289da128dd6836996232648cf5758818f563414cd1bba3df7d4e5623fae274ea740448cb5e91e82c7031c0fb1179a35dab89ad73ccf2f0fabcd1028b14aea209ffde099cb823d919a39a249786f8df8026391b1111a2a363ef1d9ca7e729215f5587ea3b63a60743b4e9d05c6d1bf7f8e4193a6965d86ad37792608fb1d8bcc4ef396487c9d8a7262664", @typed={0xc, 0x8b, @u64}, @typed={0x8, 0xa, @u32}, @typed={0x14, 0x1a, @ipv6=@ipv4={[], [], @local}}, @typed={0x78, 0x73, @binary="9294fffb0548d71bfc2ef25f7250c124d170ac8c04607db315d85c38eb57222b06a48baedd82f4b2d9094c9a25c54cbc79ce433a82c756c42fcf87efa262367dfd96b0ed6f35f2cf5f3c0b162f40efee86fc30ef3f6fab5abee16b8c2e8a4e2f1801241468a7075dee9cd898aab749b3132778"}, @typed={0x8, 0x88, @ipv4=@dev={0xac, 0x14, 0x14, 0x26}}]}, @nested={0x40, 0xb, [@typed={0x14, 0x7c, @ipv6=@ipv4={[], [], @broadcast}}, @typed={0x1c, 0x5f, @str='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00'}, @typed={0xc, 0xf, @u64=0xf9}]}]}, 0x260}], 0x7, 0x0, 0x0, 0x20000000}, 0x44000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r17 = openat$cgroup_ro(r16, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r17, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r6, @ANYBLOB="000326bd7000fbdbdf2514000000980001000800030042000000100001007564703a73797a3000000000380004001400010002004e24ac1414bb0000000000000000200002000a004e2000000001fe880000000000000000000000000001030000000800030020000000100001007564703a73797a32000000002c0004001400010002004e20ac14141400000000000000001400020002004e23ac1414aa00000000000000001c00020008000200280c104b0400040008000100830d0000040004003c000100380004001400010002004e21ac1e00010000000000000000200002000a004e23000003ffff020000000000000000000000000001000400002400050008000100657468000800010069620000080001006962000008000100756470008c000500080001007564700044000200080004001f00000008000200ff07000008000100070000000800030003000000080001001e00000008000300010000800800010004000000080001000600000008000100696200002c000200080001000500000008000200090000000800040001800000080001001f000000080002000500000008000100756470000c00020008000100060000004000010008000300ffffffff08000300030000002c00020008000200ff010000080004000900000013000300080000000800030003000000080001000d000000300006000400020008000100400000000400020008000100000000000400020004000200080001000100000004000200"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r11, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r11}}, 0x20}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000001840)=0xe8) sendmmsg$inet(r4, &(0x7f0000001ac0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000100)=[{&(0x7f00000002c0)="228b5aec62ed8105bb900a89b068150971840e109dbf56d5421f507adb92fd22a0634366147cf3862a6f3353e60226e15f8919ddccb0e551d2efc5b28765af07c85a96e6f95815fde544d163233c68578c94feb5c6cbe478b78e453cc394c6367fb65101ca56eb3bd9af63e1656f9128cd35999c2ae384100299a40ab6be55499c037780bcf4dd59895756a3d9c85a6ee3cb61bb1391dc92326176e179432d1ce7ea0d9077e3807c41423a94d53442ce7f3cbaf849a6ddef5d2fcff89849195ee8a202c386485999d2e27539c31ec211a8581d524fe3a1359761ea39931631d3a4a8", 0xe2}], 0x1, &(0x7f0000000140)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @remote, @broadcast}}}], 0x50}}, {{&(0x7f0000000200)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000600)=[{&(0x7f00000003c0)="aa6ccc9a583e45ee96d66816dbc7909c5062e12430e162541c73fcab3eca194bab4a61d6541ba1aee56bfcb4e7e9181d19e167921fba0df03083bddf7aa4e7da2d88959dc93689d55a6500f59712368a524dddc0bfcbff059d5f41a7e0d6194cb137ef6013f0495b946c798cd877d3ae1a015c05e45adc3539e183bd524635579ae6ed9df54436daecc70890ff33f68edf83901c6a7a858507f95d2eed", 0x9d}, {&(0x7f0000000480)="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", 0xfb}, {&(0x7f0000000580)="630b6a379c37d7b0ed636d2e7ccb196125d400ea7d56e243fb88b3b5df620057365bd50db40b7e8d15eb88b994c0092d0f6c7c44e891183a8182619bd416af825f72", 0x42}], 0x3, &(0x7f0000000640)=[@ip_retopts={{0xb8, 0x0, 0x7, {[@timestamp={0x44, 0x28, 0x7, 0x0, 0x0, [{[@remote], 0x1ff}, {[], 0x8}, {[], 0x1000}, {[], 0x578}, {[], 0xfffffffa}, {}, {[@dev={0xac, 0x14, 0x14, 0xe}], 0x3}]}, @ra={0x94, 0x6, 0x2}, @ra={0x94, 0x6, 0x1}, @cipso={0x86, 0x16, 0x5, [{0x5, 0x8, "bae72861e69c"}, {0x1, 0x8, "b7f6a90f9e29"}]}, @lsrr={0x83, 0xf, 0xca, [@dev={0xac, 0x14, 0x14, 0xf}, @local, @dev={0xac, 0x14, 0x14, 0x24}]}, @rr={0x7, 0x13, 0x3, [@multicast1, @local, @multicast1, @local]}, @cipso={0x86, 0x20, 0x8c, [{0x7, 0x9, "b5141e4a4e44ca"}, {0x2, 0x4, "5088"}, {0x5, 0xd, "2521de06f0bfccb65948f7"}]}, @ssrr={0x89, 0x1b, 0xbc, [@dev={0xac, 0x14, 0x14, 0x2a}, @local, @loopback, @rand_addr=0x1, @multicast1, @loopback]}, @end]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0xd0}}, {{&(0x7f0000000740)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000780)="ded54e146d496a2bd34aa5103ff6dfcc38651e655ae8f68f7691e2806dcf7caca7e24ee7a1b5392caf7ad90bad5ddcfeb78c01f154b18c2bf0e04e786a0113711668c46c1545adecde2c810b3fbfd2f396ef7c3250385779d6aa3ddaef4c5e7b0ade4f347508e6dddf37ef685edc7d05fa403236eafa66de8c6f2463eac4cf7e95eab19f4e22f393c61a010a462f0ad9bc44182caad84e3c2f86ea58442c8af7176661c9049e2670897904bb21645a35a13a6709d2890d93c5a63ba4c02a1e64e996f296c0686620545d56e6f149cfe46d82558cc3acb6a16c5246f43aba542214", 0xe1}, {&(0x7f0000000880)="91eef7f0f73e802c39482b46e97dc643b2179d7f53449df154d25cc154edff61f3952aebd9322a3fc9e71eb1492e4f0e3556b847b4", 0x35}, {&(0x7f00000008c0)="7b769217a4e95382d28964c1a9d8b6b680574dd28eebded79b57959b2d07b034e0ba11e77c44a2ec790e464c351eefbbf4aee9a58a50e946cdb019c49b608cf45af08cbd8c76426acbb0c171c85b6edbb87e47129fcb4e00d272982c75febcba4f561aa6f827874c9038da97b8075327311e70e585eb7c973a1c57fdd954f792b62613bceba0113272dae2d5d516b8ecfe885e02983d45f7d86287fe132dbad416fe583c5c0a05eb1b076fc77bee082241", 0xb1}, {&(0x7f0000000980)="e592", 0x2}], 0x4, &(0x7f0000000a00)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x30}}, {{&(0x7f0000000a40)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000a80)="69fc6afc336c0a70", 0x8}, {&(0x7f0000000ac0)="ba2a182bc5c3532ebc7cee7af009e67b0ba332caebe1ba027124577bc7a3c3b4303a5424335735bf3774e2650ac36eed1a7a9fde45805ec163dc858dc26fa2de19ba8a6eccc8994d75020d019112cdab4dd606f1b984852d5475a4990d5d90c77bd965579037dcec0e4071cbea3abcc522abdc9d53c1403702aadcdcab352beef5edb3efb60c9f47a74e0a69172c54d132f918dcfd1c64cb77077fbe28459087", 0xa0}, {&(0x7f0000000b80)="91dce80836295b5f3751891aaaab67d3616aca53b97f12f1a7385c0469e0e871bb00be3f6636029518b19404527c8e41efe682e6fb37a051f2e6108409ed9631ac0a414ad891bf88c701f96398b34671069a4c06c8a9d1", 0x57}, {&(0x7f0000000c00)="1581f9e63f5c0ad52fd985e300ef8d6fca5e30da2133ebb5d3", 0x19}, {&(0x7f0000000c40)="f720afa50e6dd011fe39f23352010f60c70a49c49687303686c718d0e9f8a1117d681c1f5fe682f3a8af31cc3c715500e308bfd5edb68b5bdffe3d866948ec9113f461d3eed322984d37f986e4705e5f7fb46d802c0fd9f6cae79bae497f9102bdf1ec417c5160ae752dae26b883e910b9605c34f808badad3c54e474ba8cc4f5783eb242913d015d4e692ea446999e967c3746d11ea1ad836902542f5aca496b54fb927de46a721eed19e122b3c1c15eeedaa257f6fa3352ee8442d98ebb565f2bde56ecb3afc7a04dbd228c01a9f038ac7831157", 0xd5}, {&(0x7f0000000d40)="692e6cc8623e242c88513fee15b64e39c478e4e17d21dbdf61bde107781819372b37356c5c2eedb39ed5068cc806ba3be00c4ff3259bd207dd1a62b5191153626ee687a945c9bf8de199f9d4a005b6759348c5e2690ce02c4c69f4a601dec315f9dfb89ac9a76d896cee79e7648d70b5730bc300da980469808ee46bb969dfc5cb1823db41e6e282b7fa7b1044e040144bee1bf2e309b605e522fcb0af6a6bdb4e54732f8479e6c5954622ccd6d6217464429117e1981ecf5c5815fef2d561a61cc6a0176f71bd0e8d00d0d2fdd965f33d8e215d1fe2bbe508813af4e4a36852fd8b256052633ec6f1ca98df516e6491e81e9f50", 0xf4}], 0x6, &(0x7f0000000ec0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xb4cb}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ssrr={0x89, 0x13, 0x2, [@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @empty, @rand_addr=0x401]}]}}}], 0x58}}, {{&(0x7f0000000f40)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000000f80)="f802a8e637f3acc364ef49b7869b901b83497dcff2d1d920d27259d000733a22ffea941bf1c8f31d5a7f16a99bf33739b8fce699e312e932b5b10fca830a27fbc5027203b4e7744e8b6d79f95d4345956892e95fc19758f36dfc8a3033f3d9897addfebd4b75dc5047a98d01bf12987416c6db63be05ea851b336d02415b96325d148a7f21b0a0da79cacd551b108261320172a1c9fa5fce2a31c3be2c03d2146daede164d8487ced13dc3fb81fce1d7d030dbd83c6adcb0e578d7f5c2b7454552de80acb2dde33b73f7264dfe90e80b4938563765eaf9992fe9885c80fe2593b3", 0xe1}, {&(0x7f0000001080)="cb1d592575f86af7b601b3bcb679e3713e0000752f1ece45e8810eafe05087ab380feb514c", 0x25}, {&(0x7f00000010c0)="2e76adaf1626ebed13d0de622957ad2e2652d58d95872450f7b3eb78245d39dde258694317691800e454071749e3d15597b0aa86737d75cb7b6034c512166ff0d2fb224133f139a7701015610229437f86254a00d1489e3852e6322bfa4b16ece64d042cece9c48666903e9cde294387d560174ee9a90fa1462811cb", 0x7c}, {&(0x7f0000001140)="62a8433a5a4757f4431aea580e64e5b8473d809df317a60c36a2a3936337abc0a729e66cb1d939c701f18e6b6a5189383f0cc5dc22eb1b1ff7cb207392b6ca9ad3a57221b120a032f3db3756ca00093e4919d4670980ad7ae74e468317688c429d5b72d48639cf087e3c3b8e163402f93bc9b4db19b0f40804ce5de3bb5a389f093acd257702dddcad0b8a722a173d59745c7fe51140ff448a3de0b170", 0x9d}, {&(0x7f0000001200)="8240e9f043832868fd3f833e7d20a7a729a68436ac9663642354b5ed6f97d5a4751ea06f0c3c80a3587ab097d5b3e41e662ededd1a44dbd7719a1cd37a514be0ca1a1640ce4a4f1791092c07059d541c175f206f04178004b54e5aad991cf4d2de7b0d9ad04bd043f2b42f5bc77cc132216cd03fff5dba5aa82a8f39e37cdddf168a831605850005cecefa97015fc1dbf39b0270e78ed8f61276cedeb314df8af751a439f3e9c77fdefdb6a68fc624cddc2f3c", 0xb3}], 0x5}}, {{&(0x7f0000001340)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000001540)=[{&(0x7f0000001380)="990af34f44e2ad15ae492c4a6ea02d87413517e65503c40a6054f7fe7a37ab8bab4a8ccd456faa0ec834322d62c07f12775582898e8a", 0x36}, {&(0x7f00000013c0)="223e8b5804448a2e499636aa743679e15aeff63481667ca385614d341b98a9b3768a9e5d2a5941ed267ad5a224542b1d8d661b8cf62c4f505dc42bdb676602e4648e604ddcdb8df4402fc8eb42797ffcd1fe79061cf0a4d6566f9f0f45f5a52b63d731ff6fc963876d2f80e8095572f67ced4a698e25940e4dc09cbe52e8f46dddecb1041d8f1272f09761cbb940f03b0dbf5d653bd584e84d243958b40125924d75aec2409f2f5cd1525e5da2b56abcdc5766605869f3239cf869c5070f8157f6648675206997ecd6b9ee3b3efc8b76b64d159ddbf78f4d3f172af1e775104c5909d374540d", 0xe6}, {&(0x7f00000014c0)="fc19d7e36e2e5be98c360a3f14cd77c66a839865e33dc493cf05d3d4e2303318887665c5e1bac6f06088a52d6c4d0adcc47e84f1f84ee16d9d8c51a755ecb6738ddf8a70a9afddb66fc567120573f2e12e7fa300071086552d6f55591ca4512e39713766da901a22be02bcccc2edcef385b906ccf3eae6968581", 0x7a}], 0x3, &(0x7f0000001880)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @multicast1, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x38}}, {{&(0x7f00000018c0)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000001900)}, {&(0x7f0000001940)="62e67e87324ce04cad60fa77d32cafd2c568596a8db14959057e6f65836f2275f0e69e7bff1ecb42357bee1b1afb5c08ec2abd1fb0f4ed410e065b9b86511134b25e56ea3a42209330cd1ebba4a1531dcfbe877945893a7ff576da959e64564b334159895bb6c8e62ed77ac9e0fc70eef9ab05251af0cfc960102067682ec4eb86f8b00c362959b9be1b59e029391f595ee600da59ad223e974d5bd5093462cdf9a7b98728699b31874130c9d150ebb59426adcd5a439e7d4d4781fe41b5bd397d553cf0d7c996522cc316f9c2b951e8062c25cb", 0xd4}], 0x2, &(0x7f0000001a80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x18}}], 0x7, 0x8000020) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) 03:34:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) r3 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r3) [ 560.818834] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:25 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000040)=""/244, &(0x7f0000000140)=0xf4) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000080)={{0x1, @loopback, 0x4e21, 0x2, 'wlc\x00', 0x20, 0x9, 0x1}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x4e23, 0x4, 0x7, 0x1, 0x4}}, 0x44) sendfile(r1, r2, 0x0, 0x50000000000443) [ 560.932790] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:26 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) fadvise64(r4, 0x0, 0x80000000, 0x5) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r3, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:26 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:26 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f000000a000/0x4000)=nil, 0x4000, 0x3, 0x10, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/398]) sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f0000000400)=""/178) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r7 = openat$cgroup_ro(r6, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r7, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:26 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r2, &(0x7f0000000080)="827b60e3ad702588ec88ae222ad64438fdbdd7f1", &(0x7f00000000c0)=""/191, 0x4}, 0x20) 03:34:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/us00#\x00', 0x908, 0xc00) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x10a, 0x70bd2d, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 03:34:26 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 561.679399] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x3) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000}, 0x8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0}) close(r0) 03:34:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') munlockall() sendfile(r1, r2, 0x0, 0x50000000000443) [ 561.817791] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:26 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:27 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000001c0)={&(0x7f0000000040), &(0x7f0000000080)}) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 562.163847] kauditd_printk_skb: 18 callbacks suppressed [ 562.163877] audit: type=1804 audit(2000000067.100:404): pid=23579 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/717/bus" dev="sda1" ino=16561 res=1 [ 562.265967] audit: type=1804 audit(2000000067.200:405): pid=23583 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/718/bus" dev="sda1" ino=16561 res=1 03:34:27 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000040)={0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 562.294024] audit: type=1804 audit(2000000067.200:406): pid=23583 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/718/bus" dev="sda1" ino=16561 res=1 [ 562.322087] audit: type=1804 audit(2000000067.200:407): pid=23584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/718/bus" dev="sda1" ino=16561 res=1 [ 562.378457] audit: type=1804 audit(2000000067.310:408): pid=23588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/719/bus" dev="sda1" ino=16561 res=1 03:34:27 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') creat(&(0x7f0000000040)='./file0\x00', 0x8) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180), 0x0, 0x2000107c) [ 562.413937] audit: type=1804 audit(2000000067.350:409): pid=23588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/719/bus" dev="sda1" ino=16561 res=1 03:34:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 562.477275] audit: type=1804 audit(2000000067.350:410): pid=23589 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/719/bus" dev="sda1" ino=16561 res=1 [ 562.543258] audit: type=1804 audit(2000000067.470:411): pid=23596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/720/bus" dev="sda1" ino=16578 res=1 03:34:27 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000040)={{0x2, 0x0, @descriptor="1a56589455c72bbf"}}) splice(r0, 0x0, r1, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r3 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffffffe9, 0x20000) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xffffffffffffffee) [ 562.583919] audit: type=1804 audit(2000000067.480:412): pid=23596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/720/bus" dev="sda1" ino=16578 res=1 [ 562.615125] audit: type=1804 audit(2000000067.510:413): pid=23599 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/720/bus" dev="sda1" ino=16578 res=1 03:34:27 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0xa574, 0x0, 0x2, 0x800}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000080)={r1, 0x6}) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 562.624224] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003f40)={'team0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000003f80)={@mcast1, r2}, 0x14) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r3, 0x0, 0x50000000000443) 03:34:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) socket$inet(0x2, 0x6, 0x8) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000580)=@urb_type_bulk={0x3, {0x0, 0x1}, 0xfffffffb, 0xa, &(0x7f00000004c0)="5b982031832a919370ece076d5e2ff46c4e6c92e7351eaef6b7d1a346eed6dbfdbd76df5c3f723700518572b1a3e5a9cc339ca4b40f0de6c3c443bef288003c508b84e", 0x43, 0x3, 0xed8, 0x3, 0x9, 0x0, &(0x7f0000000540)="d2ee1616b9ed956a411a16199d7902d8b64d5556dfd35f20a5233a24880beb8a1a"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb9, 0xb9, 0x3, [@volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @ptr={0x3, 0x0, 0x0, 0x2, 0x4}, @datasec={0xe, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x9, 0x7}, {0x1, 0x8001, 0x2}], "9c"}, @const={0x10, 0x0, 0x0, 0xa, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x8}}, @struct={0x8, 0x1, 0x0, 0x4, 0x0, 0x4, [{0xb, 0x1, 0x8000}]}, @typedef={0xe, 0x0, 0x0, 0x8, 0x3}, @var={0xe, 0x0, 0x0, 0xe, 0x1, 0x1}, @ptr={0x6, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000380)=""/246, 0xd7, 0xf6, 0x1}, 0x20) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x8c, r2, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3e6fa7d66e28bfb4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x387e}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x75e}]}, 0x8c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f00000005c0)) [ 562.710176] protocol 88fb is buggy, dev hsr_slave_0 [ 562.715306] protocol 88fb is buggy, dev hsr_slave_1 03:34:27 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000400)={r8, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000040)={r8, 0x80000001}, &(0x7f0000000080)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r10 = openat$cgroup_ro(r9, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r10, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 562.775137] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4008550d, &(0x7f0000000000)) prctl$PR_SET_PDEATHSIG(0x1, 0x35) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x20) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xc0, 0x10000) linkat(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1000) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) accept$packet(r3, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x11, 0x6, 0x5, 0x8000, 0x0, 0xffffffffffffffff, 0x9, [], r4, r2, 0x0, 0x2}, 0x3c) 03:34:27 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8), 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000040)=0x7f, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 562.872399] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 562.921802] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 562.950133] protocol 88fb is buggy, dev hsr_slave_0 [ 562.955306] protocol 88fb is buggy, dev hsr_slave_1 03:34:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000000)) close(r0) [ 563.019406] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 563.120109] protocol 88fb is buggy, dev hsr_slave_0 [ 563.125293] protocol 88fb is buggy, dev hsr_slave_1 03:34:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x50, &(0x7f0000000080)="e6db889b86e80f08ad62e479e6a53108b26417fdd778f9e159eb1afcb8e7313904a1c72b07f4fe16bd738f474e32ecc26de2930263c1162cc4a38d6951c1968c94f5ba6a4332cf88aa00a2999c0721f81a805a1199ddee307bd9c2407a4116d15ec2a6581b314637c3cfbb0da8d8f465126b9a3e3450fca4bb1a1b726a2995720e68a5f9542499892ff2a1076b6715f75b5fb991a47a572da35583123846184647d902da46ff8d53dc12df5113c8e78f7d555ebdb2326507a9fd6ea07aa44da4da9ca4999b39403507eb1eea754af038c2dd313c96", 0xd5) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 03:34:28 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xca, &(0x7f0000000080)="bfd5177ae914ceb13f7f800e36808b42698427c639f0c85093a3682e68ce25467ea48db825c2022675ac45ed1f0e620a2bedfae0a0334a1634fba52f1230668d4918b78bd3130c53a25e103447bbf620f8541bd76f454cbdc7959c2926fc8cc6b27c2a0ff5d93585684b76c51b9df6a5f44cb639314ffedbebf48b17601352aff4742849fce979ae6214557e735c60c6a8b2ed8cb12478b445737e50b980c9b65cd6cc97c35cc23a527103f8", 0xac) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x3, 0x48, [], 0x5, &(0x7f0000000140)=[{}, {}, {}, {}, {}], &(0x7f00000002c0)=""/72}, &(0x7f0000000200)=0x78) sendfile(r2, r3, 0x0, 0x50000000000443) 03:34:28 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x320}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv6_newroute={0x4c, 0x18, 0x200, 0x70bd2c, 0x25dfdbfc, {0xa, 0x10, 0x14, 0x93, 0x0, 0x4, 0x9d04e221d6c1dc90, 0x0, 0x2000}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x4}, @RTA_MARK={0x8, 0x10, 0x3}, @RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x34, @u32=0x200}}, @RTA_GATEWAY={0x14, 0x5, @loopback}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x40) splice(r0, 0x0, r2, 0x0, 0xfffd, 0x9) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:28 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x420580, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r4, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000080), 0x8) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r5, 0x0, 0x50000000000443) 03:34:28 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x10000, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x6, 0x1}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x2, 0x80, 0x5}, &(0x7f0000000100)=0x94b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x1ff}}, 0x10) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x3, r0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000400)="234782d1b9d41cea973a0f9f0d03879f5f61e1413287361e55324fc52a9f0b92aa1c5f1c6224f34b3e672696eaead8839c9e4780584fdaae4cf475d8aad3da48d44aa9754e8bee3d14d71d7aaf0e1a1d3d5378f2adfb304331e347515388ccacf47b6826d76eacbd7c2fe61d284994db1aab53d6cf34e34758ebce85556b3616a3dc7c4aaa15dba9608b44477ca0b62375876ef13bbe7d2b5d", 0x99, r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r1, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/current\x00') r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='rd:\xac|\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) write$binfmt_elf64(r2, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0xff, 0x5d, 0x4, 0x100000000, 0x2, 0x3e, 0x23, 0x23e, 0x40, 0x4a, 0x511, 0x8, 0x38, 0x1, 0x1000, 0xffc1, 0x9}, [{0x60000002, 0x4, 0x9, 0xcc, 0x20, 0x7, 0x40000000fff, 0x2}, {0x6474e551, 0x4000000, 0xaff, 0x3, 0x0, 0x4, 0x7, 0x80}], "cb0402e7bc1ca69e662c35cb5f486f1eaec5516dd1522e7ed1582a8258340840e734f380261d033ef2b5223c711a7c952cca0c11505a7ef6671ece333c8686722d232fd639bbb7930efed2c69d598b5d89569a2d1cd27aee0532fa67a8c8f2f63751089c5546b3070f48372253a8c57541e90019a1f6ac7cc98424f3d09459ed68f05c8fa8817c3e2cb7179e947fd2c210e7ccd7a497b21a237a3d2159462ce422ac9e5d7d7cda390cdc1f6b9bf9816fa119197764fee1f95a9cbf43d9ee03c191226e060599f332dbe33ab560dadc"}, 0x17f) [ 563.641914] selinux_nlmsg_perm: 158 callbacks suppressed [ 563.641929] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23655 comm=syz-executor.0 [ 563.660663] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23655 comm=syz-executor.0 [ 563.673234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23655 comm=syz-executor.0 [ 563.724520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23655 comm=syz-executor.0 [ 563.747444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23655 comm=syz-executor.0 [ 563.762084] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23655 comm=syz-executor.0 03:34:28 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) clock_settime(0x0, &(0x7f0000000040)) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 563.776917] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23655 comm=syz-executor.0 [ 563.790330] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23655 comm=syz-executor.0 [ 563.805910] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23655 comm=syz-executor.0 03:34:28 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 563.814656] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23664 comm=syz-executor.2 [ 563.832481] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) setns(r3, 0x4000000) close(r0) 03:34:28 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000080)=[{&(0x7f0000000040)=""/27, 0x1b}], 0x1, 0x0) 03:34:28 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)=""/4096, 0x1000) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$UI_SET_PROPBIT(r6, 0x4004556e, 0x14) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) r9 = openat$cgroup_ro(r8, &(0x7f0000000080)='pids.c\xdc\x81\x04\x85nt\x00', 0x0, 0x0) preadv(r9, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 563.939452] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:29 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f00000000c0)={0x7f, 0x4, 0xffffff7f, 0x1, 0x5}) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r3, 0x0, 0x50000000000443) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x20003, 0x0) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000140)) 03:34:29 executing program 0: timer_create(0x1, &(0x7f00000001c0)={0x0, 0x0, 0x2, @thr={&(0x7f0000000040)="ec10f2a20b12f07732f7888a18da8dd35146b22185433c758a83cd72a549d5d5a007fbfc78a47da47fd5135448a7ba342d80607b8e4b24fa858435fa", &(0x7f0000000080)="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"}}, &(0x7f0000000200)=0x0) timer_delete(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) splice(r1, 0x0, r3, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) socket$can_bcm(0x1d, 0x2, 0x2) ioctl(r1, 0x5, &(0x7f0000000080)="30d9337c35fd7cafbcc19eeaf30e3e02115feed48772d4d7b302585930913d5b5188fc7a7f09fa14e3fe0828d0e42b53999ce23f12c85ae0e3ca16935d0e56b27c9599a7a686dc74c6d41629fd0bbddfb208a4ef6721514f3c93bc2c") bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x40200, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000180)=0x4) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000100)=',') syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') 03:34:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r5, @ANYBLOB="000326bd7000fbdbdf2514000000980001000800030042000000100001007564703a73797a3000000000380004001400010002004e24ac1414bb0000000000000000200002000a004e2000000001fe880000000000000000000000000001030000000800030020000000100001007564703a73797a32000000002c0004001400010002004e20ac14141400000000000000001400020002004e23ac1414aa00000000000000001c00020008000200280c104b0400040008000100830d0000040004003c000100380004001400010002004e21ac1e00010000000000000000200002000a004e23000003ffff020000000000000000000000000001000400002400050008000100657468000800010069620000080001006962000008000100756470008c000500080001007564700044000200080004001f00000008000200ff07000008000100070000000800030003000000080001001e00000008000300010000800800010004000000080001000600000008000100696200002c000200080001000500000008000200090000000800040001800000080001001f000000080002000500000008000100756470000c00020008000100060000004000010008000300ffffffff08000300030000002c00020008000200ff010000080004000900000013000300080000000800030003000000080001000d000000300006000400020008000100400000000400020008000100000000000400020004000200080001000100000004000200"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000080)=0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r10, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) sched_getparam(r6, &(0x7f00000000c0)) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r11, 0x0, 0x50000000000443) 03:34:29 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:29 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x1f, 0xffffffff, [], &(0x7f0000000040)=0x1}) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r5, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000000c0), 0x4) close(r1) [ 564.738161] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 564.782595] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:29 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:29 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)=0x9) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x4) openat$cgroup_ro(r4, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x51}], 0x1, 0x2000107c) 03:34:29 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ethernet={0x0, @broadcast}, &(0x7f00000001c0)=0x80) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x8, 0x20, 0x6, 0x8, 0x1, 0x77, 0xff, 0x7, 0x40, 0x33, 0x9}, 0xb) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r1, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:29 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:29 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00\vvx\x82\x13\xf1\xd3\x96\xb5\x05\xf1\r\xdfQ\x89\xaf\x90\x15\xc5\x95\xb6\xad\xdf\xa3\xe7(\xa4~\xd2\xa8\x9e7\x18\xb4\xf9\xda\x8e\x95\xd6\x1a\xd7%jE\x9c\x997\b\xc8\xf8\xbcE\xe0\xa6\x13\x18\xfb\x83\xe9\xf8\x16\xefu\x03\xddw\xc4\x1f\x88\xe5\xc6\xc2\x8fL\x88\x16\x95\x81\x8f\x14\xe6\x8f\xe1\n\x17\f\xb9\nB_B\xf0\xcc\x86\x01\x06\x8f\x91\xc2\xfdr\xa6\x91n\xa4\x99R{AV\x92\x14\x86O\x9dVA\x0fJ8\xf3\xec\xf5+\xd3\x9c\xac+]{7\x80xh\xca\xe4\xf1e\xd298*\x96\xe3') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:30 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x4000010, r1, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_S390_VCPU_FAULT(r3, 0x4008ae52, &(0x7f0000000080)=0x6) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f00000001c0)={0x17, ""/23}) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) socket$inet_smc(0x2b, 0x1, 0x0) 03:34:30 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x209) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x4b48e70, 0x1c1800) ioctl$VIDIOC_G_STD(r4, 0x80085617, &(0x7f00000001c0)) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r10 = openat$cgroup_ro(r9, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r10, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r11 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$P9_RMKDIR(r11, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x22, 0x1, 0x1}}, 0x14) 03:34:30 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) r4 = accept$alg(r3, 0x0, 0x0) r5 = getpgid(0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r6, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x6, 0x3}) fcntl$setownex(r4, 0xf, &(0x7f0000000040)={0xfa43c3627109ad2d, r5}) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$TUNSETPERSIST(r6, 0x400454cb, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) 03:34:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x25d, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, &(0x7f00000002c0)=0x8) ioctl$sock_bt_cmtp_CMTPCONNDEL(r6, 0x400443c9, &(0x7f00000000c0)={{0x0, 0x92, 0x1f, 0x3f, 0x2c, 0x7}, 0x4}) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$SG_GET_SCSI_ID(r8, 0x2276, &(0x7f0000000080)) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) mq_timedsend(r11, &(0x7f0000000140)="9537ab8da2dc5682b7db516ca2aa9dbe2f01dbd16392b33e74df8403d3fb78e4e0a75567d324b57d79b3e8414148a70f5b45ba42f4880e83058dba8d321f9fd815b9b5c890fa8dd4faaf7933206a79d5499a85c434d131e9a47f745bfa850d162497c5e866275330fb94ff03333e1292f38347e66b26a1", 0x77, 0x3c37, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x1c0) 03:34:30 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$EVIOCGMASK(r7, 0x80104592, &(0x7f0000000100)={0x4, 0x34, &(0x7f00000000c0)="efb8c3b936b9182f0b8aae2c91c9424aba20332bfd71e7733836a44b8e7326afb506fa95d70f189632e10d7d85faa2489eb4baff"}) r8 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x4, 0xb5b751908c2b9ca5) ioctl$VIDIOC_G_FMT(r9, 0xc0d05604, &(0x7f00000001c0)={0x5, @pix={0x3e2, 0x812, 0x56555959, 0x2, 0x20, 0x1, 0x0, 0x9, 0x3, 0x4, 0x0, 0x5}}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:30 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000080), 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r3, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 565.582505] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:30 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000280)=ANY=[@ANYBLOB="00a4e56b2b830000020000883c0c2e00", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="086a94eba4f10926be7ebd50b81f2bbcf8146ce5e920d734bb75aee2ba3f66b5d8de76c1a47d24a5e7822e6c8d06a570a624bf4338df9c301db77f24d5c19009d13c35cea6143e4ecd2603a543df29bab6ad1fbc17f69dbae5494d70f57d2a0b"], @ANYBLOB="6000000007000000080000002f000000ffffff7f02000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="81c05b76876421d5356a7179ab14f75e72c0d824c4a612cf931061856e1ebb6a240182b70eda1b450c38fe38c8b4b468c6526ca292594be2bfc6ed560ec0d3fcc01640afe07f7b38fe0dcbaead4991c24f05d15d21c878ed"], @ANYBLOB="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"]) close(r0) 03:34:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r6, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x17b, 0x80, {"71250caa8ef4d5a94c6c126c083b99c7"}, 0x8, 0x1ff, 0x7}, @ib={0x1b, 0xff, 0xfffffbff, {"8562a30178b185b9b055ff1d0334c14b"}, 0x1ff, 0x200, 0x80000000}}}, 0x118) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:30 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000080)={{0x0, 0x7530}, {r3, r4/1000+10000}}, &(0x7f00000001c0)) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r6 = openat$cgroup_ro(r5, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r6, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:31 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) recvfrom$netrom(r5, &(0x7f0000000040)=""/114, 0x72, 0x2002, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r7 = openat$cgroup_ro(r6, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r7, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:34:31 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)="f4d91636f8fc0e8a5ccea5dc9f88159c2581d366952d60ef21b970403322925ca1628acbe79b19a755d135cf298cb9e0f327091ae9877e6518bc162bb66a9984afa52863126ed78aafb7d2c674c0c1c9048dd1d33a64d8055ae92df8ceefab9aabb4590e7c0cce10168b26fb71835df19c4b709df290a5bec4486b2f45a0b836eb8dd4c9ee", 0x85}, {&(0x7f0000000100)="2a08715d8a207b614b30e0c3c12b5c610f8d7b375f5c702b3c6ad68ee6dba75f78b3649f0ce33e93794e010938513e5d2d94eab35b9fb0d3f60701c622fb1224282505cf6c0506d50c5adb9c41f9", 0x4e}], 0x2, 0x8) 03:34:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r4, 0x4010744d) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r5, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x0, 0x0) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x2f) r7 = accept4(r0, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) 03:34:31 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r9, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r11, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r13, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) sendmsg$TIPC_NL_BEARER_ADD(r7, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, r13, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe29}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x22000055) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:31 executing program 5: 03:34:31 executing program 5: 03:34:31 executing program 5: 03:34:31 executing program 5: 03:34:31 executing program 5: 03:34:31 executing program 5: 03:34:31 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100)={0x4}, 0x8, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0}) close(r0) 03:34:31 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x20000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="0e004026b8be32657db919b994e0cc9a8a85039790f8bd0bcfb3511e0f688c1fc086b7f7a5430e5d576b4effcd49fec753926d71d6400610dc9951fa63fb301a085abf27f422799c875f2f8fbc1a0b1fcd10f4622e429bde033f6948f51c60308f16597a4a9b2f43c59643d878c4b5de16169836aac93209", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000400)={r6, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000180)={r6, 0x1ff}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r7, 0x1000}, 0xc) r8 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r8, 0x0, 0xffffffffffffffff, 0x0) r9 = getpgid(r8) perf_event_open(&(0x7f0000000000)={0x2, 0xd, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, r9, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) [ 566.723119] vhci_hcd: default hub control req: 0400 v0000 i0000 l0 03:34:31 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 03:34:31 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8, 0x5, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff7ffff, 0x0, @perf_bp={0x0}, 0x1}, r0, 0x9, r3, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) 03:34:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x8000000004, &(0x7f00007e0000)=""/4, &(0x7f0000000040)=0x4) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) 03:34:32 executing program 0: shmget(0x1, 0x14000, 0x54000000, &(0x7f0000fea000/0x14000)=nil) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000040)=0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="73797a30d65d2bc649336e62f4ec73cf483fe547f98aa63f38e8d35b1e7a09f113b680000000000000008186d3961723f26dec480d0ffb340d412f89c3a75260f8449e40176ac5ad893f987b9c3caf84667a8546b450133f1a7189"], 0x69) splice(r0, 0x0, r2, 0x0, 0xffff, 0x4) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$IMCLEAR_L2(r7, 0x80044946, &(0x7f0000000140)) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r4, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) ioctl$KDGKBENT(r9, 0x4b46, &(0x7f0000000100)={0x91, 0x5, 0xd4}) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0x4d, 0xe, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x50c) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:32 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) syz_kvm_setup_cpu$x86(r7, r10, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000400)="6b4007ca0fc77c000f795fefb85d018ed0f30f09ba2100ec2666f2ad66b8000001000f23c80f21f866350c0040000f23f8660f3831cf66b9800000c00f326635000100000f30", 0x46}], 0x1, 0x52, &(0x7f0000000200)=[@cr4], 0x1) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000040)={'bridge0\x00', @random="5ae698a9a43d"}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r13 = openat$cgroup_ro(r12, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r13, &(0x7f0000000180), 0x0, 0x2000107c) 03:34:32 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000980)=ANY=[@ANYBLOB="300206400fa623535141485747903bf19a05b8b56f7ada5869d18d01e58e0b4f7a2f9e96fe7c8a645add0000000000000000004d3facd6697c0dee9805fe97d83e95cf6f587aafa8aa03423f758ba03e3d6f2945e7bc93df09f2fa7fff3d182b33b637f8079f19f70cc81855e46f2fb00071fc23d63998b16cc4afe434c9a0224af77a86c78368f772d8fd39d4f1799dabe505c49064119e5aaf608da859990d79ad5ece1d6af3dfbb56ca78816f194d0d5a7b7de08c0144ae06ee94cc8a7693308baeda23eafee2cb9fa7367d87b7b48021822fb332f23c401f9166d2a1e5c7f4307448", @ANYRES16=r5, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) splice(r3, 0x0, r1, 0x0, 0xffff, 0x4) open(&(0x7f0000000040)='./file0\x00', 0x240, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 567.199566] kauditd_printk_skb: 47 callbacks suppressed [ 567.199575] audit: type=1804 audit(2000000072.129:461): pid=23874 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/737/bus" dev="sda1" ino=16768 res=1 03:34:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000080)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) mkdir(0x0, 0x4) creat(0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000000)="120000001200e7ef007b0000f4afd7030a7c", 0xfcd1, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:32 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8, 0x5, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff7ffff, 0x0, @perf_bp={0x0}, 0x1}, r0, 0x9, r3, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) 03:34:32 executing program 3: perf_event_open(&(0x7f00000000c0)={0x5, 0x6c, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x1}, 0x10) [ 567.986761] audit: type=1804 audit(2000000072.919:462): pid=23882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/737/bus" dev="sda1" ino=16768 res=1 03:34:33 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r4, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) r8 = accept$unix(r3, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) poll(&(0x7f0000000100)=[{r1, 0x4010}, {r7, 0x2220}, {r8, 0x1000}], 0x3, 0xff) writev(r4, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r3, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:33 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) dup2(0xffffffffffffffff, r9) ioctl$RTC_IRQP_SET(r6, 0x4008700c, 0x1035) write$char_usb(r3, &(0x7f0000000080)="3312f2fddaa1d887a3ce89004fe18df802", 0x11) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000040)={0xcbfeaebcd9b0da99, 0x3, 0x2, 0x6, 0xffffffffffffffff}) [ 568.109396] audit: type=1804 audit(2000000072.919:463): pid=23903 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/737/bus" dev="sda1" ino=16768 res=1 [ 568.177266] audit: type=1804 audit(2000000073.099:464): pid=23914 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/738/bus" dev="sda1" ino=16772 res=1 03:34:33 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0xffff, 0x1) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'team0\x00', 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r9, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000940)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001340)={0x0, @multicast2, @remote}, &(0x7f0000001380)=0xc) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r18, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r15, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r18, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r19, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r18, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r18}}, 0x20}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @empty, @dev}, &(0x7f0000001580)=0xc) r21 = socket$netlink(0x10, 0x3, 0x0) r22 = socket$nl_route(0x10, 0x3, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r25, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r22, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r25, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r26 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r26, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r25, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r21, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r25}}, 0x20}}, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket$nl_route(0x10, 0x3, 0x0) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r31, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r28, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r31, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r32 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r32, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r31, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r27, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r31}}, 0x20}}, 0x0) accept4$packet(r0, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000016c0)=0x14, 0x80000) clock_gettime(0x0, &(0x7f000000bc80)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f000000ba00)=[{{&(0x7f0000001700)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002900)=[{&(0x7f0000001780)=""/129, 0x81}, {&(0x7f0000001840)=""/167, 0xa7}, {&(0x7f0000001900)=""/4096, 0x1000}], 0x3, &(0x7f0000002940)=""/172, 0xac}, 0x7b}, {{&(0x7f0000002a00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003b80)=[{&(0x7f0000002a80)=""/196, 0xc4}, {&(0x7f0000002b80)=""/4096, 0x1000}], 0x2}, 0x5}, {{&(0x7f0000003bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003c40)=""/98, 0x62}, {&(0x7f0000003cc0)=""/4096, 0x1000}], 0x2, &(0x7f0000004d00)=""/4096, 0x1000}, 0x8001}, {{&(0x7f0000005d00)=@caif=@dbg, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000005d80)=""/31, 0x1f}, {&(0x7f0000005dc0)=""/217, 0xd9}, {&(0x7f0000005ec0)=""/4096, 0x1000}], 0x3}}, {{&(0x7f0000006f00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000007580)=[{&(0x7f0000006f80)=""/88, 0x58}, {&(0x7f0000007000)=""/239, 0xef}, {&(0x7f0000007100)=""/214, 0xd6}, {&(0x7f0000007200)=""/122, 0x7a}, {&(0x7f0000007280)=""/166, 0xa6}, {&(0x7f0000007340)=""/248, 0xf8}, {&(0x7f0000007440)=""/151, 0x97}, {&(0x7f0000007500)=""/94, 0x5e}], 0x8, &(0x7f0000007600)=""/26, 0x1a}, 0x5}, {{&(0x7f0000007640)=@rc, 0x80, &(0x7f00000088c0)=[{&(0x7f00000076c0)=""/1, 0x1}, {&(0x7f0000007700)=""/4096, 0x1000}, {&(0x7f0000008700)=""/162, 0xa2}, {&(0x7f00000087c0)=""/197, 0xc5}], 0x4, &(0x7f0000008900)=""/199, 0xc7}, 0xb19}, {{&(0x7f0000008a00)=@x25, 0x80, &(0x7f0000008b00)=[{&(0x7f0000008a80)=""/98, 0x62}], 0x1, &(0x7f0000008b40)=""/103, 0x67}}, {{&(0x7f0000008bc0)=@in, 0x80, &(0x7f0000009300)=[{&(0x7f0000008c40)=""/130, 0x82}, {&(0x7f0000008d00)=""/38, 0x26}, {&(0x7f0000008d40)=""/237, 0xed}, {&(0x7f0000008e40)=""/246, 0xf6}, {&(0x7f0000008f40)=""/243, 0xf3}, {&(0x7f0000009040)=""/110, 0x6e}, {&(0x7f00000090c0)=""/236, 0xec}, {&(0x7f00000091c0)=""/168, 0xa8}, {&(0x7f0000009280)=""/70, 0x46}], 0x9, &(0x7f00000093c0)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f000000b6c0)=[{&(0x7f000000a3c0)=""/192, 0xc0}, {&(0x7f000000a480)=""/251, 0xfb}, {&(0x7f000000a580)=""/248, 0xf8}, {&(0x7f000000a680)=""/54, 0x36}, {&(0x7f000000a6c0)=""/4096, 0x1000}], 0x5, &(0x7f000000b740)=""/200, 0xc8}, 0x4}, {{0x0, 0x0, &(0x7f000000b900)=[{&(0x7f000000b840)=""/183, 0xb7}], 0x1, &(0x7f000000b940)=""/180, 0xb4}, 0x6}], 0xa, 0x10000, &(0x7f000000bcc0)={r34, r35+10000000}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bd00)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000be00)=0xe8) r38 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r38, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r38, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r38, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r38, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r38, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r38, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) getsockopt$inet_IP_XFRM_POLICY(r38, 0x0, 0x11, &(0x7f000000be40)={{{@in6=@ipv4={[], [], @remote}, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f000000bf40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000c040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000c080)=0x14, 0x80000) r41 = socket$netlink(0x10, 0x3, 0x0) r42 = socket$nl_route(0x10, 0x3, 0x0) r43 = socket$netlink(0x10, 0x3, 0x0) r44 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r44, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r44, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r43, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r45, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r42, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r45, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r46 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r46, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r45, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r41, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r45}}, 0x20}}, 0x0) r47 = socket$alg(0x26, 0x5, 0x0) bind$alg(r47, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r48 = accept4(r47, 0x0, 0x0, 0x0) r49 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r48, r49, 0x0, 0x50000000000443) getsockopt$inet_IP_XFRM_POLICY(r49, 0x0, 0x11, &(0x7f000000c0c0)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f000000c1c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f000000c200)={@broadcast, @rand_addr, 0x0}, &(0x7f000000c240)=0xc) r52 = socket$alg(0x26, 0x5, 0x0) bind$alg(r52, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r53 = accept4(r52, 0x0, 0x0, 0x0) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r53, r54, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r53, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r55 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r53, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r55, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) accept4$packet(r53, &(0x7f000000f440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000f480)=0x14, 0x101400) r57 = socket$netlink(0x10, 0x3, 0x0) r58 = socket$nl_route(0x10, 0x3, 0x0) r59 = socket$netlink(0x10, 0x3, 0x0) r60 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r60, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r60, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r59, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r61, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r58, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r61, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r62 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r62, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r61, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r57, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r61}}, 0x20}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000010000)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f000000ffc0)={&(0x7f000000f4c0)={0xad4, r3, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x144, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xef8d}}, {0x8, 0x6, r20}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x184, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x278, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r33}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}]}}, {{0x8, 0x1, r37}, {0xb0, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x67}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r39}, {0x80, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x200, 0x5, 0x40, 0x8}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r40}}, {0x8}}}]}}, {{0x8}, {0x2a0, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r45}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r50}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xce3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0xe27, 0xb0, 0x8, 0x45}, {0x7f, 0x6, 0x9, 0xee}, {0x40, 0x58, 0x1f, 0x10001}, {0x3, 0x5, 0x69, 0x9}, {0x1, 0x8, 0x3a, 0x7}, {0x6, 0x0, 0x0, 0x200}, {0xffff, 0x4, 0x2, 0xfffffffd}, {0xfff9, 0x9, 0x75, 0x80000001}, {0x9, 0x9, 0xf3, 0x1}, {0x0, 0x72, 0x6, 0x1ff}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r51}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r56}}}]}}, {{0x8}, {0xf4, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x543}}, {0x8, 0x6, r61}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}]}}]}, 0xad4}, 0x1, 0x0, 0x0, 0x4000}, 0x800) 03:34:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$update(0x2, r2, &(0x7f0000000100)="14e4d44a16105dc24723c94d8ef2df6522ad6f88015f3dd9ac06275f6e32477ecba331281026a29b8dbdd5b16ccb3e4d05c6ea085027c2aea16aec07586344e022b9f2b1a346d5974d8d1a5de09e03acb7dfee39d750030f8c242897fb3b3e713f41784b3ef293518558cf87ccd453a686e8bbc7c61463efd1e0cc796a3b68a0b2ff1e4e971e4d6096960c03fcaf71f9a51e8ad0b589f45dc8fa7998451e3b7d9cce5d9e088f0a2c3b2e5e0e2093e524f40c3aad75e9944a43ce", 0xba) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r3, 0x0, 0x50000000000443) 03:34:33 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8, 0x5, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff7ffff, 0x0, @perf_bp={0x0}, 0x1}, r0, 0x9, r3, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) 03:34:33 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x9) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r8 = getpgid(0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000140)={0x0, r8}) sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$INOTIFY_IOC_SETNEXTWD(r7, 0x40044900, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='ppp0\x00') sendfile(r4, r9, 0x0, 0x50000000000443) sendmsg$nl_generic(r9, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50180}, 0xc, &(0x7f0000000080)={&(0x7f0000002680)=ANY=[@ANYBLOB="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"], 0x1200}, 0x1, 0x0, 0x0, 0x40085}, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001400)=0x0) sendmsg$nl_generic(r1, &(0x7f0000002640)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x22000000}, 0xc, &(0x7f0000002600)={&(0x7f0000001440)={0x1190, 0x3c, 0x1002, 0x70bd2c, 0x25dfdbfc, {0x20}, [@nested={0x117c, 0x6b, [@generic="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", @generic="086214de7b3b3d7d2822f9bc680ecd5f68b92bcc3ef161d9b8e4ef5706fa4d4a", @generic="b9080f9e0b3165942f06ab9738a92cfeeb8d4832456dd396a64a0448c6a5c05ab36fdb73d038f159e1131e541b7bba29f23ce635098456176c4321d31982e598fac707e339f83cc59a19e2c570a291d8", @typed={0x8, 0x7, @pid=r10}, @generic="dfd96260b3b47a17a386e490baa3e993cef495e4f92197676b6e0a9fca9b8841715ffadf1a28138da9988ad07b36b57891a2b9199721140e1688b5c06881664560d8961229001a16fa17641f9d245ec79ec7ae1d004bf944d93716a57727a2b1a3a8c241073b8bc306db4538e44a5ff8ef50526ec91f4f3c842cc2f38f2289fa5d19f98665411f5977f88e5d1cdefc77d86ac060335890c5768d8ad9d5d296a125e64af0da133b8b1eb5f7f3ae1c018c639421640a64a149b1045ff13bd19a5a0f0a06a7e8a5a21832bd902956a80c18c21255cc24efd4df41ba6a488153168f85b27222bd778eac073b654546883352f154807cdec82e9c95c25bd8a4c69c9e47cb776e30598fd2996cd7a3647d05fffa4e6201559e13373c59238f82d091fd525dd04eb1810ce119d985cf5570c188e0282e2446944a4c9489826d30af5c061f25e6d2057eee74ba1b91ecc0555cd4ec09e2878ab1c9a01dcc7373f64f5166621c67c58f3d76e704834841715ef51e63f1acee4071a9f7c5aa9e482298ee840726f6b55941c84fc2ff770f4c6275cf53bfcdc8d4418fa3535f0b172d376b8824a04f1bef0708358d43bd9a236993935371df90264ada3e24a077cca41c66e9a1b350664b0990b8889e9442d11d71486b722b0f0afd841d53703bb84b4f6475268f71bd864fbb12d1a294222c71aa1d89d3fd19530d3096bca54697abdbb73afe898c29a8ddb3bce5c708c9ac3b6ce7a290911d2e8b0cfead0c3d1095bd5e191d4e69ddbc7f90501e7162a8e59a3dd41e267752334a7bd3e9fc137e0b1a0ada6aa698d1b61f965534a7a6ac36052d9910b516b6a4f88a1df0d7221dd1efe83cae4f69963c04c86c26015c2d16dfe31f5bf70161e726a5e2550f2312ddf9a0677d5ed1c61754fe538f4f7b1a7fd7108026c0408ed66d50dfd777bfdf90b3a8d6a8ead1f7c9ee588abab87fa93b8cff0a50d3be5066e84be26ca3e835c1c61b373c15b3e7cbb20de01969d95b170314563af42219869a4614e44b9124645a18ce6164f991502a56fb16e1ce589747c73cdfe6f0a5161715319f5b7c69f4c212d003d4c4d72c8e984f4bb498f4b3ac671bce20ee978d492665c045b9449a46967cf1a9387ac3d1a33fbc3e3593b8a2d5202b731b8dcc905fd10a88bae3fbfc29c287914834c9c2f7830e4e425a063f6cfc2eea227799e5bc2b178f804a72d2a374658824470f34ca238ac77b869ad6eee28a1051bf344f3c05c64a91dffea8dc357d2b46b2e2f308bebcdbde78829e81818fac82185b61a193dd12bcabcadbdd30a50d93460cc5e20bfa68648034ed8795df8a715ca8928e75562e2b75f98cf36126b7994d8eddd05065b4e45a94b7e47e28e804f35975a9d28bb8b2fbf305871c7c30a97c5b4fe908135c5add87da2a6b8e2f2dcdd2dfceaa5b22f9fc8f02d0ecdd2f02dfad1e4ca2745df59fd287566642e364eb2207ccbdefc3803c11199609ce1e8739a11e02af0355878a620c8e01ee1db8427747eff7b0f7f781e31c18fcaf9d30a2dd88a230749faae654a619b29685ab9b41f958b42854e5ee36be796b85bb14cb554da1a1f320582c86dfb94605f7a653d21c337730c7d71144f9ef0c31f4ed0d3ec5a05b7728f3777a3b7dfb5bf47d79fd5ec6f1bad059ea928c79eb27287d3937f1b6d53a83bef2b1f775eee6bcc3383e97e2d2e21c86356f1d2936e44821ae6171ffb577b35c4255dcac4e592719807433c0266088c6c153341e62dcf9ae1b4857c8392106d331d20485aedcbdbe80eaab2ec080d33ceb912fb0d2555f27f6bb2a6a8963dbcb34898e0d21c09c8068c7f900b9455d93b765eebf927bf5ca2f9d2fe8e626c81f9740256fd0fdf0380dd3e732e7fb9479ece57adaf065e8ae096dce4205d97f4f8ec9ab59f8e3a04247b9f2b9428bf0089fa967761c865a5dd82ada48a468c149989a9dd9488b7353a2147cb262e6ad65f3721c5babf03d716924765befb6665b8fb31a1a1b7f4c82ba9d9e96abe4310cee73a3fe048da429473bf5e1d540fd2a6029ff88a8d649a0171ef31cce65bbce31c5556cda760a04d36c08ba6d9a5ea3210c5effb446350855fe9e77c50009925beb32122a7a9fdafc747df17c013e004860d5b5ae0e5f12097de9eba54cdeb29d0cb0342bbb7003cb45ccb62929e45371d819c4905dc7bccf884aa0c0b78e50c5c17cf033d859ea0e469849666e2ab7276e496ce87a7fe923a44602739fd8c4139dc742ec01a66c935dbcef4643567200c60fe6692093b581e83b789e27d27bdf919a973727e57ff06506952ea0818fdb27ffcdb900eb457fdff6973868e9fe5bb230a6a86712adf4c0172bb5b76d38c7ff011d4ac8a87fe8b0136e0ce7ade73eaccb16cab8b0ee5f4240ce0b4a8e1861958c56948a383f6b4094a90a2a26eb601ea36a0e64ea14f564c09510efbee754107e9c71d11c5dd6ef9f80eb35716fe71afc6b30a83443471a9ef9eeeef3800c96682e6e1ff719d85a3a6eac4d5b2993d5dac1ddd68c9949fb34be25280ad16495819e1ae87fa84163289f9945af1ac38e014fa9d87e761d4187ff187314d1a6a16dcb495bf2d95f4106beaaee35ec0b5c8dab49e2299b317b6d80247a720a971723751fa9c026573f8b7d6f198041033077e13cc8478971ab53c4db79f307056d9ebb57d4a74d46e966bfdb8c3339f5c9e69149aeca1ae3afc7ddbe0087813e802201a4999f2080dbf2fe274a30591d41daf2833277b2ecb7f319478b373bb0e906c3f96afbf7a852fc835afb522dc1c90ca9ddefe7106945893912cb74bf86fef8ebf682b78c297116227bbd54b15a706c2a8caf4386814d4b8f3651900122023517ea7d2aefe0e5b149dd20fae2f3b0956dbb12483e55cd3c10afa977bc52935e82982777a3b73c180324e1f73c96b9015b1525ec52144a1d9539f7e9d126228db596dfe1d374bbb84cff21066fbcd8b49845e936ee4ddc3383c0e9ef7e4ce1123bbaa9f433181a6612cc032c1016474c4e318fac8b6b23f6b5a6546df1191cf4073e03841711bb4c137c6acab8c8825ed294b0beb694de32cc2e06445ba73e36ce0cc998eebf29b13b7c97c49a1e06c30e034b06337d3dcb39427dbc30202d28431216e8f89b282f91401a0716cd4b813debdee9eb5daee82b23dc8b2e54c097c5a9c83567f060ddc1a2fbc9cf71b7a5a152082fab4c419dccd9e9f51cb15c8eb7f3352e2c3795bb5776e338cfadee18ffcf9b6c8a3221b3bc936c385c7780072af7f351b37fe976463ad595d8dbf5fe6ce6823c6c0778d228f3e2c84b4c1555732d3282c342b4ca09caab66d1ec228dbe5eca2228ee12b4a73af3a11306240722b73d020e49884bdfd01c12835327a3ef1246423d2e4cd98c3bd7d490a597e56737b137eeef93c38ffa566e317f1b6b9ee0bd7aa25899bb6487913c705a364ea82e868a1df79b9ddcbb63f250b734ea80b03564c96a2ca9d6b5efa15bb2417ce2b8c3715d7309ba3b53c2bfbf60970e640c59a05aa4eeed0b0b34210c846b06d911932c30d4c46ec3b7571580f83b51e07374e31816b73e9cc2297c075093b8493af229af873f40c4160943135e8b4e11e96ae71be32aae03e3ad1ee9b9b3b21269cb9314dd2ea40eb7e699f9268329e41adf04bbf909238812ae941bd7d4e1f4ee9e0f65dd1e9a4de6479423bbb940e22270b804108d43005a5aac89d32139783b89b9030d9f5b92c735d594c39c91c234007c58db8598fa8948d86516b1a93b1689e9fa7a4650fd6d32136b4aa6f3fa8c23034c380c29fd87e42794530dd1017dc191ee5d10e6bb858d00f8490ece93916474d8fa2b1e5dc5abe13f31c96fa429a4687ce4d13f76d9e200b7a3fe90ad71644fdd8169be618fc0b3d9dc559f4d689170b215f1016976d5ecea8fe23e9a89d049c00f07919cc9fbb2bdbe2e095ea90c63a242c7f3bb3386c49b0d13a2bb954026a7ed53788242d33a644086cf6027d263824413bcef1eeac3ec343af19df052b6f0c2c55ac8ea4214eeb9bd49d3ac4f46f41bd7cac584db7d05d37d7534fd1d495ca77beb7337dc64467f4a703317519def99cce5b9e3922a5977ec200913a713eb24c15ceffeff924d15cbc689b686b4fc4252ccd3cf1f21b45b151e90be52f5f1724c6f43e0367d6081a01a212c0ee646000216f3a8eeb514b7e0cb2fcca0ea7f0012b820ae27a0071d503086d19473bd60450aef79d82f3466d5b982ea6ce297c9bd5d7a4dae72a54f8865c75ea9533e7144f9b9b8fdf133f448f47f0be233c94bd15589fab2464720dd8a6c2014ed415bace44cffbc4c6af1a8aeba930dd5cdcfec9da9aad5e277dc89f55a7f069e99b1a88ecc4501939bfc4febdbbac72c0870311fc72340f747573a1303301d838bb431891120ffc20c290b9dbd478f675cac59738cef01e3cd998bc7af2627cdd19be73f027d7befc2d1cd5b5a9eff6d801948d0c866027ce30d29fe8ad4a6bcf11ac9cf14d598f8b8d03eafe068bb41ad0565dbde81633bf9883c0a0d2ecdb8d3100c9a558b75593919c1823c92e513f7d44303704e54788835f15806b986a3f81f5ca47f5684bc64a4af1365864dec4f43f93f9438523d45e60f10cf0bd4665dde19bbcbac6019bd4c4383f2eb62f58b4b9a42809ee0924440c64a72419cd191d9318cdb16fbab9055ef711bd095ece86c7a0aaaf8e0fb7d34614dd85efc8ab99f0e62778baa8d85756d3766bfcee41f02700a1e8cf8db6ff19b9c546d2b7942f9729a959d102a862995d59dd37add929346cd520dd2bd813b336947c9ab32a9249f14a613b49cf0e03c475cf04dcebb25146982d5b8df3049a12e832c0181b193d637efb32aeeb11dfec7eedd8b977fb67491ba56ea86b27619115c30afaf5d84cf2b60b9ff690e76fd70072b78295f4efb80d132efbbd98389f49a8d2fd4adc4b9fce60378aeef7456fa6caecd72c8b97c4ca27fe9d1d12f6a38caeb3b492ea10fcc0eb35a06985b04a0cf2201c5d8a94d5c9b022ac09b5d6665b000d2a9f58e618eea6f53f449250cf616122b1cd2a391523b02b703c9e0867542b043534d2d776a848227156253ede3384441935477fc89af25fe50dc0edb35960f130c5664fc29c21c7e2cd0b7e61ba736a0f4c5134ffb9548e3574a64b402f6b1c1bb393e7792cc0f593dae2aeaedfd559e790295c248bf7bf62b797ad696c7628fe67f63b3e0ae836854db7f347de84b590af2e2b39d5a2faa7246ec3101f80b60174cb03f86b1ba19f6b0be13d759ec970b5bb7f85c1b619dcd029a3dad972ff849c5468efefe4d21b18da7dfe39399fab0eef5958263e97f5bbc1973e0cf126bbe8c918990213a78a1a210df4ba1852de84e947ced4e72ef538fd46511ce9cdbd5d6e544a3e7105c64d95de0a3f79614ca7d3891d1dc3fe7dc293a7d12af9cb6233c2e4711a9bfbf1ca778f4ebfc909d9296466d0ba3d6bf6dfb7264bdef0cab9e716e32c8350f3fbb9d2092cd20f9059e58f0a77dc7a2aec36d9601585c440831cef7a02a1291f473ac3ad5cfd28b9ea928b448218bad0ad7711078c24cf9e0581810f839d46a087ba1e7b23d569547afe9ef6dd16da75fd846771c88ea14c59c04657d483b6a59319cdcc1cfd572e9f2aa927d929384779b32e3285aa0041e412ffbcc9e6fcffe8dae3ee2999ee4fdb46ed9b010d3b72c51fa2ed56210941bac44c52c84358ed83079bbe161bd5baaea74012343e70bc12a17bc213b7b50348b6d1ec0dda74edbfdc98c456d3c46"]}]}, 0x1190}, 0x1, 0x0, 0x0, 0x40010}, 0xb094a352417b670a) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0xc4}, 0x84) r6 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f00000005c0)=0xe8) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f33394f9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044000500e0000001000000000000000000000000000000006c00000000000000ff0200000000000000000000000000010000000002000000000000000000000000000000b6ed19456375ff4f2ced728f8b3b6025626d9a9b1518b369e9a22c5d0f37ba3ad7fa9214039180980cb8d807a3253a378cee6d26de44d81425ece98958bccfefa7b8e3f64fa8bbe82e25076e77c22927346ef3780baea15001cc1295d0c2c6b6fbef53f82976bd2d481a9e3bfd185e5ce452d5770b0ac989742253429045324896f90c10d8fb9b99711f1ad298897b6c3ef38207181684dda141bdaea059b520cbfebf932dbdd055962ffbbbf2f0a52c02be74ac1d21939322171a22edd0547b7211a862bed88bebe1a89f"], 0xfc}}, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r8, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r9, r11, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) getgroups(0x5, &(0x7f0000000600)=[0xffffffffffffffff, 0x0, 0x0, r11, 0xee01]) lchown(&(0x7f0000000580)='./file0\x00', r7, r12) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r6, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) sendmsg$NET_DM_CMD_STOP(r14, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x102000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x120, 0x70bd2b, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x8800) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000140)={'ip_vti0\x00', 0x8}) r15 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x80) r16 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$TUNSETTXFILTER(r16, 0x400454d1, &(0x7f0000000340)=ANY=[@ANYBLOB="02000700aaa2aaaaaabbffffffffffffaaaaaaaaffff000000000000aaaaaaaaaa29aaaaaaaaaa12ffffffffffff"]) sendto$isdn(0xffffffffffffffff, &(0x7f0000000080)={0x2f20, 0x8, "50a133cd6ee96686be48165981cf2b6aed12d9af0d2d3535a3b8c47672d31ba97f11424950d5032dc7f705240eb63bed5e9b00d0da332f36fcbfa22a9b9cabaf42cfdc44dbaeb169e0993b"}, 0x53, 0x1, &(0x7f0000000100)={0x22, 0x45, 0x6, 0xc6, 0x48}, 0x6) r17 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r15, r17, 0x0, 0x50000000000443) [ 568.899465] selinux_nlmsg_perm: 140 callbacks suppressed [ 568.899478] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 [ 568.941482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58957 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 [ 568.954177] audit: type=1804 audit(2000000073.879:465): pid=23918 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/738/bus" dev="sda1" ino=16772 res=1 03:34:33 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r3, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000900)=ANY=[@ANYBLOB="2e0c000037dfa5907b1e4e2f688802a2cd8f49015f4e53d874f501603e902ec118ead1408946e0dac3233b987e02ebf04d72dd3a103e1928f8cd23c43fe9369f99e5a8d16f249afd978ff5ea046631c248f3b7e5579ef0e8dcca4d24bbf0b1bb95", @ANYRES16=r10, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r14, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r14, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r14, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r14, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r14, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r14, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r15 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r15, 0x0, 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="04c65d0ac14a36900389111b7d48faaaf032d700ad4317792440f6c0b1f1b9afa61b1916ca0b495e933226257792015052f2ed2dd4b5746859993883aa17f34236bafde2a729491980f250c7afe66054", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYPTR64, @ANYRESHEX=r0, @ANYRES64=r4, @ANYRESHEX, @ANYPTR, @ANYRES32=r14, @ANYRESOCT=r4, @ANYRESHEX], @ANYRES32=r15], 0x5c) [ 568.996716] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43404 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 [ 569.017136] audit: type=1804 audit(2000000073.889:466): pid=23950 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/738/bus" dev="sda1" ino=16772 res=1 03:34:34 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x8f9cd01}], 0x1, 0x2000107c) [ 569.052358] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 [ 569.080600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 [ 569.112097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 [ 569.124941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 [ 569.139280] audit: type=1804 audit(2000000074.069:467): pid=23958 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/739/bus" dev="sda1" ino=16779 res=1 [ 569.175137] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 [ 569.189357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 [ 569.201823] audit: type=1804 audit(2000000074.109:468): pid=23958 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/739/bus" dev="sda1" ino=16779 res=1 [ 569.229144] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23937 comm=syz-executor.0 03:34:34 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}}], 0x362) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000040)={0x10000, 0xbc2, 0x3, 0x4, 0x6, 0x1000, 0x100000010, 0x1}, &(0x7f0000000080)={0x8, 0xffff, 0xfffffffffffffffe, 0x4, 0x2, 0x80000000, 0xb27, 0x860c}, &(0x7f00000001c0)={0x100000000, 0x5, 0x400003, 0x6, 0xff, 0x9, 0x800}, &(0x7f0000000200), &(0x7f0000000440)={&(0x7f0000000780)={0x10000}, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r5 = socket$alg(0x26, 0x5, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x4) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r5, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r9, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4008400}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="a99d0286334a665ead3a8afb615d108906e5d4e18e44020000", @ANYRES16=r11, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x880}, 0x8000) setsockopt$RDS_FREE_MR(r9, 0x114, 0x3, &(0x7f0000000480)={{0x0, 0x9}, 0x2}, 0x10) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$FS_IOC_SETFLAGS(r14, 0x40086602, &(0x7f00000004c0)=0x7fff) 03:34:34 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "798cb027051b2dd36be4752d5d5b5fa2d3caa17c61a9f28fb14d"}, 0x2a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 569.282791] audit: type=1804 audit(2000000074.119:469): pid=23960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/739/bus" dev="sda1" ino=16779 res=1 03:34:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-asm)\x00'}, 0x96abe2b8ef064edc) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) write$apparmor_exec(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="6578656320736b6369706865720085c74399ab2afb291cf9e0088d56385a71dec9c20999eefdd2524d06dda113938cd3a4d2861090629cf643ff973999c84edd63ba01290ca1757b5844f86fd9d016b66ec821eecdc543687018c527eaf097c1a40dedc6dc2230677e290103008d7f2ba96eb20c273bbc90339ad499786d7cb3d57c91e2fe6efddf250ac7339a01e33863e4268b356038074992e46ab987c04bc62fee88d367a45dc9918222bd9b1a8f5b70d472cc57e4b92cf4c4c5d20637e7c5f86ea9e6d9fe83fb0d6768ac9a98777c607fe1a4333610683dcc63f91cbb4631f7a16ea42660b37bbf052621fc13b44aafc89815347217e67cbdc8fcaaa9c7cbb914a96ad776dd04d034a5a2dd4bdd83f53d7d3c2cc116526301cc91cfba7b46ddac00c45e9be7b9fa34a6cc1867fb6cc6d17dfba2cf75cd314f7894c7ea227b53ca553d08d9324a129d91fa6f6c302510039be40901a24563ee47349e45fd1d4411fb4012bd33a0ef6067c8818d6afad82414ad2c54bfd78310bd2d977ae77fa7723c954fe507f2b7d159d5919a85fbf864089a112bd6dfd817f2fa42a7cf5d846c269064336ef7d147d5e83eea841b49ad2133611c881d42bb60b37d0d93c6e7a0d74b00bd0a2c993783e158f549f6e697a988222929c815ecf5b72b59cc8447"], 0xe) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r5, 0x0, 0x50000000000443) [ 569.375667] audit: type=1804 audit(2000000074.309:470): pid=23969 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir857063478/syzkaller.0YFrMB/740/bus" dev="sda1" ino=16561 res=1 03:34:34 executing program 1: pipe2(&(0x7f0000000080), 0x800) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:34 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000380)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0xffffff7f00000000, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote}}]}, 0x50}}, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) renameat(r0, &(0x7f00000000c0)='./file2\x00', 0xffffffffffffff9c, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000700)) syz_open_dev$midi(0x0, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@initdev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x62, &(0x7f0000000580)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532322c72713d307830303030303030303030303030303030303030303030306666662c61ffff7b3d3078303030303030303030303030303030322c6673636f6e746578743d73797374656d5f752c66756e633d4d4d41505f434845434b2c6f626a5f726f6c653d6e65742f756470002c00"/157]) dup(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x0, 0x9) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000400)={0x3, 0xff06ff, "5f2dddb287f4dd4ffcabc509ad4cde506ffffb6892aff32c", {0x7ff, 0xfa}, 0x1f}) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000680), &(0x7f00000006c0)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x523) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x4800) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000180)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') r5 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f0000000240)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000100), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r5) 03:34:34 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x5) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e4) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 569.746689] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:34:34 executing program 5 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r6, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001780)={'ip6gre0\x00', 0x0}) bind$can_raw(r2, &(0x7f00000017c0)={0x1d, r7}, 0x10) [ 569.908418] FAULT_INJECTION: forcing a failure. [ 569.908418] name failslab, interval 1, probability 0, space 0, times 0 [ 569.921557] CPU: 0 PID: 24004 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 569.928622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.937993] Call Trace: [ 569.940607] dump_stack+0x138/0x197 [ 569.944282] should_fail.cold+0x10f/0x159 [ 569.948449] should_failslab+0xdb/0x130 [ 569.952535] kmem_cache_alloc_trace+0x2e9/0x790 [ 569.957217] ? file_has_perm+0x163/0x2c0 [ 569.961290] alloc_pipe_info+0xb0/0x380 [ 569.965273] splice_direct_to_actor+0x5d2/0x7b0 [ 569.969953] ? selinux_file_permission+0x85/0x480 [ 569.974838] ? generic_pipe_buf_nosteal+0x10/0x10 [ 569.979689] ? security_file_permission+0x89/0x1f0 [ 569.984634] ? do_splice_to+0x170/0x170 [ 569.988606] ? rw_verify_area+0xea/0x2b0 [ 569.992660] do_splice_direct+0x18d/0x230 [ 569.996842] ? splice_direct_to_actor+0x7b0/0x7b0 [ 570.001712] ? rw_verify_area+0xea/0x2b0 [ 570.005792] do_sendfile+0x4db/0xbd0 [ 570.009520] ? do_compat_pwritev64+0x140/0x140 [ 570.014118] ? fput+0xd4/0x150 [ 570.017450] SyS_sendfile64+0x102/0x110 [ 570.021421] ? SyS_sendfile+0x130/0x130 [ 570.025389] ? do_syscall_64+0x53/0x640 [ 570.029459] ? SyS_sendfile+0x130/0x130 [ 570.033446] do_syscall_64+0x1e8/0x640 [ 570.037496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 570.042340] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 570.047535] RIP: 0033:0x459a59 [ 570.050723] RSP: 002b:00007fc211656c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 03:34:35 executing program 5 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 570.058428] RAX: ffffffffffffffda RBX: 00007fc211656c90 RCX: 0000000000459a59 [ 570.065703] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 570.072977] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 570.080342] R10: 0050000000000443 R11: 0000000000000246 R12: 00007fc2116576d4 [ 570.087611] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 [ 570.133598] FAULT_INJECTION: forcing a failure. [ 570.133598] name failslab, interval 1, probability 0, space 0, times 0 [ 570.145852] CPU: 0 PID: 24011 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 570.153000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.162625] Call Trace: [ 570.165245] dump_stack+0x138/0x197 [ 570.168902] should_fail.cold+0x10f/0x159 [ 570.173068] should_failslab+0xdb/0x130 [ 570.177042] __kmalloc+0x2f0/0x7a0 [ 570.180584] ? kmem_cache_alloc_trace+0x623/0x790 [ 570.186413] ? alloc_pipe_info+0x15c/0x380 [ 570.190674] alloc_pipe_info+0x15c/0x380 [ 570.194752] splice_direct_to_actor+0x5d2/0x7b0 [ 570.199444] ? selinux_file_permission+0x85/0x480 [ 570.204289] ? generic_pipe_buf_nosteal+0x10/0x10 [ 570.204312] ? security_file_permission+0x89/0x1f0 [ 570.214059] ? do_splice_to+0x170/0x170 [ 570.214074] ? rw_verify_area+0xea/0x2b0 [ 570.214091] do_splice_direct+0x18d/0x230 [ 570.214109] ? splice_direct_to_actor+0x7b0/0x7b0 03:34:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f00000001c0)="cc7580bb9037cbe7489775f3052bbec2d2a8a5f54746c5a7580f604570d4ba7bcb0ce8102023d4ecd5710e3a108e43bfb3c5afe9d99dea2b740b64714c1f83a558ff422329bdaa723471597b2362dbc950ba963148f546f0bde163248c1cce3fafdfdb1c43ee299865befdd8d326682496d2b95796fadef22ced08f29920519179a8bfb6d8a3e6351de7ae3159aea61201fe1867cecc194089b7f0b77cb565234b1802db0207f7f8a4e362d36dab13", 0x314}, {&(0x7f0000000140)="bf1942dd2ddc687818962748caabba8c3f79f12bfc"}, {&(0x7f00000002c0)="1a285ab45a7b1cd9afc7e31d6d79d1c4b473aaf133c543890d22a1458fd8f0967a1f7a5d9465a81761f313ad227fc9700c7560a2cfbdec68c09d8d58f7c66d2ae7dc7b692ec558e8d04e0c839d83b6ba903149149a42135a76737cd1b2865a099f72a99f0b8a5ea597a70abdf4fe32d3439bf00a1453bd50a8554572e6c4b82b426149b485c552ba1bca93e971e67ef3958afc75d2321e3c1a5f3ea1af3e30a44952e71263d3f7fa56fdddf85c05382977865d87e391b4a93d2123e03e080f4cb2f7c94e21da54487a42"}, {&(0x7f00000003c0)="e2405a6398f23ad4c5d6cc4746c980a96bd76af0f9fab4950bb3c736510a6b8ff99a7273acd5cdf96659730ac079806d5c9e8063e9d7b18eab867eb07a12702de714c53df8636af373a314a7d38c2207a3196ba95c451916cdc2db19030da68bc19b39893105d1fb844e84e1ae17ce9dd43b5f14b083be546219f969e9707214914d32"}, {&(0x7f0000000480)="96e3bb7580edec7cdfee82f8e417ec90ebe765e490bb20660b82ff55f8e40455454cfcfa46945f0e958624b8875af1323b8c677bc04ff61379c40dc503de913e6c63523bd376ac025fd0b97ef3e69bb6bb37a5db"}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 570.214136] ? rw_verify_area+0xea/0x2b0 [ 570.214157] do_sendfile+0x4db/0xbd0 [ 570.214188] ? do_compat_pwritev64+0x140/0x140 [ 570.243552] ? fput+0xd4/0x150 [ 570.246766] SyS_sendfile64+0x102/0x110 [ 570.250756] ? SyS_sendfile+0x130/0x130 [ 570.254751] ? do_syscall_64+0x53/0x640 [ 570.258731] ? SyS_sendfile+0x130/0x130 [ 570.262762] do_syscall_64+0x1e8/0x640 [ 570.267255] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 570.272099] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 570.277279] RIP: 0033:0x459a59 03:34:35 executing program 5 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 570.280470] RSP: 002b:00007fc211656c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 570.288169] RAX: ffffffffffffffda RBX: 00007fc211656c90 RCX: 0000000000459a59 [ 570.295435] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 570.302713] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 570.310000] R10: 0050000000000443 R11: 0000000000000246 R12: 00007fc2116576d4 [ 570.317278] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 03:34:35 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4b8600, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000140), 0x800) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$KVM_S390_INTERRUPT_CPU(r6, 0x4010ae94, &(0x7f0000000180)={0x5, 0x53, 0x94}) 03:34:35 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f0000000580)=[{{}, 0x0, 0x9, 0x7f}, {{0x0, 0x2710}, 0x5, 0x4, 0x43c}, {{0x77359400}, 0x19, 0x9, 0x143b}, {{0x77359400}, 0x0, 0x202, 0x4}], 0x60) open(&(0x7f0000000180)='./bus\x00', 0x41, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r4, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mremap(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x4000, 0x2, &(0x7f0000004000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) openat$pfkey(0xffffffffffffff9c, 0x0, 0x290000, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) tgkill(0x0, 0x0, 0x0) sendto$inet(r6, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r6, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='\x00\x00\x00\x00\x00\x99\xba\xa0\xbc\xfe:\x83\xbd\x85D\x1a\xb0BT\xe3x\x8d=\xf57m\xcb!\b\x8d\x95\x1f\x80H\xe9;\xb46\x85\xf9\x1b|\xf2\xddA\xe4\xde\xc2\xc3\xde\xeez\x06\xc53\xd3\xdeydx\x99\x89\xc14\b\x84\x83\x82\xfc;\xe1Ex\x16\xfc\x83\xef`\x85t\xe8\xdfNY\xa7x\x9e\x03E\xab\\\x12\xfe5{17\x05&Z\xc7\x83\xd8*\x94\xab\xc4 a\x95\x01\"%\x1a\xb4\x05i\xdfW\xb3\x91\xd9\xd5\xf9d\xb3_\xf7N\xef\xff\x02w\x0e\xe9jmf\x8b\xab\x99\xdf\x16\xa6\xa6\xc8o\x90\xdf\xca\x03\xe9Pm\xc0,[E~\xd2m{\x02\x1e\x90W {G\x94\x00Z\xaf\xca\xf2F\xdd\xc9|\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gy\xb8\xdc7\xf6\xe4q\x02k\x10\xcf4\xdap\xc5\xba\x8a\xe9w\xeb\x96`&\xb1I\a\xc0*kH|E_a\t\x0fg\xab\xc2\x8b\xc6\x9a}\xa0Y\v\xec\xba\x99/BzvQ\xb2\xdcf\xadM\xf0\xa5\xe3 :\x8a+3e5V\xbahvi\xea\xec\xed&\xbe\xdb\x9cp\xc5o\x86\xfd\xf4q\x04\xdaTm\xc2\x85(\xf1\x13\nW7L\xa8\xee\xed|&\x81\x041s6\xbf\xd2\xbf\xc9~z\x91\xb7\xf9\xd7}\x00d\xa61\xc1\x9f\v(\x8a|\xd6\xa3\nV\xceLe\xa2\x99\xa1Rhwap\xe1(\x0f\xbf\xff\xc5/\xd9\x0fLy/\x02\x12\xcdR\x82\xd3\xfa\t\x90\xce2qP%\xd6\xc4\x9b]\x9fL\xdam\xd6\xf9\xa5`') syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0xe0100) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 03:34:35 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8), 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r7, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', r7}) r9 = socket$pppoe(0x18, 0x1, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r14, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r14, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r15 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r15, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r14, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r14}}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'tunl0\x00', r14}) [ 570.424830] FAULT_INJECTION: forcing a failure. [ 570.424830] name failslab, interval 1, probability 0, space 0, times 0 [ 570.469508] CPU: 0 PID: 24025 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 570.476612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.485990] Call Trace: [ 570.488678] dump_stack+0x138/0x197 [ 570.492323] should_fail.cold+0x10f/0x159 [ 570.496480] should_failslab+0xdb/0x130 [ 570.500465] kmem_cache_alloc_node_trace+0x280/0x770 [ 570.505589] ? lock_downgrade+0x740/0x740 [ 570.509759] __kmalloc_node+0x3d/0x80 [ 570.513554] kvmalloc_node+0x4e/0xe0 [ 570.517261] iov_iter_get_pages_alloc+0x4a7/0xef0 [ 570.522129] ? iov_iter_revert+0x9c0/0x9c0 [ 570.526375] ? iov_iter_pipe+0x9f/0x2c0 [ 570.530364] default_file_splice_read+0x17c/0x7b0 [ 570.535214] ? __kmalloc+0x15d/0x7a0 [ 570.538924] ? alloc_pipe_info+0x15c/0x380 [ 570.543157] ? splice_direct_to_actor+0x5d2/0x7b0 [ 570.547985] ? do_splice_direct+0x18d/0x230 [ 570.552309] ? do_syscall_64+0x1e8/0x640 [ 570.556360] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 570.561737] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 570.566849] ? trace_hardirqs_on+0x10/0x10 [ 570.571099] ? save_trace+0x290/0x290 [ 570.571111] ? save_trace+0x290/0x290 [ 570.571145] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 570.585387] ? fsnotify+0x11e0/0x11e0 [ 570.585412] ? __inode_security_revalidate+0xd6/0x130 [ 570.585426] ? avc_policy_seqno+0x9/0x20 [ 570.585439] ? selinux_file_permission+0x85/0x480 [ 570.585457] ? security_file_permission+0x89/0x1f0 [ 570.585483] ? rw_verify_area+0xea/0x2b0 [ 570.594461] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 570.594478] do_splice_to+0x105/0x170 [ 570.594497] splice_direct_to_actor+0x222/0x7b0 [ 570.594517] ? generic_pipe_buf_nosteal+0x10/0x10 [ 570.594540] ? do_splice_to+0x170/0x170 [ 570.604374] ? rw_verify_area+0xea/0x2b0 [ 570.604394] do_splice_direct+0x18d/0x230 [ 570.604412] ? splice_direct_to_actor+0x7b0/0x7b0 [ 570.604435] ? rw_verify_area+0xea/0x2b0 [ 570.604454] do_sendfile+0x4db/0xbd0 [ 570.613514] ? do_compat_pwritev64+0x140/0x140 [ 570.613537] ? fput+0xd4/0x150 [ 570.613557] SyS_sendfile64+0x102/0x110 [ 570.613570] ? SyS_sendfile+0x130/0x130 [ 570.613583] ? do_syscall_64+0x53/0x640 [ 570.623446] ? SyS_sendfile+0x130/0x130 [ 570.623470] do_syscall_64+0x1e8/0x640 [ 570.623481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 570.623506] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 570.623518] RIP: 0033:0x459a59 [ 570.633002] RSP: 002b:00007fc211656c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 570.633019] RAX: ffffffffffffffda RBX: 00007fc211656c90 RCX: 0000000000459a59 03:34:35 executing program 5 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 570.633027] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 570.633035] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 570.633044] R10: 0050000000000443 R11: 0000000000000246 R12: 00007fc2116576d4 [ 570.633052] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 03:34:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$EVIOCSKEYCODE(r5, 0x40084504, &(0x7f00000003c0)=[0x4, 0x1]) sendfile(r1, r2, 0x0, 0x50000000000443) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) connect$can_bcm(r8, &(0x7f0000000200)={0x1d, r9}, 0x10) [ 570.827142] FAULT_INJECTION: forcing a failure. [ 570.827142] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 570.839390] CPU: 1 PID: 24049 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 570.846458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.855874] Call Trace: [ 570.858462] dump_stack+0x138/0x197 [ 570.862110] should_fail.cold+0x10f/0x159 [ 570.866262] ? __might_sleep+0x93/0xb0 [ 570.870156] __alloc_pages_nodemask+0x1d6/0x7a0 [ 570.874839] ? __alloc_pages_slowpath+0x2930/0x2930 [ 570.879885] ? rcu_read_lock_sched_held+0x110/0x130 [ 570.885087] alloc_pages_current+0xec/0x1e0 [ 570.889439] push_pipe+0x3cb/0x780 [ 570.892978] iov_iter_get_pages_alloc+0x4fc/0xef0 [ 570.897831] ? iov_iter_revert+0x9c0/0x9c0 [ 570.902065] ? iov_iter_pipe+0x9f/0x2c0 [ 570.906061] default_file_splice_read+0x17c/0x7b0 [ 570.910902] ? __kmalloc+0x15d/0x7a0 [ 570.914662] ? alloc_pipe_info+0x15c/0x380 [ 570.918902] ? splice_direct_to_actor+0x5d2/0x7b0 [ 570.923756] ? do_splice_direct+0x18d/0x230 [ 570.928093] ? do_syscall_64+0x1e8/0x640 [ 570.932157] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 570.937643] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 570.942753] ? trace_hardirqs_on+0x10/0x10 [ 570.947051] ? save_trace+0x290/0x290 [ 570.950856] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 570.957508] ? fsnotify+0x11e0/0x11e0 [ 570.961330] ? __inode_security_revalidate+0xd6/0x130 [ 570.966535] ? avc_policy_seqno+0x9/0x20 [ 570.970592] ? selinux_file_permission+0x85/0x480 [ 570.975430] ? security_file_permission+0x89/0x1f0 [ 570.980365] ? rw_verify_area+0xea/0x2b0 [ 570.984429] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 570.989550] do_splice_to+0x105/0x170 [ 570.993341] splice_direct_to_actor+0x222/0x7b0 [ 570.998004] ? generic_pipe_buf_nosteal+0x10/0x10 [ 571.002865] ? do_splice_to+0x170/0x170 [ 571.006839] ? rw_verify_area+0xea/0x2b0 [ 571.010897] do_splice_direct+0x18d/0x230 [ 571.015038] ? splice_direct_to_actor+0x7b0/0x7b0 [ 571.019875] ? rw_verify_area+0xea/0x2b0 [ 571.023939] do_sendfile+0x4db/0xbd0 [ 571.027659] ? do_compat_pwritev64+0x140/0x140 [ 571.032235] ? fput+0xd4/0x150 [ 571.035416] SyS_sendfile64+0x102/0x110 [ 571.039379] ? SyS_sendfile+0x130/0x130 [ 571.043346] ? do_syscall_64+0x53/0x640 [ 571.047320] ? SyS_sendfile+0x130/0x130 [ 571.051298] do_syscall_64+0x1e8/0x640 [ 571.055192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 571.060055] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.065246] RIP: 0033:0x459a59 [ 571.068436] RSP: 002b:00007fc211656c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 03:34:36 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000080)) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r5, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x8, 0x2, 0x3}}, 0x14) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x20000000000004) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:36 executing program 5 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 571.076165] RAX: ffffffffffffffda RBX: 00007fc211656c90 RCX: 0000000000459a59 [ 571.083460] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 571.083468] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 571.083476] R10: 0050000000000443 R11: 0000000000000246 R12: 00007fc2116576d4 [ 571.083501] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 [ 571.137801] FAULT_INJECTION: forcing a failure. [ 571.137801] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 571.150617] CPU: 0 PID: 24060 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 571.157668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.167041] Call Trace: [ 571.169624] dump_stack+0x138/0x197 [ 571.173254] should_fail.cold+0x10f/0x159 [ 571.177394] ? __might_sleep+0x93/0xb0 [ 571.181278] __alloc_pages_nodemask+0x1d6/0x7a0 [ 571.186049] ? __alloc_pages_slowpath+0x2930/0x2930 [ 571.191074] ? rcu_read_lock_sched_held+0x110/0x130 [ 571.196084] alloc_pages_current+0xec/0x1e0 [ 571.201356] push_pipe+0x3cb/0x780 [ 571.204963] iov_iter_get_pages_alloc+0x4fc/0xef0 [ 571.209829] ? iov_iter_revert+0x9c0/0x9c0 [ 571.214464] ? iov_iter_pipe+0x9f/0x2c0 [ 571.218441] default_file_splice_read+0x17c/0x7b0 [ 571.223280] ? __kmalloc+0x15d/0x7a0 [ 571.227015] ? alloc_pipe_info+0x15c/0x380 [ 571.231381] ? splice_direct_to_actor+0x5d2/0x7b0 [ 571.236219] ? do_splice_direct+0x18d/0x230 [ 571.240541] ? do_syscall_64+0x1e8/0x640 [ 571.245545] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.250908] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 571.256003] ? trace_hardirqs_on+0x10/0x10 [ 571.260233] ? save_trace+0x290/0x290 [ 571.264040] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 571.270709] ? fsnotify+0x11e0/0x11e0 [ 571.274502] ? __inode_security_revalidate+0xd6/0x130 [ 571.279690] ? avc_policy_seqno+0x9/0x20 [ 571.283755] ? selinux_file_permission+0x85/0x480 [ 571.288592] ? security_file_permission+0x89/0x1f0 [ 571.295437] ? rw_verify_area+0xea/0x2b0 [ 571.299485] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 571.304579] do_splice_to+0x105/0x170 [ 571.308373] splice_direct_to_actor+0x222/0x7b0 [ 571.313034] ? generic_pipe_buf_nosteal+0x10/0x10 [ 571.317872] ? do_splice_to+0x170/0x170 [ 571.322784] ? rw_verify_area+0xea/0x2b0 [ 571.326834] do_splice_direct+0x18d/0x230 [ 571.330984] ? splice_direct_to_actor+0x7b0/0x7b0 [ 571.335822] ? rw_verify_area+0xea/0x2b0 [ 571.339874] do_sendfile+0x4db/0xbd0 [ 571.343586] ? do_compat_pwritev64+0x140/0x140 [ 571.348162] ? fput+0xd4/0x150 [ 571.351346] SyS_sendfile64+0x102/0x110 [ 571.355308] ? SyS_sendfile+0x130/0x130 [ 571.359269] ? do_syscall_64+0x53/0x640 [ 571.363230] ? SyS_sendfile+0x130/0x130 [ 571.367195] do_syscall_64+0x1e8/0x640 [ 571.371066] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 571.375905] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.381080] RIP: 0033:0x459a59 03:34:36 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sysfs$3(0x3) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000040)={[{0x6618, 0x6, 0x7, 0x4, 0x40, 0x4, 0x7, 0x3, 0x3, 0x3, 0x1, 0x80, 0x1}, {0x1, 0x4, 0x7, 0x1, 0x31, 0x7, 0x86, 0x97, 0x80, 0x0, 0xe8, 0x66, 0x1}, {0x1, 0x8, 0x7f, 0x8, 0x1, 0x3, 0x1, 0xfc, 0x39, 0x1, 0x8, 0xf7, 0x8}], 0x9665}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 571.384258] RSP: 002b:00007fc211656c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 571.391956] RAX: ffffffffffffffda RBX: 00007fc211656c90 RCX: 0000000000459a59 [ 571.399217] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 571.406474] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 571.413740] R10: 0050000000000443 R11: 0000000000000246 R12: 00007fc2116576d4 [ 571.420996] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 03:34:36 executing program 4 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 571.554126] FAULT_INJECTION: forcing a failure. [ 571.554126] name failslab, interval 1, probability 0, space 0, times 0 [ 571.565976] CPU: 1 PID: 24070 Comm: syz-executor.4 Not tainted 4.14.150 #0 [ 571.572996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.582340] Call Trace: [ 571.584919] dump_stack+0x138/0x197 [ 571.588540] should_fail.cold+0x10f/0x159 [ 571.592692] should_failslab+0xdb/0x130 [ 571.596654] kmem_cache_alloc_trace+0x2e9/0x790 [ 571.601312] ? file_has_perm+0x163/0x2c0 [ 571.605359] alloc_pipe_info+0xb0/0x380 [ 571.609836] splice_direct_to_actor+0x5d2/0x7b0 [ 571.614490] ? selinux_file_permission+0x85/0x480 [ 571.619310] ? generic_pipe_buf_nosteal+0x10/0x10 [ 571.624134] ? security_file_permission+0x89/0x1f0 [ 571.629045] ? do_splice_to+0x170/0x170 [ 571.633013] ? rw_verify_area+0xea/0x2b0 [ 571.637056] do_splice_direct+0x18d/0x230 [ 571.641188] ? splice_direct_to_actor+0x7b0/0x7b0 [ 571.646025] ? rw_verify_area+0xea/0x2b0 [ 571.650070] do_sendfile+0x4db/0xbd0 [ 571.653770] ? do_compat_pwritev64+0x140/0x140 [ 571.658337] ? fput+0xd4/0x150 [ 571.661513] SyS_sendfile64+0x102/0x110 [ 571.665473] ? SyS_sendfile+0x130/0x130 [ 571.669428] ? do_syscall_64+0x53/0x640 [ 571.673384] ? SyS_sendfile+0x130/0x130 [ 571.677340] do_syscall_64+0x1e8/0x640 [ 571.681228] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 571.686068] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.691250] RIP: 0033:0x459a59 [ 571.694422] RSP: 002b:00007efdc801bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 571.702116] RAX: ffffffffffffffda RBX: 00007efdc801bc90 RCX: 0000000000459a59 [ 571.709802] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 571.717056] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 571.724317] R10: 0050000000000443 R11: 0000000000000246 R12: 00007efdc801c6d4 [ 571.731567] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 03:34:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:36 executing program 4 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 571.844685] FAULT_INJECTION: forcing a failure. [ 571.844685] name failslab, interval 1, probability 0, space 0, times 0 [ 571.856846] CPU: 0 PID: 24078 Comm: syz-executor.4 Not tainted 4.14.150 #0 [ 571.863892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.873255] Call Trace: [ 571.875860] dump_stack+0x138/0x197 [ 571.879508] should_fail.cold+0x10f/0x159 [ 571.883668] should_failslab+0xdb/0x130 [ 571.887640] __kmalloc+0x2f0/0x7a0 [ 571.891169] ? kmem_cache_alloc_trace+0x623/0x790 [ 571.896012] ? alloc_pipe_info+0x15c/0x380 [ 571.900267] alloc_pipe_info+0x15c/0x380 [ 571.904339] splice_direct_to_actor+0x5d2/0x7b0 [ 571.909027] ? selinux_file_permission+0x85/0x480 [ 571.913879] ? generic_pipe_buf_nosteal+0x10/0x10 [ 571.918738] ? security_file_permission+0x89/0x1f0 [ 571.923679] ? do_splice_to+0x170/0x170 [ 571.927668] ? rw_verify_area+0xea/0x2b0 [ 571.931746] do_splice_direct+0x18d/0x230 [ 571.935908] ? splice_direct_to_actor+0x7b0/0x7b0 [ 571.940769] ? rw_verify_area+0xea/0x2b0 [ 571.944827] do_sendfile+0x4db/0xbd0 [ 571.948547] ? do_compat_pwritev64+0x140/0x140 [ 571.953120] ? fput+0xd4/0x150 [ 571.956303] SyS_sendfile64+0x102/0x110 [ 571.960265] ? SyS_sendfile+0x130/0x130 [ 571.964228] ? do_syscall_64+0x53/0x640 [ 571.968219] ? SyS_sendfile+0x130/0x130 [ 571.972225] do_syscall_64+0x1e8/0x640 [ 571.976108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 571.980960] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.986149] RIP: 0033:0x459a59 03:34:36 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x200000000000, 0x0, 0x0, 0x4}, 0x0, 0x8000, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x2bdde1ff8f7afb12, 0x0, &(0x7f0000ffd000/0x3000)=nil}) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') syz_extract_tcp_res(&(0x7f0000000080), 0x9d, 0x10001) r4 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r4, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) ioctl$void(r4, 0xc0045878) sendfile(r2, r3, 0x0, 0x50000000000443) 03:34:37 executing program 4 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 571.989340] RSP: 002b:00007efdc801bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 571.997037] RAX: ffffffffffffffda RBX: 00007efdc801bc90 RCX: 0000000000459a59 [ 572.004301] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 572.011591] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 572.018869] R10: 0050000000000443 R11: 0000000000000246 R12: 00007efdc801c6d4 [ 572.026143] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 03:34:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x200000000d8, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:37 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000040)={0x8337}, 0x8) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = eventfd2(0x0, 0x0) r6 = dup(r5) read$FUSE(r6, &(0x7f0000000280), 0x1000) r7 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r7, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) sendfile(r6, r7, &(0x7f0000000080), 0x2008000fffffffe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x4, 0x3, 0x3, 0x1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 572.126286] FAULT_INJECTION: forcing a failure. [ 572.126286] name failslab, interval 1, probability 0, space 0, times 0 [ 572.138073] CPU: 0 PID: 24094 Comm: syz-executor.4 Not tainted 4.14.150 #0 [ 572.145101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.154461] Call Trace: [ 572.157051] dump_stack+0x138/0x197 [ 572.160701] should_fail.cold+0x10f/0x159 [ 572.164867] should_failslab+0xdb/0x130 [ 572.168857] kmem_cache_alloc_node_trace+0x280/0x770 [ 572.173972] ? lock_downgrade+0x740/0x740 [ 572.178167] __kmalloc_node+0x3d/0x80 [ 572.182112] kvmalloc_node+0x4e/0xe0 [ 572.185844] iov_iter_get_pages_alloc+0x4a7/0xef0 [ 572.190729] ? iov_iter_revert+0x9c0/0x9c0 [ 572.194973] ? iov_iter_pipe+0x9f/0x2c0 [ 572.198958] default_file_splice_read+0x17c/0x7b0 [ 572.203807] ? __kmalloc+0x15d/0x7a0 [ 572.207544] ? alloc_pipe_info+0x15c/0x380 [ 572.211784] ? splice_direct_to_actor+0x5d2/0x7b0 [ 572.216614] ? do_splice_direct+0x18d/0x230 [ 572.220942] ? do_syscall_64+0x1e8/0x640 [ 572.225002] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.230381] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 572.235494] ? trace_hardirqs_on+0x10/0x10 [ 572.239724] ? save_trace+0x290/0x290 [ 572.243526] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 572.250183] ? fsnotify+0x11e0/0x11e0 [ 572.254081] ? __inode_security_revalidate+0xd6/0x130 [ 572.259273] ? avc_policy_seqno+0x9/0x20 [ 572.263332] ? selinux_file_permission+0x85/0x480 [ 572.268180] ? security_file_permission+0x89/0x1f0 [ 572.273133] ? rw_verify_area+0xea/0x2b0 03:34:37 executing program 0 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 572.277196] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 572.282318] do_splice_to+0x105/0x170 [ 572.286142] splice_direct_to_actor+0x222/0x7b0 [ 572.290827] ? generic_pipe_buf_nosteal+0x10/0x10 [ 572.295701] ? do_splice_to+0x170/0x170 [ 572.299702] ? rw_verify_area+0xea/0x2b0 [ 572.303766] do_splice_direct+0x18d/0x230 [ 572.303784] ? splice_direct_to_actor+0x7b0/0x7b0 [ 572.303809] ? rw_verify_area+0xea/0x2b0 [ 572.303827] do_sendfile+0x4db/0xbd0 [ 572.312816] ? do_compat_pwritev64+0x140/0x140 [ 572.312841] ? fput+0xd4/0x150 [ 572.312861] SyS_sendfile64+0x102/0x110 [ 572.312873] ? SyS_sendfile+0x130/0x130 [ 572.312887] ? do_syscall_64+0x53/0x640 [ 572.312901] ? SyS_sendfile+0x130/0x130 [ 572.312917] do_syscall_64+0x1e8/0x640 [ 572.332388] FAULT_INJECTION: forcing a failure. [ 572.332388] name failslab, interval 1, probability 0, space 0, times 0 [ 572.359358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 572.364227] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.369418] RIP: 0033:0x459a59 [ 572.372606] RSP: 002b:00007efdc801bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 572.380330] RAX: ffffffffffffffda RBX: 00007efdc801bc90 RCX: 0000000000459a59 [ 572.387602] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 572.394889] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 572.402162] R10: 0050000000000443 R11: 0000000000000246 R12: 00007efdc801c6d4 [ 572.409432] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 [ 572.416741] CPU: 1 PID: 24098 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 572.423777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.433139] Call Trace: [ 572.435743] dump_stack+0x138/0x197 [ 572.439386] should_fail.cold+0x10f/0x159 [ 572.443544] should_failslab+0xdb/0x130 [ 572.447521] kmem_cache_alloc_node+0x287/0x780 [ 572.452096] ? get_pid_task+0x98/0x140 [ 572.455993] copy_process.part.0+0x17d5/0x6a00 [ 572.460590] ? save_trace+0x290/0x290 [ 572.464389] ? proc_fail_nth_write+0x7d/0x180 [ 572.468866] ? proc_cwd_link+0x1b0/0x1b0 [ 572.472916] ? __f_unlock_pos+0x19/0x20 [ 572.476875] ? find_held_lock+0x35/0x130 [ 572.480927] ? __cleanup_sighand+0x50/0x50 [ 572.485148] ? lock_downgrade+0x740/0x740 [ 572.489289] _do_fork+0x19e/0xce0 [ 572.492727] ? fork_idle+0x280/0x280 [ 572.496439] ? fput+0xd4/0x150 [ 572.499614] ? SyS_write+0x15e/0x230 [ 572.503748] SyS_clone+0x37/0x50 [ 572.508051] ? sys_vfork+0x30/0x30 [ 572.511577] do_syscall_64+0x1e8/0x640 [ 572.515448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 572.520293] entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:34:37 executing program 4 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 572.525484] RIP: 0033:0x459a59 [ 572.528658] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 572.536353] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 572.543604] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 572.550858] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 572.558111] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 572.565366] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:37 executing program 0 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:37 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 572.627392] FAULT_INJECTION: forcing a failure. [ 572.627392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 572.658445] FAULT_INJECTION: forcing a failure. [ 572.658445] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 572.664688] CPU: 1 PID: 24103 Comm: syz-executor.4 Not tainted 4.14.150 #0 [ 572.677329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.686686] Call Trace: [ 572.689296] dump_stack+0x138/0x197 [ 572.692938] should_fail.cold+0x10f/0x159 [ 572.697078] ? __might_sleep+0x93/0xb0 [ 572.700988] __alloc_pages_nodemask+0x1d6/0x7a0 [ 572.705650] ? __alloc_pages_slowpath+0x2930/0x2930 [ 572.710662] ? rcu_read_lock_sched_held+0x110/0x130 [ 572.715672] alloc_pages_current+0xec/0x1e0 [ 572.720011] push_pipe+0x3cb/0x780 [ 572.723582] iov_iter_get_pages_alloc+0x4fc/0xef0 [ 572.728421] ? iov_iter_revert+0x9c0/0x9c0 [ 572.732647] ? iov_iter_pipe+0x9f/0x2c0 [ 572.736619] default_file_splice_read+0x17c/0x7b0 [ 572.741450] ? __kmalloc+0x15d/0x7a0 [ 572.745157] ? alloc_pipe_info+0x15c/0x380 [ 572.749391] ? splice_direct_to_actor+0x5d2/0x7b0 [ 572.754220] ? do_splice_direct+0x18d/0x230 [ 572.758532] ? do_syscall_64+0x1e8/0x640 [ 572.762583] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.767957] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 572.773074] ? trace_hardirqs_on+0x10/0x10 [ 572.777317] ? save_trace+0x290/0x290 [ 572.781116] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 572.786038] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 572.790972] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 572.797629] ? fsnotify+0x11e0/0x11e0 [ 572.801429] ? __inode_security_revalidate+0xd6/0x130 [ 572.806613] ? avc_policy_seqno+0x9/0x20 [ 572.810663] ? selinux_file_permission+0x85/0x480 [ 572.815520] ? security_file_permission+0x89/0x1f0 [ 572.820442] ? rw_verify_area+0xea/0x2b0 [ 572.824491] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 572.829583] do_splice_to+0x105/0x170 [ 572.833377] splice_direct_to_actor+0x222/0x7b0 [ 572.838040] ? generic_pipe_buf_nosteal+0x10/0x10 [ 572.842902] ? do_splice_to+0x170/0x170 [ 572.846867] ? rw_verify_area+0xea/0x2b0 [ 572.850922] do_splice_direct+0x18d/0x230 [ 572.855075] ? splice_direct_to_actor+0x7b0/0x7b0 [ 572.859912] ? rw_verify_area+0xea/0x2b0 [ 572.863964] do_sendfile+0x4db/0xbd0 [ 572.867675] ? do_compat_pwritev64+0x140/0x140 [ 572.872268] ? fput+0xd4/0x150 [ 572.875452] SyS_sendfile64+0x102/0x110 [ 572.879416] ? SyS_sendfile+0x130/0x130 [ 572.883380] ? do_syscall_64+0x53/0x640 [ 572.887351] ? SyS_sendfile+0x130/0x130 [ 572.891332] do_syscall_64+0x1e8/0x640 [ 572.895209] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 572.900046] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.905228] RIP: 0033:0x459a59 [ 572.908406] RSP: 002b:00007efdc801bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 572.916113] RAX: ffffffffffffffda RBX: 00007efdc801bc90 RCX: 0000000000459a59 [ 572.923386] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 572.930643] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 572.937904] R10: 0050000000000443 R11: 0000000000000246 R12: 00007efdc801c6d4 [ 572.945164] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 [ 572.952452] CPU: 0 PID: 24111 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 572.959513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.968886] Call Trace: [ 572.971505] dump_stack+0x138/0x197 [ 572.975161] should_fail.cold+0x10f/0x159 [ 572.979335] __alloc_pages_nodemask+0x1d6/0x7a0 [ 572.984011] ? fs_reclaim_acquire+0x20/0x20 [ 572.988336] ? __alloc_pages_slowpath+0x2930/0x2930 [ 572.993369] cache_grow_begin+0x80/0x400 [ 572.997436] kmem_cache_alloc_node+0x6a4/0x780 [ 573.002035] ? get_pid_task+0x98/0x140 [ 573.005933] copy_process.part.0+0x17d5/0x6a00 [ 573.010670] ? save_trace+0x290/0x290 [ 573.014489] ? proc_fail_nth_write+0x7d/0x180 [ 573.018981] ? proc_cwd_link+0x1b0/0x1b0 [ 573.023059] ? __f_unlock_pos+0x19/0x20 [ 573.027023] ? find_held_lock+0x35/0x130 [ 573.031081] ? __cleanup_sighand+0x50/0x50 [ 573.035305] ? lock_downgrade+0x740/0x740 [ 573.039446] _do_fork+0x19e/0xce0 [ 573.042895] ? fork_idle+0x280/0x280 [ 573.046616] ? fput+0xd4/0x150 [ 573.049796] ? SyS_write+0x15e/0x230 [ 573.053516] SyS_clone+0x37/0x50 [ 573.056867] ? sys_vfork+0x30/0x30 [ 573.060401] do_syscall_64+0x1e8/0x640 [ 573.064272] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 573.069123] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 573.074310] RIP: 0033:0x459a59 03:34:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000140)=0x400, 0x4) sendfile(r1, r2, 0x0, 0x50000000000443) socketpair(0xa, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff}) bind$alg(r3, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58) 03:34:38 executing program 4 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 573.077490] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 573.085197] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 573.092486] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 573.099761] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 573.107033] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 573.114316] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 573.168521] FAULT_INJECTION: forcing a failure. [ 573.168521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 573.206629] CPU: 1 PID: 24120 Comm: syz-executor.4 Not tainted 4.14.150 #0 03:34:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x189280, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000001bc0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000002140)=[{}], r5, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r5}}, 0x18) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) [ 573.213698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.223092] Call Trace: [ 573.225709] dump_stack+0x138/0x197 [ 573.229365] should_fail.cold+0x10f/0x159 [ 573.233530] ? __might_sleep+0x93/0xb0 [ 573.237432] __alloc_pages_nodemask+0x1d6/0x7a0 [ 573.242129] ? __alloc_pages_slowpath+0x2930/0x2930 [ 573.247163] ? rcu_read_lock_sched_held+0x110/0x130 [ 573.252200] alloc_pages_current+0xec/0x1e0 [ 573.256531] push_pipe+0x3cb/0x780 [ 573.260089] iov_iter_get_pages_alloc+0x4fc/0xef0 [ 573.264950] ? iov_iter_revert+0x9c0/0x9c0 [ 573.269183] ? iov_iter_pipe+0x9f/0x2c0 [ 573.273151] default_file_splice_read+0x17c/0x7b0 [ 573.277977] ? __kmalloc+0x15d/0x7a0 [ 573.281677] ? alloc_pipe_info+0x15c/0x380 [ 573.285902] ? splice_direct_to_actor+0x5d2/0x7b0 [ 573.290743] ? do_splice_direct+0x18d/0x230 [ 573.295051] ? do_syscall_64+0x1e8/0x640 [ 573.299094] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 573.304456] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 573.309603] ? trace_hardirqs_on+0x10/0x10 [ 573.313833] ? save_trace+0x290/0x290 [ 573.317640] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 573.322556] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 573.327489] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 573.334181] ? fsnotify+0x11e0/0x11e0 [ 573.337984] ? __inode_security_revalidate+0xd6/0x130 [ 573.343174] ? avc_policy_seqno+0x9/0x20 [ 573.347255] ? selinux_file_permission+0x85/0x480 [ 573.352093] ? security_file_permission+0x89/0x1f0 [ 573.357023] ? rw_verify_area+0xea/0x2b0 [ 573.361080] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 573.366167] do_splice_to+0x105/0x170 [ 573.369955] splice_direct_to_actor+0x222/0x7b0 [ 573.374633] ? generic_pipe_buf_nosteal+0x10/0x10 [ 573.379463] ? do_splice_to+0x170/0x170 [ 573.383424] ? rw_verify_area+0xea/0x2b0 [ 573.387481] do_splice_direct+0x18d/0x230 [ 573.391614] ? splice_direct_to_actor+0x7b0/0x7b0 [ 573.396467] ? rw_verify_area+0xea/0x2b0 [ 573.400525] do_sendfile+0x4db/0xbd0 [ 573.404247] ? do_compat_pwritev64+0x140/0x140 [ 573.408823] ? fput+0xd4/0x150 [ 573.412011] SyS_sendfile64+0x102/0x110 [ 573.415981] ? SyS_sendfile+0x130/0x130 [ 573.419940] ? do_syscall_64+0x53/0x640 [ 573.423915] ? SyS_sendfile+0x130/0x130 [ 573.427875] do_syscall_64+0x1e8/0x640 [ 573.431763] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 573.436615] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 573.441793] RIP: 0033:0x459a59 [ 573.444971] RSP: 002b:00007efdc801bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 573.452675] RAX: ffffffffffffffda RBX: 00007efdc801bc90 RCX: 0000000000459a59 [ 573.459944] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 03:34:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:38 executing program 0 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:38 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r6, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000040)={r6}) [ 573.467229] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 573.474495] R10: 0050000000000443 R11: 0000000000000246 R12: 00007efdc801c6d4 [ 573.481767] R13: 00000000004c74af R14: 00000000004dd190 R15: 0000000000000007 [ 573.524457] FAULT_INJECTION: forcing a failure. [ 573.524457] name failslab, interval 1, probability 0, space 0, times 0 [ 573.553289] CPU: 1 PID: 24134 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 573.560350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.569716] Call Trace: [ 573.572315] dump_stack+0x138/0x197 [ 573.575959] should_fail.cold+0x10f/0x159 [ 573.580118] should_failslab+0xdb/0x130 [ 573.584104] kmem_cache_alloc+0x2d7/0x780 [ 573.588428] ? creds_are_invalid+0x48/0x110 [ 573.592752] ? __validate_process_creds+0x14c/0x200 [ 573.597756] prepare_creds+0x3e/0x380 [ 573.601550] copy_creds+0x7b/0x4f0 [ 573.605089] ? lockdep_init_map+0x9/0x10 [ 573.609162] copy_process.part.0+0x868/0x6a00 [ 573.613672] ? save_trace+0x290/0x290 [ 573.617491] ? proc_fail_nth_write+0x7d/0x180 [ 573.622011] ? proc_cwd_link+0x1b0/0x1b0 [ 573.626078] ? __f_unlock_pos+0x19/0x20 [ 573.630069] ? __cleanup_sighand+0x50/0x50 [ 573.634300] ? lock_downgrade+0x740/0x740 [ 573.638438] _do_fork+0x19e/0xce0 [ 573.641890] ? fork_idle+0x280/0x280 [ 573.645599] ? fput+0xd4/0x150 [ 573.648797] ? SyS_write+0x15e/0x230 [ 573.652522] SyS_clone+0x37/0x50 [ 573.655874] ? sys_vfork+0x30/0x30 [ 573.659429] do_syscall_64+0x1e8/0x640 [ 573.663314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 573.668170] entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:34:38 executing program 0 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 573.673346] RIP: 0033:0x459a59 [ 573.676518] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 573.684217] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 573.691664] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 573.698920] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 573.706202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 573.713480] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 573.753581] FAULT_INJECTION: forcing a failure. [ 573.753581] name failslab, interval 1, probability 0, space 0, times 0 [ 573.766194] CPU: 1 PID: 24141 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 573.773226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.782576] Call Trace: [ 573.785177] dump_stack+0x138/0x197 [ 573.788813] should_fail.cold+0x10f/0x159 [ 573.792966] should_failslab+0xdb/0x130 [ 573.796943] __kmalloc_track_caller+0x2ec/0x790 [ 573.801735] ? check_preemption_disabled+0x3c/0x250 [ 573.806775] ? prepare_creds+0x3e/0x380 [ 573.810750] ? selinux_cred_prepare+0x49/0xb0 [ 573.815238] kmemdup+0x27/0x60 [ 573.818426] selinux_cred_prepare+0x49/0xb0 [ 573.822748] security_prepare_creds+0x7d/0xb0 [ 573.827244] prepare_creds+0x2cf/0x380 [ 573.831126] copy_creds+0x7b/0x4f0 [ 573.834652] ? lockdep_init_map+0x9/0x10 [ 573.838728] copy_process.part.0+0x868/0x6a00 [ 573.843229] ? save_trace+0x290/0x290 [ 573.847030] ? proc_fail_nth_write+0x7d/0x180 [ 573.851584] ? proc_cwd_link+0x1b0/0x1b0 [ 573.855765] ? __f_unlock_pos+0x19/0x20 [ 573.859792] ? __cleanup_sighand+0x50/0x50 [ 573.864021] ? lock_downgrade+0x740/0x740 [ 573.868186] _do_fork+0x19e/0xce0 [ 573.871629] ? fork_idle+0x280/0x280 [ 573.875384] ? fput+0xd4/0x150 [ 573.878589] ? SyS_write+0x15e/0x230 [ 573.882329] SyS_clone+0x37/0x50 [ 573.885745] ? sys_vfork+0x30/0x30 [ 573.889295] do_syscall_64+0x1e8/0x640 [ 573.893226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 573.898064] entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:34:38 executing program 0 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 573.903253] RIP: 0033:0x459a59 [ 573.906459] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 573.914207] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 573.921476] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 573.928804] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 573.936063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 573.943337] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)={0xe92, {0x5add, 0x15, 0x10000, 0x0, 0x7fff, 0x5}}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000600)) r7 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r7, 0x5412, &(0x7f0000000040)={0x13}) sendfile(r1, r2, 0x0, 0x50000000000443) [ 574.005915] FAULT_INJECTION: forcing a failure. [ 574.005915] name failslab, interval 1, probability 0, space 0, times 0 [ 574.019435] CPU: 1 PID: 24146 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 574.026492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.035863] Call Trace: [ 574.038475] dump_stack+0x138/0x197 [ 574.042126] should_fail.cold+0x10f/0x159 [ 574.046292] should_failslab+0xdb/0x130 [ 574.050310] kmem_cache_alloc+0x2d7/0x780 [ 574.054461] ? creds_are_invalid+0x48/0x110 [ 574.058772] ? selinux_is_enabled+0x9/0x50 [ 574.063005] ? creds_are_invalid+0x48/0x110 [ 574.067343] __delayacct_tsk_init+0x20/0x80 [ 574.071684] copy_process.part.0+0x1a6c/0x6a00 [ 574.076281] ? save_trace+0x290/0x290 [ 574.080089] ? proc_fail_nth_write+0x7d/0x180 [ 574.084605] ? proc_cwd_link+0x1b0/0x1b0 [ 574.088667] ? __f_unlock_pos+0x19/0x20 [ 574.092659] ? __cleanup_sighand+0x50/0x50 [ 574.096902] ? lock_downgrade+0x740/0x740 [ 574.101064] _do_fork+0x19e/0xce0 03:34:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000080)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) r6 = getpgid(r5) r7 = syz_open_procfs(r6, &(0x7f0000000100)='mountstats\x00') sendfile(r4, r7, 0x0, 0x50000000000443) [ 574.104527] ? fork_idle+0x280/0x280 [ 574.108255] ? fput+0xd4/0x150 [ 574.111453] ? SyS_write+0x15e/0x230 [ 574.115171] SyS_clone+0x37/0x50 [ 574.118534] ? sys_vfork+0x30/0x30 [ 574.122178] do_syscall_64+0x1e8/0x640 [ 574.126063] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 574.132143] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 574.137331] RIP: 0033:0x459a59 [ 574.140521] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 574.148261] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 03:34:39 executing program 0 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 574.155542] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 574.162815] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 574.170093] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 574.177382] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 574.242270] FAULT_INJECTION: forcing a failure. [ 574.242270] name failslab, interval 1, probability 0, space 0, times 0 [ 574.254456] CPU: 1 PID: 24162 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 574.261502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.270867] Call Trace: [ 574.273473] dump_stack+0x138/0x197 [ 574.277124] should_fail.cold+0x10f/0x159 [ 574.281293] should_failslab+0xdb/0x130 [ 574.285284] kmem_cache_alloc+0x2d7/0x780 [ 574.289457] ? trace_hardirqs_on_caller+0x400/0x590 [ 574.294483] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 574.300029] dup_fd+0x85/0xa40 [ 574.303232] ? refcount_inc_not_zero+0x88/0xe0 [ 574.307848] ? refcount_inc+0x1f/0x40 [ 574.311665] copy_process.part.0+0x1b5a/0x6a00 [ 574.316290] ? save_trace+0x290/0x290 [ 574.320117] ? proc_fail_nth_write+0x7d/0x180 [ 574.324598] ? proc_cwd_link+0x1b0/0x1b0 [ 574.328658] ? __cleanup_sighand+0x50/0x50 [ 574.332880] ? lock_downgrade+0x740/0x740 [ 574.337017] _do_fork+0x19e/0xce0 [ 574.340462] ? fork_idle+0x280/0x280 [ 574.344218] ? fput+0xd4/0x150 [ 574.347399] ? SyS_write+0x15e/0x230 [ 574.351099] SyS_clone+0x37/0x50 [ 574.354449] ? sys_vfork+0x30/0x30 [ 574.357974] do_syscall_64+0x1e8/0x640 [ 574.361846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 574.366680] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 574.371854] RIP: 0033:0x459a59 [ 574.375028] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 574.382722] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 03:34:39 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000040)={'veth0_to_bridge\x00', @local}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:39 executing program 0 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 574.389975] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 574.397229] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 574.404481] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 574.411738] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x7ff) [ 574.528147] FAULT_INJECTION: forcing a failure. [ 574.528147] name failslab, interval 1, probability 0, space 0, times 0 [ 574.544962] CPU: 1 PID: 24173 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 574.552021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.561397] Call Trace: [ 574.564009] dump_stack+0x138/0x197 [ 574.567658] should_fail.cold+0x10f/0x159 [ 574.571822] should_failslab+0xdb/0x130 [ 574.575808] kmem_cache_alloc+0x2d7/0x780 [ 574.579970] ? trace_hardirqs_on_caller+0x400/0x590 [ 574.585011] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 574.586269] selinux_nlmsg_perm: 127 callbacks suppressed [ 574.586281] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.590123] dup_fd+0x85/0xa40 [ 574.590138] ? refcount_inc_not_zero+0x88/0xe0 [ 574.590149] ? refcount_inc+0x1f/0x40 [ 574.590166] copy_process.part.0+0x1b5a/0x6a00 [ 574.590191] ? save_trace+0x290/0x290 [ 574.590204] ? proc_fail_nth_write+0x7d/0x180 [ 574.590215] ? proc_cwd_link+0x1b0/0x1b0 [ 574.596919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.607732] ? __cleanup_sighand+0x50/0x50 [ 574.607746] ? lock_downgrade+0x740/0x740 [ 574.607762] _do_fork+0x19e/0xce0 [ 574.607776] ? fork_idle+0x280/0x280 [ 574.607791] ? fput+0xd4/0x150 [ 574.607801] ? SyS_write+0x15e/0x230 [ 574.607817] SyS_clone+0x37/0x50 03:34:39 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = getpgrp(0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r6, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) fstat(r6, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r9, 0x0, 0xffffffffffffffff) r10 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r10, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d80)={r10, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000d40)='skcipher\x00'}, 0x30) getresuid(&(0x7f0000000dc0), &(0x7f0000000e00)=0x0, &(0x7f0000000e40)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r15, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r13, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r14, r16, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r19, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r17, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r18, r20, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) getgroups(0x4, &(0x7f0000000e80)=[r16, 0xee00, r20, 0xffffffffffffffff]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000fc0)=0xe8) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r25 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r25, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r23, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r24, r26, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) r27 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r27, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r28 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r28, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000002300)={0x0, 0x80000, 0xffffffffffffffff}) r30 = socket$alg(0x26, 0x5, 0x0) bind$alg(r30, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r31 = accept4(r30, 0x0, 0x0, 0x0) r32 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r31, r32, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r31, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r33 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r31, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r33, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r34 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r34, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r34, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r34, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r34, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r34, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r34, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r35 = socket$alg(0x26, 0x5, 0x0) bind$alg(r35, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r36 = accept4(r35, 0x0, 0x0, 0x0) r37 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r36, r37, 0x0, 0x50000000000443) r38 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000002340)='/selinux/relabel\x00', 0x2, 0x0) r39 = socket$alg(0x26, 0x5, 0x0) bind$alg(r39, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r40 = accept4(r39, 0x0, 0x0, 0x0) r41 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r40, r41, 0x0, 0x50000000000443) r42 = syz_open_dev$vbi(&(0x7f0000002380)='/dev/vbi#\x00', 0x3, 0x2) r43 = openat$nullb(0xffffffffffffff9c, &(0x7f00000023c0)='/dev/nullb0\x00', 0x200, 0x0) r44 = syz_open_dev$video(&(0x7f0000002400)='/dev/video#\x00', 0x7ff, 0x101040) r45 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r45, 0x0, 0xffffffffffffffff, 0x0) r46 = geteuid() setreuid(r46, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r49 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r49, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r49, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r47, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r48, r50, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r53 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r53, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r53, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r51, &(0x7f00000004c0)={0xa0, 0x19, 0x2, {0x4008, {0x12, 0x3, 0x8}, 0x0, r52, r54, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r57 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r57, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r57, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r55, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r56, r58, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) getgroups(0x9, &(0x7f00000027c0)=[0xee00, 0x0, 0xee00, r50, r54, r58, 0xee01, 0xee00, 0xffffffffffffffff]) r60 = socket$inet(0x2, 0x4000000000000001, 0x0) [ 574.630536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.634312] ? sys_vfork+0x30/0x30 [ 574.634331] do_syscall_64+0x1e8/0x640 [ 574.634342] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 574.644405] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.650447] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 574.650458] RIP: 0033:0x459a59 [ 574.650462] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 setsockopt$inet_tcp_int(r60, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r60, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r60, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r60, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r60, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r60, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r61 = socket$alg(0x26, 0x5, 0x0) bind$alg(r61, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r62 = accept4(r61, 0x0, 0x0, 0x0) r63 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r62, r63, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r62, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r64 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r62, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r64, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r65 = socket$nl_route(0x10, 0x3, 0x0) r66 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r66, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r66, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r66, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r66, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r66, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r66, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r67 = socket$caif_stream(0x25, 0x1, 0x0) r68 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r68, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r69 = socket$alg(0x26, 0x5, 0x0) bind$alg(r69, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r70 = accept4(r69, 0x0, 0x0, 0x0) r71 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r70, r71, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r70, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r72 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r70, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r72, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r76 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r76, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r76, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r74, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r75, r77, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r80 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r80, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r80, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r78, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r79, r81, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) r82 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r82, 0x0, 0xffffffffffffffff, 0x0) r83 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r83, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r83, 0x29, 0x23, &(0x7f0000002d00)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast2}}, &(0x7f0000002e00)=0xe8) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r87 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r87, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r87, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r85, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r86, r88, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) r89 = syz_open_dev$vivid(&(0x7f0000002e40)='/dev/video#\x00', 0x2, 0x2) r90 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r90, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r91 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000002e80)='/proc/capi/capi20\x00', 0x400, 0x0) r92 = socket$alg(0x26, 0x5, 0x0) bind$alg(r92, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r93 = accept4(r92, 0x0, 0x0, 0x0) r94 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r93, r94, 0x0, 0x50000000000443) r95 = socket$alg(0x26, 0x5, 0x0) bind$alg(r95, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r96 = accept4(r95, 0x0, 0x0, 0x0) r97 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r96, r97, 0x0, 0x50000000000443) r98 = syz_open_dev$sndctrl(&(0x7f0000002ec0)='/dev/snd/controlC#\x00', 0x4, 0x10000) r99 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r99, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r99, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r99, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r99, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r99, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r99, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r100 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r100, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r101 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r101, 0x0, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000002f00)=0x0, &(0x7f0000002f40), &(0x7f0000002f80)) r103 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r103, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000004700)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r107 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r107, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r107, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r105, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r106, r108, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) r109 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r109, 0x0, 0xffffffffffffffff, 0x0) r110 = geteuid() setreuid(r110, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r113 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r113, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r113, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r111, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r112, r114, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) r115 = geteuid() setreuid(r115, 0x0) fstat(0xffffffffffffffff, &(0x7f0000004780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r117 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000004800)='/dev/ptmx\x00', 0x442, 0x0) r118 = syz_open_dev$dri(&(0x7f0000004840)='/dev/dri/card#\x00', 0x7, 0x200000) r119 = syz_open_dev$sndseq(&(0x7f0000004880)='/dev/snd/seq\x00', 0x0, 0x2000) r120 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000048c0)='/dev/snapshot\x00', 0x2000, 0x0) r121 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r121, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r121, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r121, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r121, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r121, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r121, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r122 = fcntl$getown(r0, 0x9) fstat(0xffffffffffffffff, &(0x7f0000004900)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r126 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r126, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r126, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r124, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r125, r127, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) r128 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r128, 0x0, 0xffffffffffffffff, 0x0) r129 = geteuid() setreuid(r129, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004980)={0x0, 0x0, 0x0}, &(0x7f00000049c0)=0xc) r131 = geteuid() setreuid(r131, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r134 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r134, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f33394f9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044000500e0000001000000000000000000000000000000006c00000000000000ff0200000000000000000000000000010000000002000000000000000000000000000000b6ed19456375ff4f2ced728f8b3b6025626d9a9b1518b369e9a22c5d0f37ba3ad7fa9214039180980cb8d807a3253a378cee6d26de44d81425ece98958bccfefa7b8e3f64fa8bbe82e25076e77c22927346ef3780baea15001cc1295d0c2c6b6fbef53f82976bd2d481a9e3bfd185e5ce452d5770b0ac989742253429045324896f90c10d8fb9b99711f1ad298897b6c3ef38207181684dda141bdaea059b520cbfebf932dbdd055962ffbbbf2f0a52c02be74ac1d21939322171a22edd0547b7211a862bed88bebe1a89f"], 0xfc}}, 0x0) getsockopt$sock_cred(r134, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r132, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r133, r135, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r138 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r138, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f33394f9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044000500e0000001000000000000000000000000000000006c00000000000000ff0200000000000000000000000000010000000002000000000000000000000000000000b6ed19456375ff4f2ced728f8b3b6025626d9a9b1518b369e9a22c5d0f37ba3ad7fa9214039180980cb8d807a3253a378cee6d26de44d81425ece98958bccfefa7b8e3f64fa8bbe82e25076e77c22927346ef3780baea15001cc1295d0c2c6b6fbef53f82976bd2d481a9e3bfd185e5ce452d5770b0ac989742253429045324896f90c10d8fb9b99711f1ad298897b6c3ef38207181684dda141bdaea059b520cbfebf932dbdd055962ffbbbf2f0a52c02be74ac1d21939322171a22edd0547b7211a862bed88bebe1a89f"], 0xfc}}, 0x0) getsockopt$sock_cred(r138, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r136, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r137, r139, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r142 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r142, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r142, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r140, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r141, r143, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) getgroups(0x6, &(0x7f0000005d00)=[0xee01, r135, r139, 0xee01, 0xffffffffffffffff, r143]) r145 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r146 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r146, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r147 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r147, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r148 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r149 = socket$alg(0x26, 0x5, 0x0) bind$alg(r149, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r150 = accept4(r149, 0x0, 0x0, 0x0) r151 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r150, r151, 0x0, 0x50000000000443) sendmmsg$unix(r5, &(0x7f0000005dc0)=[{&(0x7f00000002c0)=@abs={0x2, 0x0, 0x4e23}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000340)="b7e1fa05794363ba14901399a8bde0ef01300af4bb2df58a5e9cd1916fb2e88934bb624b6e19c76141afd2564826f5d3dce8231e6fe99d1f91d880b0d500909dd14d2132455174b01144794afefd40f62fc16f2f385251830536d999b02c252fbbff44c7339d98b8b7ed54be29b35c303d035ccb1f838c0795c1f50b6f7eb31353377837bd4ef14559b5a22b241cd73fa3ec228786beada590ba26163ecbfbc0b6324234e6a40c45c60899fb3deb", 0xae}, {&(0x7f0000000400)="ef321e5e8caca7279e420e619339f736ff0206829010d7103dc48d61ee615faaa9d1b6f69b01f99e4bc143aba1bbfe95a62ab6711e1f7df9a1026fa53c97929a42cc96a0dddaad6c16d51234cfa843fedf9a69c43a29bd9f35833d1bf7ccae52be9455cd053ff5763ea93e31475068d5331d499b960e39f03dadbddb4c3e99682350ca62391e231ef1be9493d14596bb115be7909c286429eb1edd831133b46ed63b53f968383e5e48eb87526b19bb1cab7d0aadee68dbbdb23cec2e76f77d2d1cf5fea7f30f10c6e018d218b5ce67096a8fad0843b1f144687b606f3262b144ceae87f842e4c758784d15f2e1c5c0cadb7818fe02", 0xf5}, {&(0x7f0000000500)="dee0217cca3eadd2244edfae1daac63ccd086af5b7e48344cb30a35a1e55e64b5542b10f6f775b7ac285261b79beeec4548da0c9cc92b7eafb7cbd054c3d93419cd46d22817ad3abb6769926b875cd1c6b9557627da5eecea7d6ce2ea684320fbfc8cc9658a3dfb34d8d2ad3198244d4cdd2004e0a7c9c87d0443b046f81d19b4c4644dba4201f2dadfbc9c6c8466ea925190f13d8a814d333ce202ba87e9565f21fbc1744b8532c9ebaff65901c9f17cf9f54bcacc0eb9669dbb5975c224ccf72e19445335b1aeb269f3837a279c6778e44ac9e17002c38906863176f5550c0993760f80e88ab4f2c89ff96a66342cac5185160ffcf33fe65", 0xf9}, {&(0x7f0000000600)="6df3f50bd2c24b1233d7f5823a0bb16a4f86ababd278914ea1fafaac17ec817c47d561b4918c321d52e72286a0974f27e726eaa74160b12fc283ca93f2fa43740dbf18a46680b1bda10c36a30c82027bb2f1ce4e68b312391e423005eeeb5c3d32fd3cd5b566d24305989ade01c6355bda4dacd151cd295fcf50dadfb65310bbe4f19281995a34eeb069264558873ad60569201d5d8ff2e597a3b6c658646de8e646400fab95bf4caa6a42579fc96ffd0556ebac3b04548cbf87b633c7077f398e4dbbd59b0dbb4b895a12a92abea9bad652998b78b112dc95", 0xd9}, {&(0x7f0000000700)="09703bce45db6a04254c20f8ddb0684f895acb9d369273427e2dca323da444bdab14199bbf0a8c2ee8a29c6394b43e0a39b9fa5b12ac513ef75915b72ceef3a1ff44b8a0d22b435de7bea708461f", 0x4e}, {&(0x7f0000000180)}, {&(0x7f0000000780)="8c579c42cc63a5e7ecb9f18c164d9f93d8d96b5223a1d0e49174c799417af38659d41790f17b73938262d7121c2581042127ebad2e8930dd78cc145554cd997ae7f83a09de205c8a2888dc660fa52154b0c199021403dd99d62bca9d64dc6f8979d3b5e70f3a240181675421c2168c871499abbcf1", 0x75}, {&(0x7f0000000800)="606a4e6d3cf18a265db363aba403f73cf19939ea2d6ef815823865aa74089bad309f3b04c0f1db98bbd32288a89c5bc6c725e1e3ee65c2193ca7eee5d2bc8cb7fcb5c9de49d2370315b3858f1d3560f8a1f2839c1ea986731bcbf765613b440fea90d1e277ab7aa9b75f215bce3d5f49237f4aa7", 0x74}], 0x8, &(0x7f0000000a00)=[@cred={{0x1c, 0x1, 0x2, {r2, r7, r8}}}, @rights={{0x18, 0x1, 0x1, [r1, r9]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x50, 0x20008821}, {&(0x7f0000000a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000b00)="5985d76eed1a180ab566beaa0d6ed1260dd6e27d1d3877198965c19f9d2f4309858f87e63da6a871845e", 0x2a}, {&(0x7f0000000b40)="0e4e4e1e04ca735f83968d6692695607e9566c1ac9c2f496fb8a98d4a6c40d3c8c8b85eacf1eb2c681277112635d99e23c2b3fe97e5c7576c4733906d24b40fd899ca529f6b3818f6b89c736aa17b30f4d7089dd0adc71d933b0e143aa0fcb526076f1ee5e3b7d1059dc0947f95e0da0a4ef08b76921d83dbfe97cfdff8579e1992b7735a413de0c2c", 0x89}, {&(0x7f0000000c00)="139e6fdda5cb13e33ac7879ec207f33e0f3821578390d6b0a10562cfdd96c7b5ea87975f6fe6d3ed7ba2d9cd98b38879885069eae3aaecf923a41cc2a5c020371e874876b8e56acf4d5ca2bda23a5c968d78f55a4836a46adb99bc09e482659496c928f93b", 0x65}, {&(0x7f0000000c80)="7ad1d62d8b1b3ce9230ae4b3a4de4cb0da21b3ec286bd3db7eaab11f6b3e98709e39a8de3137f56aff0d93dc4128fddc339972684d9458df7602a59306a3664797c45a961a62e0b2ed815c52ecc3a312cb57bb0611f5243b9cca238697cb85051dbe5a0b58426b", 0x67}], 0x4, &(0x7f0000001000)=[@cred={{0x1c, 0x1, 0x2, {r11, r12, r21}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r22, r26}}}], 0x40, 0x9b6c895a65149580}, {&(0x7f0000001040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002280)=[{&(0x7f00000010c0)="71f345ba549244511ad58e52d34f99627677cfa9c0d94d92a6436dab323c8f97c67008acc2f73f6ad1e45a3f90148b631b6ddd22598aa33a00f37b7030877a70f0aaf56a2788e247ef6ca23fe442bde05191cb1496788f33d4c9b4b4dc22a85b6c096877fb641e70bbd7bcb4fa6d450d113a767f137eaae25a96fed50350016ef0307914a16d3febba9206feb63a8e928ce51f671ca835b5a441", 0x9a}, {&(0x7f0000001180)="04b2bf32696a9086bc9ece215879afc3c48a36fc5ccc55f4be01e961ed0eb5efe7d449140f20e6a7189b1867853da4b9ca01386e631eeebce562314de53626f6c4a39f5e21451b0c9f", 0x49}, {&(0x7f0000001200)="d3dabf343316050b28205f2973245b51c55ee04a2803231e23d3df0b941cb8e0575042178d3fb546a3bc44f581cfcedfed08", 0x32}, {&(0x7f0000001240)="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", 0x1000}, {&(0x7f0000002240)="fe5c08a568f6137160b80f9ca04e003fc8e8f6e90951ab2072a9", 0x1a}], 0x5, &(0x7f0000002440)=[@rights={{0x20, 0x1, 0x1, [r0, r27, r28, r0]}}, @rights={{0x28, 0x1, 0x1, [r1, r0, r29, r31, r34, r1]}}, @rights={{0x1c, 0x1, 0x1, [r0, r37, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, r38, r0, r41]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [r42, r1, r43, r44, r1]}}], 0xd0, 0x10000000}, {&(0x7f0000002540)=@abs={0x3, 0x0, 0x4e20}, 0x6e, &(0x7f0000002780)=[{&(0x7f00000025c0)="665f43a7647e8161d8d71f58aca2a9eb94af9a855260e95edb04880f6c0ebfdaad5c5443812903c5f91ef0be112139d9c9afbf879b55a6b06b9a58c73bba069b9d2749e910a4a48b314310848e65762c90bc89e20c244e76a5b6a65a7052f597e71404aa706943c4b1037d7941b84a95e3b04faa332e27545c3dc73761", 0x7d}, {&(0x7f0000002640)="455300cba59ba22e32e7d158cba4095b4371b4d0bbc41124d58bbce5a0fa760e7889cd0d0362dd0fdc7dac7660c64d472735ba2157d4ea5e44830839392a9c365f9a420082445bf582ef5d764cdf865a6ca875ee998ae9d03028364dd46927bacc1aadc7484c0db562e9c88d393840b013177dec5a48aa9c7ca35dd8a5a598731ff769cd726716e5f3616cca57aceaf360595198357e90adf93ad97b426bbdc05a6232b27360d225321061e7b806baee3700d7df770a2a54aa6e9b2e9e0d4a2bacdeb66b890a0956a13a80bf910d367f4240ead6c295ade92fc43537f533af2491ae555b", 0xe4}, {&(0x7f0000002740)='4YKX', 0x4}], 0x3, &(0x7f0000002800)=[@cred={{0x1c, 0x1, 0x2, {r45, r46, r59}}}], 0x20, 0x44000}, {&(0x7f0000002840)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002bc0)=[{&(0x7f00000028c0)="64c63e3e6f", 0x5}, {&(0x7f0000002900)="7268a486df4f407cd70149506f28874790a6ed630a81ce605c5860135db296a51fd4ee225729d183a271c94882c4842fd5fa8e3633ca7afbf4b9bfc190bb7e2abd3d2a12b1abdfffbc68f5c138bf75290668d32789ee6a18bafe431109d163d41e4842048d9cb092052755920c6adccba154215ce0be4f436421aa05668c8361591e18ca50a4f7289537f86f84c752b09156cc635e1e8db0ab041813dba573ed2cb3033ee61c810fa1c72958a31adf", 0xaf}, {&(0x7f00000029c0)="2084892010fe12e9d434fc05516867597dee57f35b3f22a463ea4ce884", 0x1d}, {&(0x7f0000002a00)="bb21a85c30946ccd84e270c2df57b30ddc70ccdcf929f806e86870504c9683ea808d7fd3241d260f5b53cd785e58ff88f5c77036259a5a3534e4128b18239c3ffbcc20889ddb7ffe843a564407dbfae30bb8d306df7b42e9f5a0c4368db56bbf51593beee45d000ee1b8879b2fd375ea1e82b70a739deb6a43b93c8cadcc52fd17defa1605c865e4cf1fd738bdcf99807dde31468874648353216f164ac4a164d44a12dc9bcd833c05fb9a695e70d311b177618168763407ca5bb51f0728bd0b588419e5bcf2fdc15bd94346de8cb31fb92d972444543daa2243cd17", 0xdc}, {&(0x7f0000002b00)="4a1462253ee56c72e1874a88142b4f1c0a17c499bf0eab67f8d7b964880c4112c4db8d4870ee4a731c29472c2cf1f206b1798070b537689041d37a0f7f89633e9e59d5bdaa0cf7c6643ddc6f2942664b57aec51ebb6e4ef029e59719a6aed113b340f8c082aaebe0ce6be6373aa705a555d074f8b8c5f039858df4fefa8685349ef7c2a70908881db9bf0ea3d9e6", 0x8e}], 0x5, &(0x7f0000002fc0)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r60, 0xffffffffffffffff, r0, r62, r65, r66, r67, r68, r70]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r73, r77}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0x0, r81}}}, @cred={{0x1c, 0x1, 0x2, {r82, r84, r88}}}, @rights={{0x1c, 0x1, 0x1, [r1, r89, r1]}}, @rights={{0x34, 0x1, 0x1, [r90, r91, r94, r0, r97, r98, 0xffffffffffffffff, r99, r100]}}, @cred={{0x1c, 0x1, 0x2, {r101, 0x0, r102}}}], 0x110, 0x10}, {&(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000044c0)=[{&(0x7f0000003180)="854919ec311c8a36a766b092fd73c2e3c3c2eae7117a38429ee220e3397288dc1fac2b48cb16bdc466a7fa3271642275d157aa3773f3c69a6a0368a764afbadacb205f53f94c3b6c2cd2c52fff097aaac9e481f26f978d7d52e0a0dfd1bced532c5e612ada20a2ff2f68a5e6c1246d9f31b0cecdc8306e184645c70e0895c8f9a3abe6d39762e4dc62a4ce4cbf927b4053f79781c7de56062c05a71c45ae1ca0d1d5", 0xa2}, {&(0x7f0000003240)="96c3b6db3915e86b991e75b9ac239fd6dfb22408934dbfc34d6066982a865bc848258cd449e853dac250a9f8261ec6a25a1e89ddf04d71d3727c7ce40ea759e638ea49662c7eedfe4d55db7c0b19d418632daddecb314c879eee012647b19d6b1819b0c310b34b89176eed05806ff769d5b0926adbc3f6c435a8bd9e1effb4cb2ce8013743eff88dd7fadbb6882d920f", 0x90}, {&(0x7f0000003300)="9fee", 0x2}, {&(0x7f0000003340)="696cefec93073043c345599a1b044ae118feb8a0eb9adeca2fd6432c3af50b107293ef616bbffa05884665346cd5071d785754c790d87ddf4b3720971fab2d032b0cf34e0ccaf8b01b2b1dbd16272225af540fd18daab2219da571a4621260094a7065224fb26349a3864f614a6a8b41504052b6d39945005794a703c6677c2ff21ed43c3473b10a0e68c4f1f063b42c15629d6224117827f8a6e2dbcbe8596c3e9cd59f6919896829d5a0e1d0cac6d50b4ad888493937ab029fb5f1bfceedb60ed5b346e81b7e3d70534216d7286787fba09a", 0xd3}, {&(0x7f0000003440)="831d04215a6063b8c55ecce2d3c0d2c52119791d8592a013fbc1ba56dd2353bdc183cc0ce764e1dcfa7fceb64000a52a22fa48a2dcb7671e67c2e024350742e75dc84e5e56efd73c3299f3ba8301b9d8cbfa55657eaaddcdf27fd35657b24b52d0753ecbe548544f0e79a6557701f2d9a3939c109dc791511d9226a1dd4af8443eeb77b5952125bd8bd1e08a202f31e0a3fe5d0ad1436a91126984f4394aa44121fbd620d93001293b482ea36db117fe7465a357c410a9ad29a09c9150840b023ce27827af0ab8ff6c4af50e054848f7a8da0bd50986aa17a7ece87eefcd36eae167be3002a688ed1074f1ab1cadd202c9cd6eb97aee06a83987d5838e606a87f25eef955cd56496ebb4e76238c40b5692cc4390f5a349b79287af76dafadf98687b3803fb76df11e76d3d363bebcbaca3fa6d167213e2ceda47d4aa324c1a79438528f580a8e8b3a505b1e14a7cb8df5276e2fe2166a322c54a08e1bf0470b141a1abe8cf596dd491272891f475b2001efd5d400228374cdce674810bff2e84e812639faf8be3cc2587fe158d705129870131d150b1256f9fa4cf982a0bc90fabd2d5a0370c3875a285fc7356a5099e47aa423c5446050847b4a0836bfe8994dec09cc3eee3bcd6b054ac90e05d4f03b2570e95e4c531db241b9e04e093f2fb1946807c7a6b990a20f25c4da13e7f9a3484ee0d914c10132e61b54462ef471703216216bc415682d72ca6a9c0c2d31c9100c7b4864d3919c3011684c55dd6837d8b72266cc18ca324d0248515441369019250d9e4cb41a6e6f2b816bf84250257a699220732e2d084e81d88f01a6799b7b3d96a0b57d0503aa1a64b6644473cfd56973c5f851e6881922cdba292ca91cbbbbe307a6f6d69954c7e05b547327483eb0a45a4e30532ccaa9cb482b12a507e30b4405616a94a8f06ab331ccf58aff1d66087c027ed5808925e539ae4e3950a0137534a14d92bf575db5326a2f8d91385752785a8951382ed0a17845dd72d287bd03a8b7f35da69d6f68adad9a18dee290ca3b60983bdac05a6be33127496f9765051c0e4fdac74a5e796974580a1950aa4c83e92764c5c5c0522f579eebc7da678262666ee7f2274bdf62ecbc410fe0a2776be3f4ca563b80f1bcd0d557e5e88617cac16d8348f0c4e13524b2ef5d1bfc2527f6cb8511ad89dd4c49287eed0c65f14110dda1c585a6cabe85aa25af7a648364070eebb042103de10729bda0840e78de0a83db1f0310807d5812b320d03beb9a65a8054d7d383b9f180f4d66ef1017c5987b2df7aa054ce009c2b6dd6a72535e93fca4f5040e8f5b0d5afaa26d3d582ee634ab3a210731e570b962536b5ea07adb8e86b531d06d0c9d8a317d771c57850bcf572f9f76f1517b2e1bf3f8c1a7fc56f4c5b6167ec84fb2c02298f20fa5d54dc7922617b9ed1cafd211f69cf16875ef95a9f3271183e3ca0e3c74cd847f90f439bbd00fce070217f0ecd7c1a6a660ae33d9fd4cf049e537ecf77670c9f0b3bef1a71c101bdf0afbf096ec5de05dbe74620f927ec5af052d2e56279c0cd539f9080e6b3cf1dffc40baa8a0f32dc1b55688fb149ff042d6ebc77345abe5bcf837989b1bd1aa6c83ce6f518667b66534e6d4c618114b61d4be9eb2cc55ddca384e700674690e9433e16824c7c081408af3c5836c8972845e96835e221af11318db99005f0f78c4f3af811ac01be1034080dcccb45cfec15b0219d61e1f5e664761b217eb8d222bb18fc4c2702e1b66a5b55efc11d95abf1c7410360eff4cd71966fb9dc620c9b085453dcf3fff0a7bb84423481b4bfcf39b5ae922c21a123619c37244f150ec53fe0347af64dc1ffcca2a5561eab0a1364cdf8ac37484d54f6e63fbda676ca5adf77f50bbda174b05615bfadc67667c0f002235602e41630c5bfe5f3959e0f83f235d3737b6d1e880be615dcdc43b8f21279b3c828318858038244e8b22506f532f833cc763e8135190ecf1eec6acc3673d6916554a1c7f7136927a2db6ed02809687adebceb87b05c0f3d391b40e464add6c6055212db1d25158959b191354310a08bc22d896ae651a17c759427f4d69cc1d6d21aede84bf1dd45bebcfd4dd6c297db54aa649fae8dbff76ff9513b8b143b0cd2bb18045e10f10d3569627263ac8ef2afd907152ab6b160bf0a1d4a024bdd03fe02c7d472951fcff6d79228dd26444bd3c9e20ba8d11985a3786d1cde8e17844b5268133a5089981750151a202b17afb8ecc462cd1a65339b1e0d624f550b791e9bdd9bd105328ee10e4215388aee2443bfd2fb9d8ebe1a852506b74dbf93189bbf53b517974f81d2ddd923281392888045429cef62e6bfe4bc822aa549b1c7aa3383de8d71092841dfee27bde533dfff2a32a6a2df5a8a20c9c8c9c07adb4edc587cb9da4fed9024ecea5de329b980511584eff7738ea53ba2b09562b2cc17c01dece43969ca2b2e32afcdbd1283b7ee3896543c9a5e29a63fd0b36a21ac8208190741423375c05fb6893a7fca2bbe584ec42c0c0d4c4944fd008bb84c15c3d5d0891946b76f4166af01a9993c43efb0ffc0d7097aa3eb9b3ca67f3e8e48e1adb4bec9701fec3b035b4a8fd7f78a64ab4e331e7d96a5785a35e5c10ce86d1a10a7e192d3638a1f0ffd2aa86ba3a9e76d1e8b85575648670f96ce114eee3980506460f55c3ac6e36a9a33cbf62ef30e0fe9815381ba3da6a07ee8ed88f60b3ec0c8929692d6a2a3655a87dc091c3ebc854ba83335a230b6efb746af18bf0889e2e440636b62c44e1fbfd84bbbf54e4fca4a7605c5c064c96d68a4dd6f5ddd82a8829eddf379b8765861a8a5c85be5998dff9f21fe4838e91898ffe54193a3e80b8fff8e68a5c20105140ff8bdd39b8b3ff4a1b79e5271afdc9f9aeee8559130116b2ae1522297a5fad632449c58d8d7f15f3b6f6ae733e5d58da4d8465a12160a9ee80cc9e6bf61a8988a7c41d5699d8c12546d5630165b345497d6a413035d1fc352912f6ea4dae1bca8496d9adb1cf318bd0b4884c449292c472cf448a6a7e935f3fe1b76253e3ea2bfab3793390d4a336f08c676bf695bd7b612590eb23f6077fcbba30b5254f6b59809189fa5c42b842a60b0f7093dc273bdd63214965d5863e77938673011c531cd7f3906e34c48b5dfdef2297c4a732576260b4f0ee90f1dff8e9d144236a7478bcdf002e55dc7ea1f8d3fd9399c32db8b4def792290cc10dd2c92077079c806c0bccb7473a2123e36a16dc22fe3cbcdddd073982278e3bbad7b068be3959bc7fc7d17a1d6e246965a2155e0c8d247aa6b95f6687098f4dd4374d835136117845b61eac911014ea0f224a7270f66a0784cf59eee5871b6945397a1cbf17611be8f16a0cfd25cace4f05f9f7bb8e8d8e2486096835eb0ed7c3103c3b8c52af92bd6e169383857a7aa0dfc78be62c17be421fd398074e7c109fce027b3b1c2c5a5678e09e4725e8d93967a524883ac8adc77a5f185b9b56b0d17fec43a16193bec1c2879dbfc047ce3e83fd081cf40a893421b6d738734b0a8aa3b18b90ce7e4a7f06d54ff5d1ed290718148dabae2b58f3413c3fc40a6265a81b163e17d9ef7bab8946a2e36a8db744412cfc2be60310fb5d87bd4fe568653a2a10432104fa2a41999c6c1e8ecc35ac0723c6b5550fd40a46cdbf4237e64e4734d9b0d562133f05033f0db02fd9893fe42bc111f2bfa166a9cf58db11d914e2e5aca6929147bb07109c83a799765584cf2ea127acd15acac776c3100e3c7d6c542823620b3bf0b26e4b86e5a4f0f28eb9cebf79e9bb89d031c3c7c4e42f58fb6d6e3381f0a59056063d3a31d01f9167653103e0ee6175c7b0ca20d429221df25c5e9f62365693225e53fcca2acce2919608288844046831910712083e6396fe104b6f6bf0de2673e7aaea680d16820b171b1d72268bf9bb94a7b073ebd96cf4c148c9b2fb0984e984cb369c06c2b50ba32a96d1f3f12b491eaa9018b8e0bc3ee7d7affd48491ff8eefdf5f20470b663294cb817c847419ca24e8d4abf709c3e95e877ea2fc97890e946ec052ea698372b227d4a989fcbe3e40ad136bce0e76c0914a2d8be832bad335116830c45bc7f09c1df94df4e25980e5a2eab35d5313d3527dcda716941229c3184213467922f81a234a08685e2aa01d4d29074f2c539dc3d2fe59b52013feeee54e7d9de2e7b45efdf39fc083a5faff512c15d4954dae171e01b520a4a6731cdb746aee76123ec541a1dffb48b192bb689d7c8f28002cdc1848b37d6b1c648249a9772a90466c5ac318b73af1046578fa238e42db6400d924639ae70d262ac32fed65cb512d499e5d1047b98d0ff389d26c1e2c7a424e7e6dbf875a2c2edd0bc6a5050771f403befe49407d17d41afb626694d1f0b6a14a4dd868612b65861f2346f37d887b4531384261578ccc9dd191af667845ea35d594a573a144b453a86ee3bb474352898f54088dbcf7e8934e0910bfb717fd69f4ce2e49ef98fbf246a68ad676b8148610bed31ea557387f05b83cc1782bed709327796b3c58af5e90f84f279fe32b965ad4f12953cc8ab0f37c976b0fec11427ec726081a71f5afc339cbc47b2ce13f982a99cecacc501ddf4edc5832c53b55c0fb62559e066f954b2ac3ec8cb8139c17d4b7e36c1a6f39a1ff97ec6cba471c4f92e32310405267381c1825875851b71118334ab1448833ccd1717f87ab77f332958176b1ecb2f533567418ed5593a2d107f1ffcdde453f4f2b498c3f7753f9b9b4bd5722e4564fc9a2e338fcf1a1275322704027fce5b001266204894dd48fd2cd67f3faa52518503a511c91c9001dde43b4e58555d59efcaafa71c70b32cf038f298c1fbb86d872ae2a57ca1d499235754ab2be086320db1b5281e03aa1720e8f60cfb52e65cdeec50a272afc9da09867d10367fb97ef0ba4641e3515a4bce0885fd95c0e9fbfc15cac5bc7d7dcad5f78151bea73f2da51adec29178e0034bd65d2b063ddf61436226123d254bd56780b04cab3c8a78ce375311319e056d76e152d6c037f195d1fef7d35ce546ea51a4232a3a7b63a51b96431ecbad40669d613cd54ee58b7a50e413b5ff699ea3c34d4747cbe637f6e5dd0d30441ed8170bb19bb6e6be942c888f9a3741d85e3adbcd26cf8482649ce4aed30251361f27a4cb6bd584e4e26a9dfee8b2e55b79673ede21420800a98aeebbc597e96d4187e8a9eca0f11b433e065a2af02e3bc0ef1cd4dd0a6a4f4d6823bd942fb4780bf94df0ddeacde238f8244210fd0095b7fd3aa50f0b75c82cc375e9e2c836c153273353dda72471b4e405eef60ac62889e3410e9161cd145a1eec9d11b6473c541d07c8dc204b3e6663981dc8463e22c1510f2908377089b5dfbcc72e3da4ebfc5507ef277412362273885329cd1f74476b0ac603f81398e2f0dd9b65a8c21e096ed6d414a4c159c65fd8b8428ad199b149f9470e198213f7597f3eb996d2431eeab38962912832df9ca9920bd5fbd558a994472fd2788db23e3c820e5102e64a233409ff67d399b8e82eb6212b87d6519039380006e9cd681f37a506e12dacdaac8086e59c60c33ffcb0460d546d42a76e9867b9d97ed57f3830baf2eee7937b6c8a68ba4f28afa43a0241e113fece8a812b7504e05a8c4d390a8a625981ddeeb51a01243eb5c819b1c71b0babe4c6c3210b6e92260c81cba4aea586128b89458a2c4397636d8571d139cf329e682bc577646c740800d16064155d35d659d839e239f525f39a66d694bc1d7990dd7ec5f", 0x1000}, {&(0x7f0000004440)="f5df3cba5232dcea50d1e79b0057390c399c8fd94ef16986122164fe8ef666825c35bf0876b7ab78ae403c19d0d105662145751753acba550e6bc2e28867b63d61dcdb2bb9dc3fcb34d740132cf9af71", 0x50}], 0x6, 0x0, 0x0, 0x3d24264308b87}, {&(0x7f0000004540)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000046c0)=[{&(0x7f00000045c0)="47e61c4fcd8c84cfef1760d4efc7547c9034b5b064acc40adf9c7ceb17298ba15c9cd8651634569a310341e9098130207c7caf234b745de4729a1284ed19d4c98d8e554325a0df63f5c974a89c54cf6db27f34d57b50b352d834b532c3f5f42f86d8cb2f519264ebbcae81f83414fcfc20ec995a44e4c78626f094df1a2aafd958ecdfee70674151378424731fa39c994b6364a367c11d5749739009bbbb72a4c8e9ee5a0623095f959b92c23dfa8afab1223c96b25a86d011404f280ae131c717c385ea85e6a5cf0a842887101b2641f89330dc906c5129c26189de29e1d213201f9d2f5d2b883207592d7e", 0xec}], 0x1, &(0x7f0000004a00)=[@cred={{0x1c, 0x1, 0x2, {r103, r104, r108}}}, @cred={{0x1c, 0x1, 0x2, {r109, r110, r114}}}, @cred={{0x1c, 0x1, 0x2, {r2, r115, r116}}}, @rights={{0x20, 0x1, 0x1, [r117, 0xffffffffffffffff, r118, r119]}}, @rights={{0x20, 0x1, 0x1, [r0, r120, r1, r121]}}, @cred={{0x1c, 0x1, 0x2, {r122, r123, r127}}}, @cred={{0x1c, 0x1, 0x2, {r128, r129, r130}}}], 0xe0, 0x20044445}, {&(0x7f0000004b00)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000005cc0)=[{&(0x7f0000004b80)="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", 0x1000}, {&(0x7f0000005b80)="d3f39471fc230469eff10cb05953756c1aab7b5c1a10b6d02f514676eb348d48c3e9ab6385", 0x25}, {&(0x7f0000005bc0)="b904", 0x2}, {&(0x7f0000005c00)="3aba77c5583efc3e7594d7fe173a2f020f0b52826c12bc69ad4530a19060515d2523ca064ee4853bf2521c5ed3eaa1fd54332e87020ba81f0e43c5b0451a45b083805e1ca8c1409766ed240ac33103ff113406a189f6dcacab236017b1871dbfd81e7f607c710289fb76e35284f3b61fc9ca8a0894d1776a86264a7c1dbd552867770b478d8de0d6c392cd9a7a2a3a744a9a2d2b788aa79f7e0aa5e683fbf1e7fb75d57364f609f582557a8b38484b4eabb1de21", 0xb4}], 0x4, &(0x7f0000005d40)=[@cred={{0x1c, 0x1, 0x2, {r2, r131, r144}}}, @rights={{0x20, 0x1, 0x1, [r1, r145, r146, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r1, r147, r148, r151]}}, @rights={{0x10}}], 0x70, 0x800}], 0x8, 0x40000889) ptrace$setregset(0x4205, r2, 0x200, &(0x7f0000000140)={&(0x7f0000000080)="41a8943a4fd9b93467ef5c1166c0766365c28c61f2fefa51333969a60710cd635f1fe2f789b616fe6e6f3af0bcf97a58b49d0c97b6d1d1afc5a72ad812d8412ad56408c59a073d0f179f546a375024dcdb6624bb3ac1fa165ffdbe480e3b062bd86a526476fe7787d0c4999dc1f7dfd133293067685d461dcd584e4b9ef92d6bb56ea4", 0x83}) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r152 = accept4(r1, 0x0, 0x0, 0x0) r153 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r152, r153, 0x0, 0x50000000000443) 03:34:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000400)={r6, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000080)={r6, 0x6, 0x1b1b7e02d83b85cf, 0xdd74, 0x101}, &(0x7f00000000c0)=0x18) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r7, 0x0, 0x50000000000443) 03:34:39 executing program 0 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 574.650473] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 574.650478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 574.650483] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 574.650489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 574.650494] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 574.715829] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.749156] FAULT_INJECTION: forcing a failure. [ 574.749156] name failslab, interval 1, probability 0, space 0, times 0 03:34:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x7c, 0x31, 0x0, 0xf5, 0x0, 0x9, 0x729dfd04c6b83c88, 0xb, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x20, 0x6, @perf_config_ext={0xfff, 0xffffffff}, 0x2, 0x204000000040000, 0x3ff, 0x11, 0x0, 0x752, 0x8}, r0, 0xb, r3, 0x2) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) [ 574.823809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.832920] CPU: 1 PID: 24180 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 574.843355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.852736] Call Trace: [ 574.855343] dump_stack+0x138/0x197 [ 574.858350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.858985] should_fail.cold+0x10f/0x159 [ 574.859003] should_failslab+0xdb/0x130 [ 574.879146] kmem_cache_alloc_node_trace+0x280/0x770 [ 574.882347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.884252] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 574.884272] __kmalloc_node+0x3d/0x80 [ 574.884286] kvmalloc_node+0x4e/0xe0 [ 574.905609] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.909284] alloc_fdtable+0xcf/0x280 [ 574.909299] dup_fd+0x693/0xa40 [ 574.909322] copy_process.part.0+0x1b5a/0x6a00 [ 574.932489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24168 comm=syz-executor.2 [ 574.933019] ? save_trace+0x290/0x290 [ 574.933035] ? proc_fail_nth_write+0x7d/0x180 [ 574.953340] ? proc_cwd_link+0x1b0/0x1b0 [ 574.957418] ? __cleanup_sighand+0x50/0x50 [ 574.961659] ? lock_downgrade+0x740/0x740 [ 574.965818] _do_fork+0x19e/0xce0 [ 574.969284] ? fork_idle+0x280/0x280 [ 574.972999] ? fput+0xd4/0x150 [ 574.973011] ? SyS_write+0x15e/0x230 [ 574.973028] SyS_clone+0x37/0x50 [ 574.973036] ? sys_vfork+0x30/0x30 [ 574.973052] do_syscall_64+0x1e8/0x640 [ 574.973060] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 574.973078] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 574.979947] RIP: 0033:0x459a59 [ 574.979954] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 574.979967] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 03:34:39 executing program 0 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 574.979973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 574.979979] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 574.979986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 574.979992] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 575.038611] FAULT_INJECTION: forcing a failure. [ 575.038611] name failslab, interval 1, probability 0, space 0, times 0 [ 575.062754] CPU: 1 PID: 24197 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 575.069786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.079137] Call Trace: [ 575.081720] dump_stack+0x138/0x197 [ 575.085360] should_fail.cold+0x10f/0x159 [ 575.089509] should_failslab+0xdb/0x130 [ 575.093484] kmem_cache_alloc_node_trace+0x280/0x770 [ 575.099450] ? kasan_unpoison_shadow+0x35/0x50 [ 575.104024] __kmalloc_node+0x3d/0x80 [ 575.107813] kvmalloc_node+0x4e/0xe0 [ 575.111514] alloc_fdtable+0x13b/0x280 [ 575.115388] dup_fd+0x693/0xa40 [ 575.118657] copy_process.part.0+0x1b5a/0x6a00 [ 575.123228] ? save_trace+0x290/0x290 [ 575.127011] ? proc_fail_nth_write+0x7d/0x180 [ 575.131486] ? proc_cwd_link+0x1b0/0x1b0 [ 575.135539] ? __cleanup_sighand+0x50/0x50 [ 575.139755] ? lock_downgrade+0x740/0x740 [ 575.143889] _do_fork+0x19e/0xce0 [ 575.147328] ? fork_idle+0x280/0x280 [ 575.151032] ? fput+0xd4/0x150 [ 575.154215] ? SyS_write+0x15e/0x230 [ 575.157915] SyS_clone+0x37/0x50 [ 575.161270] ? sys_vfork+0x30/0x30 [ 575.164794] do_syscall_64+0x1e8/0x640 [ 575.168661] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 575.173489] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.178660] RIP: 0033:0x459a59 [ 575.181833] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 575.189526] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 575.196777] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 575.204028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 575.211279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 575.218530] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') modify_ldt$read_default(0x2, &(0x7f0000000080)=""/77, 0x4d) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x1, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:40 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 03:34:40 executing program 0 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 575.345126] FAULT_INJECTION: forcing a failure. [ 575.345126] name failslab, interval 1, probability 0, space 0, times 0 [ 575.357242] CPU: 0 PID: 24211 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 575.364269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.373637] Call Trace: [ 575.376240] dump_stack+0x138/0x197 [ 575.379894] should_fail.cold+0x10f/0x159 [ 575.384075] should_failslab+0xdb/0x130 [ 575.388053] kmem_cache_alloc+0x2d7/0x780 [ 575.392202] ? dup_fd+0x533/0xa40 [ 575.395668] copy_fs_struct+0x43/0x2d0 [ 575.399556] copy_process.part.0+0x3924/0x6a00 [ 575.404133] ? save_trace+0x290/0x290 [ 575.408714] ? proc_fail_nth_write+0x7d/0x180 [ 575.413212] ? proc_cwd_link+0x1b0/0x1b0 [ 575.417282] ? __cleanup_sighand+0x50/0x50 [ 575.421502] ? lock_downgrade+0x740/0x740 [ 575.425663] _do_fork+0x19e/0xce0 [ 575.430065] ? fork_idle+0x280/0x280 [ 575.433784] ? fput+0xd4/0x150 [ 575.436998] ? SyS_write+0x15e/0x230 [ 575.440737] SyS_clone+0x37/0x50 [ 575.444101] ? sys_vfork+0x30/0x30 [ 575.447639] do_syscall_64+0x1e8/0x640 [ 575.451529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 575.456377] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.461569] RIP: 0033:0x459a59 [ 575.464770] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 575.472473] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 575.480145] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 575.487403] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:40 executing program 0 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 575.494744] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 575.502025] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 575.543364] FAULT_INJECTION: forcing a failure. [ 575.543364] name failslab, interval 1, probability 0, space 0, times 0 [ 575.554973] CPU: 0 PID: 24215 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 575.561998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.571357] Call Trace: [ 575.573942] dump_stack+0x138/0x197 [ 575.577596] should_fail.cold+0x10f/0x159 [ 575.581833] should_failslab+0xdb/0x130 [ 575.585802] kmem_cache_alloc+0x2d7/0x780 [ 575.590119] ? _raw_spin_unlock+0x2d/0x50 [ 575.594265] copy_process.part.0+0x3987/0x6a00 [ 575.598848] ? save_trace+0x290/0x290 [ 575.602691] ? proc_fail_nth_write+0x7d/0x180 [ 575.607234] ? proc_cwd_link+0x1b0/0x1b0 [ 575.611311] ? __cleanup_sighand+0x50/0x50 [ 575.615541] ? lock_downgrade+0x740/0x740 [ 575.619693] _do_fork+0x19e/0xce0 [ 575.623161] ? fork_idle+0x280/0x280 [ 575.626868] ? fput+0xd4/0x150 [ 575.630064] ? SyS_write+0x15e/0x230 [ 575.633776] SyS_clone+0x37/0x50 [ 575.637131] ? sys_vfork+0x30/0x30 [ 575.640662] do_syscall_64+0x1e8/0x640 [ 575.644537] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 575.649374] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.654549] RIP: 0033:0x459a59 [ 575.657730] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 575.665440] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 575.672696] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 575.679954] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:40 executing program 0 (fault-call:1 fault-nth:11): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 575.687210] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 575.694465] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 575.741151] FAULT_INJECTION: forcing a failure. [ 575.741151] name failslab, interval 1, probability 0, space 0, times 0 [ 575.753085] CPU: 1 PID: 24222 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 575.760117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.769472] Call Trace: [ 575.772056] dump_stack+0x138/0x197 [ 575.775683] should_fail.cold+0x10f/0x159 [ 575.779817] should_failslab+0xdb/0x130 [ 575.783788] kmem_cache_alloc+0x2d7/0x780 03:34:40 executing program 3: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="fb7ba1d3ede1beb516bf6db62cf0b4cd458f71bbe8140385a2238ea791a3", 0x1e}], 0x1, &(0x7f0000000100)="0eae9f8da52037f52caf4ba4dee56e2a720632dda266d28fc7a5f1e8023d15d519a245246afcfe7f", 0x28, 0x20002040}, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 575.787940] ? _raw_spin_unlock_irq+0x28/0x90 [ 575.792532] ? trace_hardirqs_on_caller+0x400/0x590 [ 575.797557] copy_process.part.0+0x1cd5/0x6a00 [ 575.802158] ? save_trace+0x290/0x290 [ 575.805966] ? proc_fail_nth_write+0x7d/0x180 [ 575.810460] ? proc_cwd_link+0x1b0/0x1b0 [ 575.810483] ? __cleanup_sighand+0x50/0x50 [ 575.810494] ? lock_downgrade+0x740/0x740 [ 575.810510] _do_fork+0x19e/0xce0 [ 575.810524] ? fork_idle+0x280/0x280 [ 575.810539] ? fput+0xd4/0x150 [ 575.810550] ? SyS_write+0x15e/0x230 [ 575.810566] SyS_clone+0x37/0x50 03:34:40 executing program 0 (fault-call:1 fault-nth:12): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 575.810575] ? sys_vfork+0x30/0x30 [ 575.810589] do_syscall_64+0x1e8/0x640 [ 575.823006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 575.823023] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.823032] RIP: 0033:0x459a59 [ 575.823037] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 575.823048] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 575.823054] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 575.823060] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 575.823067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 575.823072] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r6, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendfile(r1, r2, 0x0, 0x50000000000443) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_vif\x00') fadvise64(r7, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x1c, r8, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_ADD(r7, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="ebad9c262fa02e21becfe661c9f30d7fa96f0a5ce25adeb4812881bab4b8098bc7b47adc8be9b046b6be2a13b0342f59eb99ec3442ec83989647c99b8631cad5d9cda27c3d32fa5a14cb30fa5ae8c060e0d6ebd842240d0a2fb7bddf3c34ecad4b307d0647bdfdbcb77c94007683ee50c7f06c6faf9edf76d613c41337b83c09ab0bdc84c9f8833af6c737eac83c612e1a573b1095ae7093a40c90ab45d8112b0d3f5cc1e14ed2bf8a94b49a490993b0d01c08b4e783a5562ef79131b2d9", @ANYRES16=r8, @ANYBLOB="020028bd7000000000000100000014000700fe80000000000000000000000000000c"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x80) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x3971e25968adbcd3}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="00007ff7", @ANYRES16=r8, @ANYBLOB="01002cbd7000fbdbdf250200000014000900fe8000000000000000000000000000aa080001004e210000080002000a000000080003002c000000040005001400090000000000000000000000ffffe0000002040005000800080000000000080001004e240000"], 0x6c}, 0x1, 0x0, 0x0, 0x4008044}, 0x2040000) [ 575.938529] FAULT_INJECTION: forcing a failure. [ 575.938529] name failslab, interval 1, probability 0, space 0, times 0 [ 575.954176] CPU: 0 PID: 24230 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 575.961249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.970625] Call Trace: [ 575.973245] dump_stack+0x138/0x197 [ 575.976940] should_fail.cold+0x10f/0x159 [ 575.981119] should_failslab+0xdb/0x130 [ 575.985184] kmem_cache_alloc+0x2d7/0x780 [ 575.989348] ? selinux_capable+0x36/0x40 [ 575.993419] create_new_namespaces+0x34/0x720 [ 575.997922] ? ns_capable_common+0x12c/0x160 [ 576.002345] copy_namespaces+0x284/0x310 [ 576.006413] copy_process.part.0+0x2603/0x6a00 [ 576.011023] ? proc_fail_nth_write+0x7d/0x180 [ 576.015699] ? proc_cwd_link+0x1b0/0x1b0 [ 576.019768] ? __cleanup_sighand+0x50/0x50 [ 576.024022] ? lock_downgrade+0x740/0x740 [ 576.028167] _do_fork+0x19e/0xce0 [ 576.031617] ? fork_idle+0x280/0x280 [ 576.035348] ? fput+0xd4/0x150 [ 576.038610] ? SyS_write+0x15e/0x230 [ 576.042339] SyS_clone+0x37/0x50 [ 576.045709] ? sys_vfork+0x30/0x30 [ 576.049248] do_syscall_64+0x1e8/0x640 [ 576.053148] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 576.058035] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 576.063224] RIP: 0033:0x459a59 [ 576.066422] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 576.074152] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 576.081422] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 03:34:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) clone(0x10000000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)="98ebdf7b8fa144ea4f1fee3531aa4b822154ff3d46a50ddeae83f2913ec7c6aee9805b3c323aa9adadec4987f215f2583952921f11ac4c84de403172ae56dde7f0b00afa88906875af8cf3ee024a2ada54723174278bcca3d2430624bdab933acdb3ad2e52212f95dac18a2cfc20a77102b38022e24010c3b3047b4752d5f549d0e09cd9") [ 576.088723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 576.096009] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 576.103288] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:41 executing program 0 (fault-call:1 fault-nth:13): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x1f35d1f64053e7a2, 0x0) [ 576.195655] FAULT_INJECTION: forcing a failure. [ 576.195655] name failslab, interval 1, probability 0, space 0, times 0 [ 576.226527] CPU: 1 PID: 24243 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 576.233587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.242939] Call Trace: [ 576.242957] dump_stack+0x138/0x197 [ 576.249150] should_fail.cold+0x10f/0x159 [ 576.253306] should_failslab+0xdb/0x130 [ 576.257291] kmem_cache_alloc_trace+0x2e9/0x790 [ 576.261971] ? retire_userns_sysctls+0x90/0x90 [ 576.266649] alloc_mnt_ns+0xde/0x450 [ 576.270375] copy_mnt_ns+0x95/0x8c0 [ 576.274010] ? kmem_cache_alloc+0x611/0x780 [ 576.278339] ? selinux_capable+0x36/0x40 [ 576.282411] create_new_namespaces+0xc9/0x720 [ 576.286909] ? ns_capable_common+0x12c/0x160 [ 576.291325] copy_namespaces+0x284/0x310 03:34:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x80000) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35b94e8b, 0x4, @perf_config_ext={0x5, 0x5}, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) set_thread_area(&(0x7f0000000080)={0x7fffffff, 0x20001000, 0x1000, 0x0, 0x1, 0x0, 0x1, 0x1}) r3 = msgget$private(0x0, 0x120) msgctl$MSG_INFO(r3, 0xc, &(0x7f00000000c0)=""/99) [ 576.295393] copy_process.part.0+0x2603/0x6a00 [ 576.299999] ? proc_fail_nth_write+0x7d/0x180 [ 576.304495] ? proc_cwd_link+0x1b0/0x1b0 [ 576.308576] ? __cleanup_sighand+0x50/0x50 [ 576.312817] ? lock_downgrade+0x740/0x740 [ 576.317065] _do_fork+0x19e/0xce0 [ 576.320514] ? fork_idle+0x280/0x280 [ 576.324225] ? fput+0xd4/0x150 [ 576.327494] ? SyS_write+0x15e/0x230 [ 576.331197] SyS_clone+0x37/0x50 [ 576.334554] ? sys_vfork+0x30/0x30 [ 576.338077] do_syscall_64+0x1e8/0x640 03:34:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 576.341955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 576.346804] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 576.351985] RIP: 0033:0x459a59 [ 576.355166] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 576.362870] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 576.362877] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 576.362883] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 576.362889] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 03:34:41 executing program 0 (fault-call:1 fault-nth:14): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 576.362894] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 576.426807] FAULT_INJECTION: forcing a failure. [ 576.426807] name failslab, interval 1, probability 0, space 0, times 0 [ 576.447646] CPU: 1 PID: 24263 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 576.454690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.464036] Call Trace: [ 576.466619] dump_stack+0x138/0x197 [ 576.470249] should_fail.cold+0x10f/0x159 [ 576.474481] should_failslab+0xdb/0x130 [ 576.478449] kmem_cache_alloc_trace+0x2e9/0x790 [ 576.483117] ? retire_userns_sysctls+0x90/0x90 [ 576.487697] alloc_mnt_ns+0xde/0x450 [ 576.491401] copy_mnt_ns+0x95/0x8c0 [ 576.495029] ? kmem_cache_alloc+0x611/0x780 [ 576.499335] ? selinux_capable+0x36/0x40 [ 576.503481] create_new_namespaces+0xc9/0x720 [ 576.507977] ? ns_capable_common+0x12c/0x160 [ 576.512392] copy_namespaces+0x284/0x310 [ 576.516447] copy_process.part.0+0x2603/0x6a00 [ 576.521032] ? proc_fail_nth_write+0x7d/0x180 [ 576.525524] ? proc_cwd_link+0x1b0/0x1b0 [ 576.529591] ? __cleanup_sighand+0x50/0x50 [ 576.533811] ? lock_downgrade+0x740/0x740 [ 576.537950] _do_fork+0x19e/0xce0 [ 576.541402] ? fork_idle+0x280/0x280 [ 576.545117] ? fput+0xd4/0x150 [ 576.548306] ? SyS_write+0x15e/0x230 [ 576.552018] SyS_clone+0x37/0x50 [ 576.555408] ? sys_vfork+0x30/0x30 [ 576.558988] do_syscall_64+0x1e8/0x640 [ 576.562867] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 576.567715] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 576.572892] RIP: 0033:0x459a59 03:34:41 executing program 0 (fault-call:1 fault-nth:15): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 576.576073] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 576.583943] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 576.591201] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 576.598452] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 576.605710] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 576.612976] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 576.651734] FAULT_INJECTION: forcing a failure. [ 576.651734] name failslab, interval 1, probability 0, space 0, times 0 [ 576.664667] CPU: 0 PID: 24269 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 576.671707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.681079] Call Trace: [ 576.683673] dump_stack+0x138/0x197 [ 576.687299] should_fail.cold+0x10f/0x159 [ 576.691442] should_failslab+0xdb/0x130 [ 576.695420] kmem_cache_alloc+0x2d7/0x780 03:34:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c, 0x100c00) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 576.699664] ? lock_downgrade+0x740/0x740 [ 576.703915] alloc_vfsmnt+0x28/0x7d0 [ 576.707655] clone_mnt+0x70/0xee0 [ 576.711113] ? is_subdir+0x222/0x389 [ 576.714823] copy_tree+0x33b/0x8a0 [ 576.718380] copy_mnt_ns+0x11c/0x8c0 [ 576.722104] ? kmem_cache_alloc+0x611/0x780 [ 576.726438] ? selinux_capable+0x36/0x40 [ 576.730524] create_new_namespaces+0xc9/0x720 [ 576.735037] ? ns_capable_common+0x12c/0x160 [ 576.739451] copy_namespaces+0x284/0x310 [ 576.743513] copy_process.part.0+0x2603/0x6a00 [ 576.748140] ? proc_fail_nth_write+0x7d/0x180 [ 576.752649] ? proc_cwd_link+0x1b0/0x1b0 [ 576.756750] ? __cleanup_sighand+0x50/0x50 [ 576.760999] ? lock_downgrade+0x740/0x740 [ 576.765156] _do_fork+0x19e/0xce0 [ 576.768605] ? fork_idle+0x280/0x280 [ 576.772444] ? fput+0xd4/0x150 [ 576.775650] ? SyS_write+0x15e/0x230 [ 576.779404] SyS_clone+0x37/0x50 [ 576.782778] ? sys_vfork+0x30/0x30 [ 576.786323] do_syscall_64+0x1e8/0x640 [ 576.790201] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 576.795200] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 576.800392] RIP: 0033:0x459a59 [ 576.803654] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 576.811357] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 576.818618] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 576.825890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 576.833263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 576.840552] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:41 executing program 0 (fault-call:1 fault-nth:16): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 576.910526] FAULT_INJECTION: forcing a failure. [ 576.910526] name failslab, interval 1, probability 0, space 0, times 0 [ 576.929378] CPU: 1 PID: 24276 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 576.936440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.945915] Call Trace: [ 576.948507] dump_stack+0x138/0x197 [ 576.952132] should_fail.cold+0x10f/0x159 [ 576.956269] should_failslab+0xdb/0x130 [ 576.960229] __kmalloc_track_caller+0x2ec/0x790 [ 576.964895] ? kstrdup_const+0x48/0x60 [ 576.968779] kstrdup+0x3a/0x70 [ 576.971968] kstrdup_const+0x48/0x60 [ 576.975675] alloc_vfsmnt+0xe5/0x7d0 [ 576.979380] clone_mnt+0x70/0xee0 [ 576.982829] ? is_subdir+0x222/0x389 [ 576.986559] copy_tree+0x33b/0x8a0 [ 576.990111] copy_mnt_ns+0x11c/0x8c0 [ 576.993915] ? kmem_cache_alloc+0x611/0x780 [ 576.998238] ? selinux_capable+0x36/0x40 [ 577.002299] create_new_namespaces+0xc9/0x720 03:34:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x5) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r6 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r6, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(r6, &(0x7f0000000040)='net/ptype\x00') [ 577.002311] ? ns_capable_common+0x12c/0x160 [ 577.002324] copy_namespaces+0x284/0x310 [ 577.011308] copy_process.part.0+0x2603/0x6a00 [ 577.011331] ? proc_fail_nth_write+0x7d/0x180 [ 577.011342] ? proc_cwd_link+0x1b0/0x1b0 [ 577.011366] ? __cleanup_sighand+0x50/0x50 [ 577.011377] ? lock_downgrade+0x740/0x740 [ 577.011394] _do_fork+0x19e/0xce0 [ 577.011408] ? fork_idle+0x280/0x280 [ 577.011423] ? fput+0xd4/0x150 [ 577.011434] ? SyS_write+0x15e/0x230 [ 577.051139] SyS_clone+0x37/0x50 [ 577.054513] ? sys_vfork+0x30/0x30 [ 577.058062] do_syscall_64+0x1e8/0x640 [ 577.061954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 577.066814] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 577.071987] RIP: 0033:0x459a59 [ 577.075166] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 577.082868] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 577.090130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 577.097398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getpid() syz_open_procfs(r3, &(0x7f0000000080)='map_files\x00') r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r1, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r2, r5, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) setfsgid(r5) r6 = accept4(r0, 0x0, 0x0, 0x80000) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = open(&(0x7f0000000100)='./file0\x00', 0x80, 0x40) r10 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x8, 0x200000) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000780)={0xa8, 0x0, &(0x7f0000000580)=[@reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f00000002c0)={@flat=@binder={0x73622a85, 0x0, 0x3}, @fd={0x66642a85, 0x0, r10}, @flat=@weak_binder={0x77622a85, 0x0, 0x3}}, &(0x7f0000000200)={0x0, 0x18, 0x30}}}, @increfs={0x40046304, 0x2}, @request_death={0x400c630e, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000400)={@ptr={0x70742a85, 0x0, &(0x7f0000000340)=""/16, 0x10, 0x2, 0x2d}, @flat=@binder={0x73622a85, 0x1100, 0x2}, @fda={0x66646185, 0x4, 0x1, 0x2d}}, &(0x7f0000000480)={0x0, 0x28, 0x40}}, 0x1400}], 0xaa, 0x0, &(0x7f00000006c0)="8385d24f72bee5c1b6c04f860c9e373d437e2371bd69ade9703e23abece4f10b3d235762072ed584d2fbe5ee1cd9fc291e73d99859e1efccc97e49b4d5067db21fce8de7e84a37a6336fedd6ace6af25d214b13bc579ad2f52580bbff0dfe6e25c244b911ee84f12731a510c60d322e6d7025be5f2c346a2adf5e25454e173575bfa1dab55a5cf9e33d549d8f267d2da5dbafc2c465d8af02987f549dd9b9a50072d61269b4cd20bb2f7"}) r11 = accept4(r8, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) ioctl$VT_RELDISP(r12, 0x5605) 03:34:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) [ 577.104750] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 577.112023] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:42 executing program 0 (fault-call:1 fault-nth:17): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 577.211738] FAULT_INJECTION: forcing a failure. [ 577.211738] name failslab, interval 1, probability 0, space 0, times 0 [ 577.223643] CPU: 0 PID: 24297 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 577.230679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.240120] Call Trace: [ 577.242703] dump_stack+0x138/0x197 [ 577.246344] should_fail.cold+0x10f/0x159 [ 577.250487] should_failslab+0xdb/0x130 [ 577.254464] kmem_cache_alloc+0x2d7/0x780 [ 577.258624] ? find_held_lock+0x35/0x130 [ 577.262671] ? copy_tree+0x4a2/0x8a0 [ 577.266372] alloc_vfsmnt+0x28/0x7d0 [ 577.270085] clone_mnt+0x70/0xee0 [ 577.273528] ? lock_downgrade+0x740/0x740 [ 577.277675] copy_tree+0x33b/0x8a0 [ 577.281220] copy_mnt_ns+0x11c/0x8c0 [ 577.284920] ? kmem_cache_alloc+0x611/0x780 [ 577.289230] ? selinux_capable+0x36/0x40 [ 577.293301] create_new_namespaces+0xc9/0x720 [ 577.297792] ? ns_capable_common+0x12c/0x160 [ 577.302199] copy_namespaces+0x284/0x310 [ 577.306250] copy_process.part.0+0x2603/0x6a00 [ 577.310832] ? proc_fail_nth_write+0x7d/0x180 [ 577.315315] ? proc_cwd_link+0x1b0/0x1b0 [ 577.319375] ? __cleanup_sighand+0x50/0x50 [ 577.323594] ? lock_downgrade+0x740/0x740 [ 577.327762] _do_fork+0x19e/0xce0 [ 577.331215] ? fork_idle+0x280/0x280 [ 577.334921] ? fput+0xd4/0x150 [ 577.338106] ? SyS_write+0x15e/0x230 [ 577.341814] SyS_clone+0x37/0x50 [ 577.345177] ? sys_vfork+0x30/0x30 [ 577.348708] do_syscall_64+0x1e8/0x640 [ 577.352583] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 577.357418] entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:34:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 577.362591] RIP: 0033:0x459a59 [ 577.365767] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 577.373464] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 577.380722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 577.387991] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 577.395245] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 577.402501] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:42 executing program 0 (fault-call:1 fault-nth:18): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 577.484047] FAULT_INJECTION: forcing a failure. [ 577.484047] name failslab, interval 1, probability 0, space 0, times 0 [ 577.495727] CPU: 0 PID: 24307 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 577.502826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.512176] Call Trace: [ 577.514760] dump_stack+0x138/0x197 [ 577.518384] should_fail.cold+0x10f/0x159 [ 577.522526] should_failslab+0xdb/0x130 [ 577.526493] __kmalloc_track_caller+0x2ec/0x790 [ 577.531156] ? kstrdup_const+0x48/0x60 [ 577.535059] kstrdup+0x3a/0x70 [ 577.538242] kstrdup_const+0x48/0x60 [ 577.541946] alloc_vfsmnt+0xe5/0x7d0 [ 577.545652] clone_mnt+0x70/0xee0 [ 577.549092] ? lock_downgrade+0x740/0x740 [ 577.553236] copy_tree+0x33b/0x8a0 [ 577.556776] copy_mnt_ns+0x11c/0x8c0 [ 577.560475] ? kmem_cache_alloc+0x611/0x780 [ 577.564785] ? selinux_capable+0x36/0x40 [ 577.568868] create_new_namespaces+0xc9/0x720 [ 577.574017] ? ns_capable_common+0x12c/0x160 [ 577.578427] copy_namespaces+0x284/0x310 [ 577.582477] copy_process.part.0+0x2603/0x6a00 [ 577.587057] ? proc_fail_nth_write+0x7d/0x180 [ 577.591539] ? proc_cwd_link+0x1b0/0x1b0 [ 577.595597] ? __cleanup_sighand+0x50/0x50 [ 577.599816] ? lock_downgrade+0x740/0x740 [ 577.603961] _do_fork+0x19e/0xce0 [ 577.607429] ? fork_idle+0x280/0x280 [ 577.611144] ? fput+0xd4/0x150 [ 577.614322] ? SyS_write+0x15e/0x230 [ 577.618061] SyS_clone+0x37/0x50 [ 577.621413] ? sys_vfork+0x30/0x30 [ 577.625047] do_syscall_64+0x1e8/0x640 [ 577.628919] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 577.633755] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 577.638930] RIP: 0033:0x459a59 [ 577.642120] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 577.649819] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 577.657595] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 577.664850] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 577.672126] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 03:34:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000080)=0x2, 0x4) sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=@newqdisc={0x368, 0x24, 0x20, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, {0xd, 0x5}, {0x10, 0x2}, {0x1, 0x7ff3}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18, 0x1, {0x1, [], 0x1f, 0x311, 0x7ff, 0x7}}}}, @qdisc_kind_options=@q_netem={{0xc, 0x1, 'netem\x00'}, {0x118, 0x2, {{0x8, 0x3, 0x5, 0x1ff, 0x7fffffff, 0x7ff}, [@TCA_NETEM_LOSS={0x90, 0x5, [@NETEM_LOSS_GE={0x14, 0x2, {0x7ff, 0xffffffff, 0xff, 0xff}}, @NETEM_LOSS_GI={0x18, 0x1, {0x1, 0x80000001, 0x400, 0x19e6, 0x55e75196}}, @NETEM_LOSS_GI={0x18, 0x1, {0xff, 0x20, 0x4, 0x4d1fd098, 0x1f}}, @NETEM_LOSS_GI={0x18, 0x1, {0x2, 0x19b1, 0x3, 0x3}}, @NETEM_LOSS_GI={0x18, 0x1, {0x8, 0xfffffff7, 0xfffffff8, 0x8, 0xffffffff}}, @NETEM_LOSS_GI={0x18, 0x1, {0x3, 0x4, 0x6, 0xe882, 0x1f}}]}, @TCA_NETEM_ECN={0x8}, @TCA_NETEM_JITTER64={0xc}, @TCA_NETEM_LOSS={0x2c, 0x5, [@NETEM_LOSS_GE={0x14, 0x2, {0x800, 0x4, 0x6c, 0x9}}, @NETEM_LOSS_GE={0x14, 0x2, {0x37fb, 0x1, 0x400, 0x3}}]}, @TCA_NETEM_REORDER={0xc, 0x3, {0x7fffffff, 0x8}}, @TCA_NETEM_REORDER={0xc, 0x3, {0x9, 0x3}}, @TCA_NETEM_ECN={0x8}, @TCA_NETEM_LATENCY64={0xc, 0xa, 0x1}]}}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x41e}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x9}, @TCA_STAB={0x1a0, 0x8, [{{0x1c, 0x1, {0x3f, 0x7f, 0x4, 0x9, 0x0, 0x40, 0x5, 0x5}}, {0x10, 0x2, [0x9, 0x1, 0x8, 0x800, 0x8]}}, {{0x1c, 0x1, {0x80, 0x7, 0xa2, 0x6, 0x2, 0x0, 0x10000, 0x6}}, {0x10, 0x2, [0x1, 0x3, 0x2, 0x80, 0x0, 0x6]}}, {{0x1c, 0x1, {0x1, 0x8, 0x9, 0x89, 0x2, 0x7, 0x87b, 0x2}}, {0x8, 0x2, [0x0, 0x2]}}, {{0x1c, 0x1, {0x7f, 0x2, 0x95ad, 0x6, 0x4, 0x81, 0x9, 0x6}}, {0x10, 0x2, [0x6, 0xf1, 0x0, 0x0, 0x3, 0x2]}}, {{0x1c, 0x1, {0x8, 0x5, 0x2, 0x8, 0x1, 0x3, 0x87, 0x2}}, {0x8, 0x2, [0x7, 0x7b6]}}, {{0x1c, 0x1, {0x1f, 0x81, 0x2, 0x2, 0x2, 0x1000, 0x9, 0x4}}, {0xc, 0x2, [0x40, 0x0, 0x40, 0x4]}}, {{0x1c, 0x1, {0xff, 0x0, 0x1, 0x514, 0x0, 0x3f, 0x0, 0x6}}, {0x10, 0x2, [0x3, 0x80, 0x8, 0x7ff, 0x2, 0xffff]}}, {{0x1c, 0x1, {0x7f, 0x20, 0x6, 0x1, 0x1, 0x5, 0x10000, 0x7}}, {0x14, 0x2, [0x80, 0xe, 0x350, 0x8, 0x8, 0xb, 0x0]}}, {{0x1c, 0x1, {0xf7, 0x9, 0x400, 0x3c85, 0x0, 0x3, 0xffffffff, 0x2}}, {0x8, 0x2, [0x4, 0x8000]}}, {{0x1c, 0x1, {0x40, 0xfd, 0x0, 0x0, 0x2, 0x9, 0x3, 0x3}}, {0xc, 0x2, [0x800, 0x400, 0x9]}}]}, @qdisc_kind_options=@q_netem={{0xc, 0x1, 'netem\x00'}, {0x40, 0x2, {{0x1ff, 0x3547, 0x9, 0x80000001, 0x7fff, 0x6}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x200}, @TCA_NETEM_REORDER={0xc, 0x3, {0xea, 0x7}}, @TCA_NETEM_CORRUPT={0xc, 0x4, {0x3ff, 0x1}}]}}}]}, 0x368}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) [ 577.679382] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:42 executing program 0 (fault-call:1 fault-nth:19): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 577.754742] FAULT_INJECTION: forcing a failure. [ 577.754742] name failslab, interval 1, probability 0, space 0, times 0 [ 577.770858] CPU: 0 PID: 24315 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 577.777909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.787257] Call Trace: [ 577.789931] dump_stack+0x138/0x197 [ 577.793559] should_fail.cold+0x10f/0x159 [ 577.797705] should_failslab+0xdb/0x130 [ 577.801671] kmem_cache_alloc+0x2d7/0x780 [ 577.805819] ? find_held_lock+0x35/0x130 [ 577.809870] ? copy_tree+0x4a2/0x8a0 [ 577.813570] alloc_vfsmnt+0x28/0x7d0 [ 577.817271] clone_mnt+0x70/0xee0 [ 577.820723] ? lock_downgrade+0x740/0x740 [ 577.824881] copy_tree+0x33b/0x8a0 [ 577.828426] copy_mnt_ns+0x11c/0x8c0 [ 577.832137] ? kmem_cache_alloc+0x611/0x780 [ 577.836460] ? selinux_capable+0x36/0x40 [ 577.840534] create_new_namespaces+0xc9/0x720 [ 577.845019] ? ns_capable_common+0x12c/0x160 [ 577.849442] copy_namespaces+0x284/0x310 [ 577.853510] copy_process.part.0+0x2603/0x6a00 [ 577.858156] ? proc_fail_nth_write+0x7d/0x180 [ 577.862662] ? proc_cwd_link+0x1b0/0x1b0 [ 577.866739] ? __cleanup_sighand+0x50/0x50 [ 577.870961] ? lock_downgrade+0x740/0x740 [ 577.875128] _do_fork+0x19e/0xce0 [ 577.878595] ? fork_idle+0x280/0x280 [ 577.882313] ? fput+0xd4/0x150 [ 577.885492] ? SyS_write+0x15e/0x230 [ 577.889212] SyS_clone+0x37/0x50 [ 577.892566] ? sys_vfork+0x30/0x30 [ 577.896107] do_syscall_64+0x1e8/0x640 [ 577.899987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 577.904823] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 577.909996] RIP: 0033:0x459a59 [ 577.913173] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 577.920921] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 577.928182] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 577.935438] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 577.942789] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 577.950077] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x980000, 0x80000000, 0x7fffffff, [], &(0x7f0000000080)={0xd58e19, 0x2, [], @value=0x10000}}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$CAPI_MANUFACTURER_CMD(r5, 0xc0104320, &(0x7f0000000100)={0x3, &(0x7f00000001c0)="817cf9515a1861f5bcac98d5bbbb4946ed667098685fa2da4ca807077d5241bf10608e7504c32455c285a2f59ec5a0b9e15787d5372fe89ec0cd4a5175033c6b0c2dd6e22b4ece9859eaada3f6d76ba2fcbc3e9bc6886a5cda5556b28b8c04a2e9474a266b0f0be774a04a9957a594c47796f9fca107a5574f8a4399f86beacee9951b5b9fe0ef8f479bfee61da571f7358899104fd58d007f460185ff9c2cb0e36df4b6d6d2f794915487"}) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r2, 0x0, r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r8, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r8, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r9, 0x0, 0xffffffffffffffff) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r10, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r10, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r10, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r11, 0x0, 0x0, 0x0) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r13, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r15 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r13, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r15, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r16 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r16, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r16, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r16, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r16, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r16, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r16, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) write$binfmt_elf64(r8, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="3c22c31beb27e6814e62282562cfb0871f59e12c6a5660928a99b0eaef8260081593374404a8fe79270129f007a2529d2cd4776597a6a494966c2ebcfcfe54bd8615ae28bda6bb2d97b7b26fa791177de85d258708a9", @ANYPTR64, @ANYRESOCT=r10, @ANYBLOB="20654ba444cc7c5e30c9610d06d9117e09e343831ca2c70e0b6f9e24892d8be49849062f6ea884ae81b53baf7593c4a55cc40cfbf845b8716ed3db45512ae9b1252b3af5899130b97cbf660f9c3c20788bbeeb879acf86c5a320795b45b7574a0babe45d8144268a7a46448d31b4f3d76b98957c1645e7b2750c56c8244f482677b071a45a90474bf443a7db394c9112dce713"], @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES64=0x0, @ANYRESOCT=r11, @ANYRESOCT=r15, @ANYRES32=r16], @ANYRESDEC=r9], 0xac) 03:34:42 executing program 0 (fault-call:1 fault-nth:20): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000002c0)=@filter={'filter\x00', 0xe, 0x4, 0x3d8, 0x248, 0x248, 0x0, 0x248, 0x248, 0x340, 0x340, 0x340, 0x340, 0x340, 0x4, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x128, 0x188, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x8de, [0x6fd, 0x5, 0x4, 0x20], 0x5, 0x9}}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x0, 0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x95df, [0x1ff, 0x0, 0x7, 0xffff0000, 0x1, 0x2], 0x0, 0x7}, {0x0, [0x2, 0x90d, 0x3, 0x9a2, 0x3, 0x20], 0x9, 0x14}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xa28, [0x549, 0x7fff, 0x7, 0x73, 0x100, 0x7f], 0x4, 0x1}, {0x8, [0x27b, 0x1, 0x20, 0x6, 0x2, 0xe], 0x3, 0x3f}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x438) [ 578.045354] FAULT_INJECTION: forcing a failure. [ 578.045354] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 578.057220] CPU: 0 PID: 24329 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 578.064247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.073629] Call Trace: [ 578.076247] dump_stack+0x138/0x197 [ 578.080001] should_fail.cold+0x10f/0x159 [ 578.084205] __alloc_pages_nodemask+0x1d6/0x7a0 [ 578.088887] ? __alloc_pages_slowpath+0x2930/0x2930 [ 578.094031] cache_grow_begin+0x80/0x400 [ 578.098115] kmem_cache_alloc+0x6a6/0x780 [ 578.102280] ? find_held_lock+0x35/0x130 [ 578.106362] alloc_vfsmnt+0x28/0x7d0 [ 578.110100] clone_mnt+0x70/0xee0 [ 578.113562] ? lock_downgrade+0x740/0x740 [ 578.117737] copy_tree+0x33b/0x8a0 [ 578.117770] copy_mnt_ns+0x11c/0x8c0 [ 578.125021] ? kmem_cache_alloc+0x611/0x780 [ 578.129350] ? selinux_capable+0x36/0x40 [ 578.133414] create_new_namespaces+0xc9/0x720 [ 578.137904] ? ns_capable_common+0x12c/0x160 [ 578.142320] copy_namespaces+0x284/0x310 [ 578.146379] copy_process.part.0+0x2603/0x6a00 [ 578.150965] ? proc_fail_nth_write+0x7d/0x180 [ 578.155450] ? proc_cwd_link+0x1b0/0x1b0 [ 578.159525] ? __cleanup_sighand+0x50/0x50 [ 578.163754] ? lock_downgrade+0x740/0x740 [ 578.167902] _do_fork+0x19e/0xce0 [ 578.171350] ? fork_idle+0x280/0x280 [ 578.175058] ? fput+0xd4/0x150 [ 578.178244] ? SyS_write+0x15e/0x230 [ 578.181965] SyS_clone+0x37/0x50 [ 578.185328] ? sys_vfork+0x30/0x30 [ 578.188861] do_syscall_64+0x1e8/0x640 [ 578.192736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 578.198098] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 578.203280] RIP: 0033:0x459a59 [ 578.206464] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 578.214164] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 578.221507] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 578.228762] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 578.236020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 03:34:43 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000000c0)='pagemap\x00') r4 = socket$alg(0x26, 0x5, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'security.', 'ecb-cipher_null\x00'}) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) 03:34:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/keycreate\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 578.243361] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:43 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000080)={0x100, "907d2c3346f64baf93a8bb6496927329f93765c73b41ef3957f191039fd5cab2", 0x2, 0x842, 0x6, 0x40004, 0x2}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) vmsplice(r6, &(0x7f0000000140)=[{&(0x7f0000000100)="92314202f2c232cdd977ccf1cf6f5c99670f5869", 0x14}, {&(0x7f00000002c0)="ea747b9425bb52b2855bd3385f3ba45d2a5b46f96715e59a3e7052b7c4b7c52d7786790abcbba155aaa63e8142bafb0299cf872fed06d60fe505bb7be0b73d54bc36726251465ce8ebbfa01403521b39130065aea926f5534dca87dbf5c66f13c5f74541a1414ba733b70da8f33d6457b902b1f26df43ed356ff72ef00f95550875c2795d644c3098a5191b4c1a47dc579281c7e2e3352f30581ae1a23bdacd3e3ead31a34886eb1718df994e057356417229d9ddf13dfb90d8b327ed4ab4ae60b3130b464b2c9718253e9f1718394c2a288c8d55beca749127714e9de7c", 0xde}, {&(0x7f00000003c0)="515e7a6107e83294be405edd528a190801346f4e4c5c4d128b30e2afe8e2486d1e79c019da11692e73c250ae7166fd0ebd6a1c39f4090047144f0596dd45364ba765eca5514b95fd21ed8f769df7b02363ff3c6934b6c638d7f12eb4f88ce2beed66764b500585ee4fa8d5d50a0969cba39bf03720c665f68f711a8b2be08f2a9a11fff225ff048a76658365285ff2b36648a22e853e2f303df9a458ab0958bc8854da1ab0f3a93a319fbae331f6e544e2e91a0f8da2e16979125ddbe04191c69200b97bbf5c02455ba57ec71dcc3526577dd6026bf84621ac1fc4727d83d1c0f745c6202562198c2b581dcb1eca7c4bd28f167adbb687ee35b5a4088777b8a6f9654a60259bcc727dad07ede3aa430ee4c0d7af05d9e287819c479b4ae2cf0e0b4e0edd828beca86e401b689433fdbbf57b0e7f9865650a9ed1bddc14fedbbbf730877323225caab2aa4fda91cf3b47c69e94ce0a77b0d61376a393bc2b599c9f0014710d94cb596a19f320762b59bb35ba5846bbac9eecfea7126589e8f4de4637c1ab8ad34bc0cac7d05630880beb71947914d7bf3e74dc2e2a3b2a55d7782c71045ecfdbe9d56fbe3c5f53aea32843b741e1f0bfd8aef6ac80722086b21bb7443a616c768da1098e15aff61a54912c41aae07012aacccc369a453630912c6b991f184e132cfd2e551302d7d43cd372e9b2ba5ef9b818ff1a5816216f51d87367665a3ee440d880e97649864df1e0c278947eb219a04e2097d1c49ab78d2ee1fff5601eb74a7081167d9ed0affaf2aca92e21bd3c9878daec14c6b27b3e2eecaadfc1480ae8b8f390424070d6a06483cd8b731b6c34d3be9b88cc85897b8ca641009bb73d0c6e167253f51ed6345bd10e4f61ce5ba657894dc8dc03bf987834f5d4325824db11af4e5583cc86f6b1486371b5b48a1a6010cf5dae9b67d4b2505d39ca606dbd60626ca5c733da793a7868db38149614c0c79d7335ec356c908eba0391e775ae2756cc828a7c8a5155b7a77c5b27d16d1d12231a41908645eea32c33cfdf759c2132509cc3a528e4f8750ec8a5577e4369f7d3adbe0c3091c4274d0462ae0734e9b7bafe8a0c06b434c18e76f3fc204ebaeaddc5578a171484e07cf353dbb55efbf49f5fef90d0dde5abb702605864d8f78f4589fa21a170f23772c95384d6c9c3d0f8b733902ec610be0224bb77d0f81d6d9899cab8287d99cace2db10fe8deb281c6896c76c997604d7df0067599c48e0b5e0d9ed8ede440a9dfecd1ecbb031497a5b55d0f007a8ef343756c98bd2e7ae36c2b6981a742eee2d0d794d71035cc0b5faaef7dd7af9b51e42c44421143d0d6050062f38c77193b8ddae8cde0f07fdababee96046f1a14be600be3e8562accf69310c737068988d7852062e739237e4e3794bca9b71b6821d400b8f1ee9794f5d8bc6197ca01169796c98804054b2283333006caf58d57c682ef42286b62a96372c1f11bf226b79fcefe26a8ac15748008dbc71dea940c58a5c646685812a328ee5952022fc497fcacf51738461074da34860cf5e75e2dbea2d284c3ceec9de290ed8a2e2073a78245d63a0b7a87807e4e11f18aa093f115e4ce0cab036ff49528a242304f7796042de0fbdc00946a488fdde4ed3df90ead801a90e8433de01ab6c68d94e2f6738d304bd778076220a26ad9c40220cc6bb6e43f2010be3f468932c2f79f86355dc5180e3814f7f5a432afb1e3827e748278beea843743879cca396c2a8f9be25971f1859e3199712fb24edfd926a21b1fbfe2e069148d4a207419215b39e4ec114bce7a1784d7e4ce6f424bfa192b7197945b2812e95001b509b681f36d840e69080fa166ad0ae0df718c2a8aa6215da13f65717b3d7a7d47b63421e42b6cd4d6cf95a3cd903a6b47ace528abe041a7157477026cfb7ee59dbfa61549061229d2fdf4cdb308025a683ddb41bdf5717c9c9ee185983ee729356cc3b6b372c2ee9bb05b2279528ab2a9fa9411af400e9a33063a3367396b8998b2e831e80bec51703b32b857fd84804d6b9defd979f5fee695c8f7b8e6f9de4baa3f065c5bdbcd694e91f53dadfbd64baf1ffa2f91058b1d3cd57f67c46de8bb850c9d40c1c689128135cda634789cf1f8201a6c32387b1680c8cb01612947a7e268e6fa5d5580481d3930516c615df02b1310fec623aa0a640002ab2bc1d5551e657174b18abf3a6532d7f621e14dbd60e85c965277a8bcc913f399bcc7c7d762924351813faa25365fd868b460f8cb8f5af0cbab36d4f6aad04e95ac37df61106956b075f1584ebc4dff0672469178c0efbce03e9379f055ed46e62e6abbbdeb0fdc5da02c391c5b8d183e44446bb94e389ad49e06df474186919ad1753deb9843f613cf149686e00b416bbd59d053cd48f537cf6a1a10130dc78c16ea1272ee49281e09edad713c6c0303336e8a5c99cc3090fcefdcd35e1c9ea0311df07b7441622a6f08ab8f3b1dc15b6868c8313b52f17a7ecad526929bc6b5f96268a7b8bebdaf4f28abf856dca03308d359ea02cc3ce91b29b1472c5c69411faba7d722fe1aa0850b816f2272482793216607f4d058f3f3361d37e94fc71f49a98e17f6dd12ec2234d12aae5ea235333de77a26327b79f3ac5f6a1816c8ecf5fe817ce4a0b62ab0875810c524f7d36d90f63eb36c536febf788fc99e450e866840b9b2f52e32a743cfc71f00743e3f10f3a3d4a058a727f0dcd6871dcf845b8c18c11ed602cb63162edaeece54431c54cccead0b0ffd665763a1b0de2784cda92e79009e281fb49f93d1814e0c0cf9e7152405e20072d9f767a3c52b20431fa5ca3e720407fa363eb8b9d2e8085f12af3b7eb0f95f0a239094bb1c97e84fab6e2018b196d4b0d66d03b00695af3c43a89bfc435a88827a53e1f41c14e85873ce71f0429191888c4d8830fd9218a174cf5f756f72d1dabb60018ce34a1da1c857bdceb1482111aca8c48ae7db6e5fb97d6ab764801394524ad5b61e37960035e7ae5d9e31d2cd8df83e47ca34868354e43eebc8ff59f7c5e5a91cc20d7c0239542e6149424e114faab31ee3f61ea82d9b4316c838bf945921ce9c585f39100bbb8e6accf9d671bb2293303c84a35bca6a18d0b7cee3bc7fd0669888f3b7af07994aded44276175d7cdb4f658fcf8ea837c0bb88fb6c2c09ec3e992f55bd6ef3a5a3f3d402a8db749d882d5c96ae058865605f21fbb251dba4332cd13c01b576668df402ef5a9bfc6cf902bbd0ada32549735cec40ea51a6770e05e1e30d71aae4d0c9e1d6dc6921542af4bbdc451c8f5b733b8c069ba157891bbe11c77c1cb253d616b9859578cb4519f53dc05fd32754dad184e160c9fd59fb2eb4a447cef6df07e5434f5b0786dc095b23e93bc78e6b854f8a6100647f280cb10c90c8987d0f62b11aa9aa61487efc9b43e68ff63450b5aeaf4fd18e44b17d32b3df681242c57cc283996682b7a733798142828c44ea3331cef3b175ac801834b1a81272bab381e61bc2308ec5f45273ebd770ee8816fd36149a7874d7d60ba4edab9e55f7e9f173b1b62e136fd8b35e99a494fc7fe64877942daad0cb51730f4b2b1b0a91a1277f3523c61667097e22fa267f1d0943343b0012edc1f35f0ea9e0e3557b4c53c274fa15609ef03a488f54eeef0658bf09d5ace248b56089f8f01fdb1f64c25a99e5409400d1e00f42eea619278fcbeed2870f188fb8095f00358c26100a42486c8b6858913636010a02c363e08a7692dc4b3fccd1d55a68d1256f0c41ae95005bc8e11be98cb208580a4325323d67dc84d123ec8365c2490adfe56187574ef21f67f7d0607d36093b650e213f218fac7de043972db8cc8d5d52b11843b773f248d163a1c03e6deac7e268382b6757f89f4ae674b9f6746e10158067d9aa42b678477862acc81e8af4ef9b0c53cbf03affbaab704a88343e750cbdd3b59fb80e5114716a9f65f25e82b094ee87e675aa71de4d18e045e6cea20715b2d586b75421097d76294b3dceae7439b072feb30d0f4a706741698a2fd378e5115de2acfbb3ded754bdbd52e9b75487cee1a7c922b9bbe1f2e5dc76143b132aa7cf9df559e3d4776ab48b250261bc063ac93553b6a459cc52a938ad4406ebe5d1d48b6f465bbe211b35f32a855c8c02b528d00a093be8ce7cbd4115cdc669d2c041e5903ef33e56b8654fabdc3e48a04434afac28c3a348579a5dd73138ef0955ef36019792c1309e9eb495d6e8803becdfd223f941d23263063f667a9cd47331d0a977b9a9b9f390d60274700953fc105e0efaf76428964af1f0799cbda8cf031e96916dfd835312f3022f68b8f74e3f60f989eb40200822df4be60b933358a661419af7908da07ea7a53a39418dde86a05d9db48a35a3f6eb002149739c1fd80669e7a480c0019e7ab1423e8e6d1c790eddc9f473470b8225880ec6f90280a3d97248f1a2eedfa8084de6f4363639aac4d9e12a94e3e7652ca7eb33ac429f5bb51689162a9f6e2cf19a72f6d45adad4d82d4b791b08a06ad1967d22757c682119ea2ba4ef7b7ccf4e9e5058bb6c83f94f0dd462c50257e6716eaeab12cb6eb04e77f719b42bfcda8dd05ee134fc53eae066c8dee2d28d0273f91c67fc588d7c9b74d27fc122ee1cf0b847bf84dffaa56e3885fc8acda677f5994b7e50eeb48368ac011a5e5bf9f6c827fab401cbc90e25ae430f4e411a81cbc0908dba690f92f7d3ecd2bda3c1c8604d36aeeefb6c830eb839394176015a741b134a4fc2f5b831e31316fb03984fbe098b16390ea873a3f7a4e65f2c314b26afefb74a4c40d219c6ec1b09e5b2aae717e790768df0078a4e1cbacfef07bfedef1b88fc4ce80e317c2d0233125a11b06a769aa7e6f2125a692398619a07af957cca456eb96c37b78429ff57f35c5d27247f3476fc4b49c9e20de45fd06d62abc4b38b6be51452974566b7373d6d0b7297710f68190537e5a22d9c73807ea6133b1465cd19cd287650ad239c04eec2f59d7e79f4fe0db54da57e0d678f9fab5e06850e29569f3c8bff76793ae1860bc6a0758ac6f033e93314d5c4bda7b293549f5933a30b20b9442745d5d07fdfb9366196790ef556ee641bcd2da4f007c708c7c7d282612d3d2c8571e3f33507d85ce88b1d9e4bd254c72cda783e914e894037a648be0812c70a3564a16ab23f254e5618a7ae998ba0cca3b22c3b110792f5cd237ac4cf3452482445ad47706dae6528285d16dbd2896ccf30b838d7094512d1b4e936c7bef87b410ea45962398260d7ba59b38b327a1480799d47627582e636eb7936f6a024bc12d3afd23f7876af91b9e9c1a590d82c786ffb9b1fa299b35dca1e520875bb4e6fb9573ce1ad6f408531e8bfa7eea555c2c9c92b3d6fbf5973c0f4f55c2027a0784a6d89e45eed4aae5e407aac4fef495f623c7c91c7f779744c885534a082602b2e8af0b9814063b3818d2ff6f600200d0528a75d8153b253c893d29b72f163369a8f50920cf87f50874bb27d079c75b281fcb099adfc71a867db0c53cf3b00c84639d4388816b13beca813881738754d44b3e385340be5dee3d311be2b8374b8756fd0fcda68df2b7c11763153420a815e862449cae2ca7873771f0b93036c80e52cbcd127c84f9de8edf7df3b62f01f286dd18bae5f32508f05a5f35d4b41009b8282f90d5d99cec6610627fd2a72d9cda39edaff6665ca1ab536aab4c155597aa30ef530530329f77204451acf2472081af2449142eb0bcb9fa22cdfa52a7fc120bd889a96e3d9a736f040", 0x1000}], 0x3, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r7], 0x8) 03:34:43 executing program 0 (fault-call:1 fault-nth:21): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$caif_stream(0x25, 0x1, 0x0) getsockopt$sock_buf(r1, 0x1, 0x6, &(0x7f0000000080)=""/4, &(0x7f00000000c0)=0x4) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x10c) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) connect$unix(r9, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r6, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x5ce6, 0x10, 0x100, 0xfffffffffffff743}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f00000002c0)={r10, 0x43, "5057067d8e3c1c27c1980334498ac6033d3f837567417e372eb9f81e17d46bf4509b98328b4dee05a705fe89ba62bb60582ddf68348ffcc0dc9646f9578f9bde2fb5bc"}, &(0x7f0000000200)=0x4b) sendfile(r3, r4, 0x0, 0x50000000000443) [ 578.394848] FAULT_INJECTION: forcing a failure. [ 578.394848] name failslab, interval 1, probability 0, space 0, times 0 [ 578.406393] CPU: 0 PID: 24356 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 578.413430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.422787] Call Trace: [ 578.425378] dump_stack+0x138/0x197 [ 578.429026] should_fail.cold+0x10f/0x159 [ 578.433216] should_failslab+0xdb/0x130 [ 578.437200] __kmalloc_track_caller+0x2ec/0x790 [ 578.441868] ? kstrdup_const+0x48/0x60 [ 578.445749] kstrdup+0x3a/0x70 [ 578.448932] kstrdup_const+0x48/0x60 [ 578.452637] alloc_vfsmnt+0xe5/0x7d0 [ 578.456342] clone_mnt+0x70/0xee0 [ 578.459783] ? lock_downgrade+0x740/0x740 [ 578.464022] copy_tree+0x33b/0x8a0 [ 578.467564] copy_mnt_ns+0x11c/0x8c0 [ 578.471265] ? kmem_cache_alloc+0x611/0x780 [ 578.475581] ? selinux_capable+0x36/0x40 [ 578.479648] create_new_namespaces+0xc9/0x720 [ 578.484133] ? ns_capable_common+0x12c/0x160 [ 578.488534] copy_namespaces+0x284/0x310 [ 578.492588] copy_process.part.0+0x2603/0x6a00 [ 578.497169] ? proc_fail_nth_write+0x7d/0x180 [ 578.501653] ? proc_cwd_link+0x1b0/0x1b0 [ 578.505721] ? __cleanup_sighand+0x50/0x50 [ 578.509942] ? lock_downgrade+0x740/0x740 [ 578.514087] _do_fork+0x19e/0xce0 [ 578.517532] ? fork_idle+0x280/0x280 [ 578.521239] ? fput+0xd4/0x150 [ 578.524419] ? SyS_write+0x15e/0x230 [ 578.528129] SyS_clone+0x37/0x50 [ 578.531497] ? sys_vfork+0x30/0x30 [ 578.535030] do_syscall_64+0x1e8/0x640 [ 578.538907] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 578.543833] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 578.549007] RIP: 0033:0x459a59 [ 578.552208] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 578.559920] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 578.567178] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 578.574435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 578.581692] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 578.588947] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:43 executing program 0 (fault-call:1 fault-nth:22): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 578.686419] FAULT_INJECTION: forcing a failure. [ 578.686419] name failslab, interval 1, probability 0, space 0, times 0 [ 578.707163] CPU: 0 PID: 24364 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 578.714224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.723594] Call Trace: [ 578.726178] dump_stack+0x138/0x197 [ 578.729802] should_fail.cold+0x10f/0x159 [ 578.733945] should_failslab+0xdb/0x130 [ 578.737908] __kmalloc_track_caller+0x2ec/0x790 [ 578.742574] ? kstrdup_const+0x48/0x60 [ 578.746452] kstrdup+0x3a/0x70 [ 578.749642] kstrdup_const+0x48/0x60 [ 578.753343] alloc_vfsmnt+0xe5/0x7d0 [ 578.757055] clone_mnt+0x70/0xee0 [ 578.760494] ? lock_downgrade+0x740/0x740 [ 578.764635] copy_tree+0x33b/0x8a0 [ 578.768177] copy_mnt_ns+0x11c/0x8c0 [ 578.771903] ? kmem_cache_alloc+0x611/0x780 [ 578.776273] ? selinux_capable+0x36/0x40 [ 578.780345] create_new_namespaces+0xc9/0x720 [ 578.784847] ? ns_capable_common+0x12c/0x160 [ 578.789259] copy_namespaces+0x284/0x310 [ 578.793316] copy_process.part.0+0x2603/0x6a00 [ 578.797909] ? proc_fail_nth_write+0x7d/0x180 [ 578.802396] ? proc_cwd_link+0x1b0/0x1b0 [ 578.806460] ? __cleanup_sighand+0x50/0x50 [ 578.810690] ? lock_downgrade+0x740/0x740 [ 578.814837] _do_fork+0x19e/0xce0 [ 578.818297] ? fork_idle+0x280/0x280 [ 578.822016] ? fput+0xd4/0x150 [ 578.825198] ? SyS_write+0x15e/0x230 [ 578.828907] SyS_clone+0x37/0x50 [ 578.832348] ? sys_vfork+0x30/0x30 [ 578.835884] do_syscall_64+0x1e8/0x640 [ 578.839760] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 578.844600] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 578.849780] RIP: 0033:0x459a59 [ 578.852967] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 578.860664] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 578.867941] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 578.875213] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 578.882480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 578.889741] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 578.897293] protocol 88fb is buggy, dev hsr_slave_0 03:34:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$BLKRRPART(r3, 0x125f, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) 03:34:43 executing program 0 (fault-call:1 fault-nth:23): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x20000000102, 0x0) semop(r2, &(0x7f0000000180)=[{}, {0x0, 0xb323}], 0x2) semop(r2, &(0x7f0000000080)=[{0x3, 0x7, 0xea1fe76f6c95835a}, {0x0, 0x1, 0x1800}, {0x1, 0xfff, 0x800}, {0x23de84678180459c, 0x2}], 0x4) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000400)={r5, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x4e20, @multicast2}}, 0xc66f, 0x1000, 0x1, 0x800, 0x40}, &(0x7f0000000200)=0x98) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r6, 0x0, 0x50000000000443) [ 579.042265] FAULT_INJECTION: forcing a failure. [ 579.042265] name failslab, interval 1, probability 0, space 0, times 0 [ 579.074059] CPU: 1 PID: 24376 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 579.081122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.090490] Call Trace: [ 579.093103] dump_stack+0x138/0x197 [ 579.096754] should_fail.cold+0x10f/0x159 [ 579.100922] should_failslab+0xdb/0x130 [ 579.104916] __kmalloc_track_caller+0x2ec/0x790 [ 579.109594] ? kstrdup_const+0x48/0x60 [ 579.113491] kstrdup+0x3a/0x70 [ 579.116696] kstrdup_const+0x48/0x60 [ 579.120417] alloc_vfsmnt+0xe5/0x7d0 [ 579.124137] clone_mnt+0x70/0xee0 [ 579.127593] ? lock_downgrade+0x740/0x740 [ 579.131755] copy_tree+0x33b/0x8a0 [ 579.135308] copy_mnt_ns+0x11c/0x8c0 [ 579.139047] ? kmem_cache_alloc+0x611/0x780 [ 579.143374] ? selinux_capable+0x36/0x40 [ 579.147448] create_new_namespaces+0xc9/0x720 [ 579.151954] ? ns_capable_common+0x12c/0x160 [ 579.156378] copy_namespaces+0x284/0x310 [ 579.160446] copy_process.part.0+0x2603/0x6a00 [ 579.165042] ? proc_fail_nth_write+0x7d/0x180 [ 579.169544] ? proc_cwd_link+0x1b0/0x1b0 [ 579.173624] ? __cleanup_sighand+0x50/0x50 [ 579.177867] ? lock_downgrade+0x740/0x740 [ 579.182032] _do_fork+0x19e/0xce0 [ 579.185488] ? fork_idle+0x280/0x280 [ 579.189211] ? fput+0xd4/0x150 [ 579.192413] ? SyS_write+0x15e/0x230 [ 579.196136] SyS_clone+0x37/0x50 [ 579.199503] ? sys_vfork+0x30/0x30 [ 579.203050] do_syscall_64+0x1e8/0x640 [ 579.206941] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 579.211790] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 579.216977] RIP: 0033:0x459a59 [ 579.220166] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 579.227880] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 579.235159] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 03:34:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000400)={r8, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) setsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r8, 0x4}, 0x8) [ 579.242434] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 579.249716] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 579.257427] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:44 executing program 0 (fault-call:1 fault-nth:24): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:44 executing program 1: timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) [ 579.383878] FAULT_INJECTION: forcing a failure. [ 579.383878] name failslab, interval 1, probability 0, space 0, times 0 [ 579.408164] CPU: 1 PID: 24392 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 579.415243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.424607] Call Trace: [ 579.427212] dump_stack+0x138/0x197 [ 579.430854] should_fail.cold+0x10f/0x159 [ 579.435018] should_failslab+0xdb/0x130 [ 579.439005] kmem_cache_alloc+0x2d7/0x780 [ 579.443164] ? find_held_lock+0x35/0x130 [ 579.447236] ? copy_tree+0x4a2/0x8a0 [ 579.450958] alloc_vfsmnt+0x28/0x7d0 [ 579.454686] clone_mnt+0x70/0xee0 [ 579.458143] ? lock_downgrade+0x740/0x740 [ 579.462302] copy_tree+0x33b/0x8a0 [ 579.465859] copy_mnt_ns+0x11c/0x8c0 [ 579.469576] ? kmem_cache_alloc+0x611/0x780 [ 579.473904] ? selinux_capable+0x36/0x40 [ 579.478151] create_new_namespaces+0xc9/0x720 [ 579.482645] ? ns_capable_common+0x12c/0x160 [ 579.487064] copy_namespaces+0x284/0x310 [ 579.491127] copy_process.part.0+0x2603/0x6a00 [ 579.495717] ? proc_fail_nth_write+0x7d/0x180 [ 579.500223] ? proc_cwd_link+0x1b0/0x1b0 [ 579.504310] ? __cleanup_sighand+0x50/0x50 [ 579.508548] ? lock_downgrade+0x740/0x740 [ 579.512703] _do_fork+0x19e/0xce0 [ 579.516160] ? fork_idle+0x280/0x280 [ 579.519882] ? fput+0xd4/0x150 [ 579.523073] ? SyS_write+0x15e/0x230 [ 579.526787] SyS_clone+0x37/0x50 [ 579.530151] ? sys_vfork+0x30/0x30 [ 579.533696] do_syscall_64+0x1e8/0x640 [ 579.537601] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 579.542450] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 579.547636] RIP: 0033:0x459a59 [ 579.550829] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 579.558539] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 579.565809] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 579.573102] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 579.580372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 579.587640] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:44 executing program 0 (fault-call:1 fault-nth:25): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 579.726606] FAULT_INJECTION: forcing a failure. [ 579.726606] name failslab, interval 1, probability 0, space 0, times 0 [ 579.750172] CPU: 1 PID: 24399 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 579.757234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.766594] Call Trace: [ 579.769201] dump_stack+0x138/0x197 [ 579.772842] should_fail.cold+0x10f/0x159 [ 579.777000] should_failslab+0xdb/0x130 [ 579.780996] kmem_cache_alloc+0x2d7/0x780 [ 579.785145] ? find_held_lock+0x35/0x130 [ 579.789236] ? copy_tree+0x4a2/0x8a0 [ 579.792955] alloc_vfsmnt+0x28/0x7d0 [ 579.796673] clone_mnt+0x70/0xee0 [ 579.800136] ? lock_downgrade+0x740/0x740 [ 579.804316] copy_tree+0x33b/0x8a0 [ 579.807867] copy_mnt_ns+0x11c/0x8c0 [ 579.811586] ? kmem_cache_alloc+0x611/0x780 [ 579.815910] ? selinux_capable+0x36/0x40 [ 579.819974] create_new_namespaces+0xc9/0x720 [ 579.824481] ? ns_capable_common+0x12c/0x160 [ 579.828903] copy_namespaces+0x284/0x310 [ 579.833096] copy_process.part.0+0x2603/0x6a00 [ 579.837681] ? proc_fail_nth_write+0x7d/0x180 [ 579.842174] ? proc_cwd_link+0x1b0/0x1b0 [ 579.846231] ? __cleanup_sighand+0x50/0x50 [ 579.850474] ? lock_downgrade+0x740/0x740 [ 579.854612] _do_fork+0x19e/0xce0 [ 579.858053] ? fork_idle+0x280/0x280 [ 579.861753] ? fput+0xd4/0x150 [ 579.864928] ? SyS_write+0x15e/0x230 [ 579.868627] SyS_clone+0x37/0x50 [ 579.871975] ? sys_vfork+0x30/0x30 [ 579.875502] do_syscall_64+0x1e8/0x640 [ 579.879371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 579.884206] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 579.889380] RIP: 0033:0x459a59 [ 579.892552] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 579.900245] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 579.908627] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 579.915898] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 579.923160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 579.930422] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:45 executing program 0 (fault-call:1 fault-nth:26): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000007c0)={0x5, @raw_data="59853b27884f54d3e129a704fc647aa6ce2b9b1c961f0760c794f212bf5bd1ee9b24d0370070068de128ee0250e1daad674165c90c5051d7dbd319e3c22763482a3bc1ecbe339b4779e77daf82835d2581774c2230de11e20698e9b6c1636bb05a6d605cb2b0623eded4bcb47a4118b4be2deee18e6d0e015fc9c2ebe30e4588edde9c9579eb5ee5ddf88371f5b25c0740ae49dfeb18aa5d27b35a270643bde397cace308df25a624fe6a1c07d029745947f4dcde826f4d405b5e24714cffbe48d5429b7f2dd8166"}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000340)={{0x4f41a826df9dd182, 0x0, @identifier="d54d85b62dd90d5310860e1878a466f4"}}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000100)={0x8000000, 0x9, 0x2}) recvmsg(r2, 0x0, 0x0) setreuid(0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x401, 0x440000) r5 = getuid() ioctl$SIOCAX25DELUID(r4, 0x89e2, &(0x7f00000000c0)={0x3, @null, r5}) 03:34:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x5, 0xffffffffffffffff, 0x6) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="3000ff00", @ANYRES16=r7, @ANYBLOB="3f02000000000000000001000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800080}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r7, 0x400, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x4, @media='udp\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x808f18c31fafda61, 0x0, 0x7ff}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 580.307587] FAULT_INJECTION: forcing a failure. [ 580.307587] name failslab, interval 1, probability 0, space 0, times 0 [ 580.354400] CPU: 0 PID: 24420 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 580.361480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.370862] Call Trace: [ 580.373474] dump_stack+0x138/0x197 [ 580.377171] should_fail.cold+0x10f/0x159 [ 580.381351] should_failslab+0xdb/0x130 [ 580.385360] kmem_cache_alloc+0x2d7/0x780 [ 580.389525] ? find_held_lock+0x35/0x130 [ 580.393597] ? copy_tree+0x4a2/0x8a0 [ 580.397326] alloc_vfsmnt+0x28/0x7d0 [ 580.401087] clone_mnt+0x70/0xee0 [ 580.404542] ? lock_downgrade+0x740/0x740 [ 580.408688] copy_tree+0x33b/0x8a0 [ 580.412232] copy_mnt_ns+0x11c/0x8c0 [ 580.415953] ? kmem_cache_alloc+0x611/0x780 [ 580.420268] ? selinux_capable+0x36/0x40 [ 580.424331] create_new_namespaces+0xc9/0x720 [ 580.428820] ? ns_capable_common+0x12c/0x160 [ 580.433223] copy_namespaces+0x284/0x310 [ 580.437284] copy_process.part.0+0x2603/0x6a00 [ 580.441875] ? proc_fail_nth_write+0x7d/0x180 [ 580.446365] ? proc_cwd_link+0x1b0/0x1b0 [ 580.450445] ? __cleanup_sighand+0x50/0x50 [ 580.454671] ? lock_downgrade+0x740/0x740 [ 580.458820] _do_fork+0x19e/0xce0 [ 580.462268] ? fork_idle+0x280/0x280 [ 580.465979] ? fput+0xd4/0x150 [ 580.469160] ? SyS_write+0x15e/0x230 [ 580.473579] SyS_clone+0x37/0x50 [ 580.476932] ? sys_vfork+0x30/0x30 [ 580.480465] do_syscall_64+0x1e8/0x640 [ 580.485304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 580.490148] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 580.495326] RIP: 0033:0x459a59 03:34:45 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) openat$cgroup_ro(r3, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) [ 580.498502] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 580.506201] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 580.513460] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 580.520719] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 580.527995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 580.535253] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendmsg$sock(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080)=@sco={0x1f, {0x9, 0x4, 0x0, 0xf2, 0xca, 0x3f}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="1845daeef3358232b9607827c1e6d514872532dc21fe370be8da198cf3d3b2dadcf5bbfd70aad0a139dafa84fde618422bfae74552900fda379a95fce3e7528b18738d7f283813531f66e2f9a057394df16fa021596759acc5276c518bfa6ccc9dd610e9ea62401bc789251537a8fd58af300c3145053d8c34419a79108861e792b9071d5ac620c82695eec119ab7cdb8cdb6d4b794991adc42036a2b58625a39589376fc6a4f32b9fad14763f8b4b710c37158259d99138401a3bf30dd7b1", 0xbf}, {&(0x7f00000002c0)="c8c5bfb9e05c27c3926d106dcdfb104577215fcef2b63545ac9af7556331c16d332df197674a44c46fcfe0f59afc7adf9f0ca95db55d9652ed9dfd6b7d0f0317df9849135b43280ba563d16b8ed550cc6e5c7c8882f675011a128d907eaea132f1f315a088ca", 0x66}, {&(0x7f0000000340)="9631da9bfd8733bfd732708e79c6b19e02b294d4ab16d24f7fe3a6f959360e3d975b9414cd31a0ae328322ff98b81996178179014d902bb36152e18d2f14ac0030262660bd94561ab2f265a1d88eb315ca68e6a7fba22210d61c5030e5e95148d258599a6630429ca1287e0093d7cb83ae1758a307bd0b1efe72c2724be73a77f0de6fafdcb6b574823f324abe1387196f9fe2a1d00f111d194902fbb3cb071d82e4c1", 0xa3}, {&(0x7f0000000400)="0a27b5c4b3c72ea9ab2e13af87fe40ba5cc3f735ac1598f2cfae331a76203c9df38394173ae0c083c8d6a6949acd96bee8d4aad7092df9831c26f70ec0e0471fe26dea2346fbf0a664333fe28c723b339e1dc3a624a943c1a7c3db4eb8db120eba9f92d0e87b4f409b36c5c5181ed9f472c60c98a1328117b440e6528b3e31855d08d8a02fe4e933001e5af457532d120b8ea2680654b8f9304158fd568d8973c308d45f8aec75092e39f404", 0xac}, {&(0x7f0000000200)="b24f538a5dc206dbb3883712b08028d3f58a6762672b2b67807f4d2cbaabe4b3dabdc1c5da3cd21ff9b9c4240550a594765d2c7766cc6f3873548c03ea", 0x3d}], 0x5}, 0x40000) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:45 executing program 0 (fault-call:1 fault-nth:27): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 580.913131] FAULT_INJECTION: forcing a failure. [ 580.913131] name failslab, interval 1, probability 0, space 0, times 0 [ 580.927686] CPU: 1 PID: 24437 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 580.934742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.944104] Call Trace: [ 580.946702] dump_stack+0x138/0x197 [ 580.950341] should_fail.cold+0x10f/0x159 [ 580.954499] should_failslab+0xdb/0x130 [ 580.958478] __kmalloc_track_caller+0x2ec/0x790 [ 580.963149] ? kstrdup_const+0x48/0x60 [ 580.967036] kstrdup+0x3a/0x70 [ 580.970226] kstrdup_const+0x48/0x60 [ 580.973944] alloc_vfsmnt+0xe5/0x7d0 [ 580.977661] clone_mnt+0x70/0xee0 [ 580.981113] ? lock_downgrade+0x740/0x740 [ 580.985268] copy_tree+0x33b/0x8a0 [ 580.988817] copy_mnt_ns+0x11c/0x8c0 [ 580.992528] ? kmem_cache_alloc+0x611/0x780 [ 580.996853] ? selinux_capable+0x36/0x40 [ 581.000920] create_new_namespaces+0xc9/0x720 [ 581.005416] ? ns_capable_common+0x12c/0x160 [ 581.009828] copy_namespaces+0x284/0x310 [ 581.013905] copy_process.part.0+0x2603/0x6a00 [ 581.018502] ? proc_fail_nth_write+0x7d/0x180 [ 581.023030] ? proc_cwd_link+0x1b0/0x1b0 [ 581.027192] ? __cleanup_sighand+0x50/0x50 [ 581.031429] ? lock_downgrade+0x740/0x740 [ 581.035583] _do_fork+0x19e/0xce0 [ 581.039054] ? fork_idle+0x280/0x280 [ 581.042776] ? fput+0xd4/0x150 [ 581.045972] ? SyS_write+0x15e/0x230 [ 581.049692] SyS_clone+0x37/0x50 [ 581.053060] ? sys_vfork+0x30/0x30 [ 581.056605] do_syscall_64+0x1e8/0x640 [ 581.060496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 581.065352] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 581.070552] RIP: 0033:0x459a59 [ 581.073739] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 581.081457] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 581.088853] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 581.096127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 581.103397] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 581.110666] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000000c0)={0x3, 0x20, 0x1, r4}) r5 = accept4(r0, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) 03:34:46 executing program 0 (fault-call:1 fault-nth:28): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') [ 581.246480] FAULT_INJECTION: forcing a failure. [ 581.246480] name failslab, interval 1, probability 0, space 0, times 0 [ 581.274643] CPU: 1 PID: 24448 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 581.281717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.291091] Call Trace: [ 581.293693] dump_stack+0x138/0x197 [ 581.297338] should_fail.cold+0x10f/0x159 [ 581.301507] should_failslab+0xdb/0x130 [ 581.305496] kmem_cache_alloc+0x2d7/0x780 [ 581.309649] ? find_held_lock+0x35/0x130 [ 581.313720] ? copy_tree+0x4a2/0x8a0 [ 581.317529] alloc_vfsmnt+0x28/0x7d0 [ 581.321251] clone_mnt+0x70/0xee0 [ 581.324708] ? lock_downgrade+0x740/0x740 [ 581.328954] copy_tree+0x33b/0x8a0 [ 581.332507] copy_mnt_ns+0x11c/0x8c0 [ 581.336227] ? kmem_cache_alloc+0x611/0x780 [ 581.340559] ? selinux_capable+0x36/0x40 [ 581.344625] create_new_namespaces+0xc9/0x720 [ 581.349127] ? ns_capable_common+0x12c/0x160 [ 581.353542] copy_namespaces+0x284/0x310 [ 581.357611] copy_process.part.0+0x2603/0x6a00 [ 581.362210] ? proc_fail_nth_write+0x7d/0x180 [ 581.366715] ? proc_cwd_link+0x1b0/0x1b0 [ 581.370791] ? __cleanup_sighand+0x50/0x50 [ 581.375035] ? lock_downgrade+0x740/0x740 [ 581.379198] _do_fork+0x19e/0xce0 [ 581.382661] ? fork_idle+0x280/0x280 [ 581.386385] ? fput+0xd4/0x150 [ 581.389578] ? SyS_write+0x15e/0x230 [ 581.393302] SyS_clone+0x37/0x50 [ 581.396673] ? sys_vfork+0x30/0x30 [ 581.400217] do_syscall_64+0x1e8/0x640 [ 581.404108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 581.408963] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 581.414155] RIP: 0033:0x459a59 [ 581.417343] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 581.427580] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 581.434856] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 03:34:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x20000, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$IOC_PR_PREEMPT(r6, 0x401870cb, &(0x7f00000000c0)={0x5, 0x4, 0x8, 0x3}) r7 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) ioctl$FICLONE(r3, 0x40049409, r7) [ 581.442154] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 581.449426] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 581.456704] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:46 executing program 0 (fault-call:1 fault-nth:29): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = shmget(0x3, 0x1000, 0x20, &(0x7f0000ffc000/0x1000)=nil) r4 = geteuid() setreuid(r4, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffff5b) write$P9_RGETATTR(r5, &(0x7f00000004c0)={0xa0, 0x19, 0x1, {0x80, {0x12, 0x3, 0x8}, 0x0, r6, r8, 0x8, 0xffff, 0x2, 0xff, 0x8, 0x5f, 0xfffffffffffff405, 0x7fffffff, 0xffffffff, 0x41, 0x6, 0x28a, 0x81, 0xd55d, 0xfff}}, 0xa0) r9 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r9, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r13 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r13, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r13, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r13, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r13, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r13, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r14 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r15 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r15, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r14, 0x84, 0x9, &(0x7f0000000400)={r16, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r13, 0x84, 0x75, &(0x7f0000000200)={r16, 0xedba}, &(0x7f00000002c0)=0x8) sendfile(r11, r12, 0x0, 0x50000000000443) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r12, 0x0, 0x10, &(0x7f0000000080)='ecb-cipher_null\x00'}, 0x30) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000100)={{0x232, 0xee00, 0x0, r4, r8, 0xe, 0x4}, 0x8, 0xffffffffffffffff, 0x101, 0x6, r9, r17, 0x1600}) sendfile(r1, r2, 0x0, 0x50000000000443) [ 581.614865] FAULT_INJECTION: forcing a failure. [ 581.614865] name failslab, interval 1, probability 0, space 0, times 0 [ 581.637553] CPU: 0 PID: 24467 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 581.644631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.654098] Call Trace: [ 581.656718] dump_stack+0x138/0x197 [ 581.660397] should_fail.cold+0x10f/0x159 [ 581.664581] should_failslab+0xdb/0x130 [ 581.668589] __kmalloc_track_caller+0x2ec/0x790 [ 581.673279] ? kstrdup_const+0x48/0x60 [ 581.677169] kstrdup+0x3a/0x70 [ 581.680360] kstrdup_const+0x48/0x60 [ 581.684115] alloc_vfsmnt+0xe5/0x7d0 [ 581.687829] clone_mnt+0x70/0xee0 [ 581.691276] ? lock_downgrade+0x740/0x740 [ 581.695423] copy_tree+0x33b/0x8a0 [ 581.698966] copy_mnt_ns+0x11c/0x8c0 [ 581.702672] ? kmem_cache_alloc+0x611/0x780 [ 581.707007] ? selinux_capable+0x36/0x40 [ 581.711065] create_new_namespaces+0xc9/0x720 [ 581.715558] ? ns_capable_common+0x12c/0x160 [ 581.719962] copy_namespaces+0x284/0x310 [ 581.724020] copy_process.part.0+0x2603/0x6a00 [ 581.728603] ? proc_fail_nth_write+0x7d/0x180 [ 581.733095] ? proc_cwd_link+0x1b0/0x1b0 [ 581.737248] ? __cleanup_sighand+0x50/0x50 [ 581.741560] ? lock_downgrade+0x740/0x740 [ 581.745709] _do_fork+0x19e/0xce0 [ 581.749161] ? fork_idle+0x280/0x280 [ 581.752871] ? fput+0xd4/0x150 [ 581.756054] ? SyS_write+0x15e/0x230 [ 581.759765] SyS_clone+0x37/0x50 [ 581.763120] ? sys_vfork+0x30/0x30 [ 581.766654] do_syscall_64+0x1e8/0x640 [ 581.770529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 581.775368] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 581.780550] RIP: 0033:0x459a59 [ 581.783727] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 581.791425] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 581.798684] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 581.805953] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x20000) r1 = accept4(r0, 0x0, 0x0, 0x0) sysfs$2(0x2, 0xf7e, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x3e, 0x9, 0xce, "7d9298dade896d41ba30b1ea9d8042e7", "3833c013af6a17bb5f1499b9947e6f6a4effc8d305513e51d09a424865f651ebfc720cf5d963f0c582"}, 0x3e, 0x1) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x202880, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000180), &(0x7f0000000200)=0x4) [ 581.813212] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 581.820470] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:46 executing program 0 (fault-call:1 fault-nth:30): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x40}, 0xd33b2d9dd2b46da8}, 0x0, 0x0, r2, 0x111579f9bf95e926) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) [ 581.931103] kauditd_printk_skb: 3 callbacks suppressed [ 581.931113] audit: type=1400 audit(2000000086.869:474): avc: denied { setattr } for pid=24472 comm="syz-executor.4" name="NETLINK" dev="sockfs" ino=117109 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 582.013605] FAULT_INJECTION: forcing a failure. [ 582.013605] name failslab, interval 1, probability 0, space 0, times 0 [ 582.033014] CPU: 0 PID: 24481 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 582.040097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.049513] Call Trace: [ 582.052138] dump_stack+0x138/0x197 [ 582.055804] should_fail.cold+0x10f/0x159 [ 582.059988] should_failslab+0xdb/0x130 [ 582.063991] kmem_cache_alloc+0x2d7/0x780 [ 582.068160] ? find_held_lock+0x35/0x130 [ 582.072238] ? copy_tree+0x4a2/0x8a0 [ 582.075969] alloc_vfsmnt+0x28/0x7d0 [ 582.079703] clone_mnt+0x70/0xee0 [ 582.084473] ? lock_downgrade+0x740/0x740 [ 582.088648] copy_tree+0x33b/0x8a0 [ 582.092220] copy_mnt_ns+0x11c/0x8c0 [ 582.095948] ? kmem_cache_alloc+0x611/0x780 [ 582.100291] ? selinux_capable+0x36/0x40 [ 582.104375] create_new_namespaces+0xc9/0x720 [ 582.108885] ? ns_capable_common+0x12c/0x160 [ 582.113321] copy_namespaces+0x284/0x310 [ 582.117408] copy_process.part.0+0x2603/0x6a00 [ 582.122045] ? proc_fail_nth_write+0x7d/0x180 [ 582.126555] ? proc_cwd_link+0x1b0/0x1b0 [ 582.130658] ? __cleanup_sighand+0x50/0x50 [ 582.134909] ? lock_downgrade+0x740/0x740 [ 582.139086] _do_fork+0x19e/0xce0 [ 582.142560] ? fork_idle+0x280/0x280 [ 582.146295] ? fput+0xd4/0x150 [ 582.149498] ? SyS_write+0x15e/0x230 [ 582.153235] SyS_clone+0x37/0x50 [ 582.156618] ? sys_vfork+0x30/0x30 [ 582.160177] do_syscall_64+0x1e8/0x640 [ 582.164074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 582.168942] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 582.174147] RIP: 0033:0x459a59 [ 582.177340] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 582.185066] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 582.192348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 582.199635] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 582.207010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 582.214295] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:47 executing program 0 (fault-call:1 fault-nth:31): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) sendfile(r2, r3, 0x0, 0x50000000000443) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000140)=0x1f, 0x4) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) r11 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r11, 0x0, 0xffffffffffffffff, 0x0) r12 = syz_open_procfs(r11, &(0x7f0000000200)='net/netfilter\x00') ioctl$PERF_EVENT_IOC_QUERY_BPF(r12, 0xc008240a, &(0x7f00000002c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$FITRIM(r10, 0xc0185879, &(0x7f0000000180)={0x9, 0xea87, 0x9}) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r13, 0x0, 0x50000000000443) ioctl$VIDIOC_TRY_EXT_CTRLS(r13, 0xc0205649, &(0x7f0000000100)={0x19a0004, 0x53, 0x3, [], &(0x7f00000000c0)={0xa10908, 0x8, [], @p_u16=&(0x7f0000000080)=0x1}}) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r14, 0x0, 0x50000000000443) [ 582.362861] FAULT_INJECTION: forcing a failure. [ 582.362861] name failslab, interval 1, probability 0, space 0, times 0 [ 582.394650] CPU: 1 PID: 24491 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 582.401711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.401718] Call Trace: [ 582.401739] dump_stack+0x138/0x197 [ 582.401761] should_fail.cold+0x10f/0x159 [ 582.401781] should_failslab+0xdb/0x130 [ 582.401802] __kmalloc_track_caller+0x2ec/0x790 [ 582.430188] ? kstrdup_const+0x48/0x60 [ 582.430202] kstrdup+0x3a/0x70 [ 582.430212] kstrdup_const+0x48/0x60 [ 582.441086] alloc_vfsmnt+0xe5/0x7d0 [ 582.444835] clone_mnt+0x70/0xee0 [ 582.448295] ? lock_downgrade+0x740/0x740 [ 582.452456] copy_tree+0x33b/0x8a0 [ 582.456030] copy_mnt_ns+0x11c/0x8c0 [ 582.459775] ? kmem_cache_alloc+0x611/0x780 [ 582.464103] ? selinux_capable+0x36/0x40 [ 582.468178] create_new_namespaces+0xc9/0x720 [ 582.472676] ? ns_capable_common+0x12c/0x160 [ 582.477092] copy_namespaces+0x284/0x310 [ 582.481162] copy_process.part.0+0x2603/0x6a00 [ 582.485755] ? proc_fail_nth_write+0x7d/0x180 [ 582.490370] ? proc_cwd_link+0x1b0/0x1b0 [ 582.494452] ? __cleanup_sighand+0x50/0x50 [ 582.498779] ? lock_downgrade+0x740/0x740 [ 582.502942] _do_fork+0x19e/0xce0 [ 582.506402] ? fork_idle+0x280/0x280 [ 582.510132] ? fput+0xd4/0x150 [ 582.513329] ? SyS_write+0x15e/0x230 [ 582.517049] SyS_clone+0x37/0x50 [ 582.520502] ? sys_vfork+0x30/0x30 [ 582.524047] do_syscall_64+0x1e8/0x640 [ 582.527937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 582.532810] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 582.538001] RIP: 0033:0x459a59 [ 582.541188] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 582.548931] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 582.556231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 03:34:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 582.563613] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 582.570897] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 582.578175] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0xfffffffffffffe08, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4001, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r0, r1, 0x0, 0x50000000000443) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000080)) 03:34:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) pwrite64(r1, &(0x7f00000002c0)="17dbb7776d4db0b066a042b643630d1fb540422708fd7884ce437ad8729e23bcff7d844fef5cf5f8144add479b6a25503cb38d128c4f74dda65a66023870cab96570b13df4fb41eb9fa592ec92d3ce2223e1ecd00d8746d7f5018012c3c7ba23322c1c75656d01d640a8f8d245eee84ccec2218d3dfa9d48dd54911624d066e6aefae411c1f7b81b2dc57e9f8168baaa82d04acc42a711f826133e562e248ac3ed5a3333fc3a7cc9c40959ad1d22d849d622b50734f19077ed5f6d35b706210d90d43c1040eb4886038fe9889315be1dd7aa6ee4ed14c095a9b0b1a96ee9f2efccf31d3a13a735086f4b9e3d97", 0xed, 0x0) r2 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x1, 0x3, 0xfffffff9, 0x7f}, 0x10) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x6, 0x18000) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r6, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000880)=ANY=[@ANYBLOB="3003000000", @ANYRES16=r8, @ANYBLOB="000326bd7000fbdbdf2514000000980001000800030042000000100001007564703a73797a3000000000380004001400010002004e24ac1414bb0000000000000000200002000a004e2000000001fe880000000000000000000000000001030000000800030020000000100001007564703a73797a32000000002c0004001400010002004e20ac14141400000000000000001400020002004e23ac1414aa00000000000000001c00020008000200280c104b0400040008000100830d0000040004003c000100380004001400010002004e21ac1e00010000000000000000200002000a004e23000003ffff020000000000000000000000000001000400002400050008000100657468000800010069620000080001006962000008000100756470008c000500080001007564700044000200080004001f00000008000200ff07000008000100070000000800030003000000080001001e00000008000300010000800800010004000000080001000600000008000100696200002c000200080001000500000008000200090000000800040001800000080001001f000000080002000500000008000100756470000c00020008000100060000004000010008000300ffffffff08000300030000002c00020008000200ff010000080004000900000013000300080000000800030003000000080001000d000000300006000400020008000100400000000400020008000100000000000400020004000200080001000100000004000200"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r9 = accept4(r6, 0x0, 0x0, 0x100000) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) ioctl$KVM_SET_PIT(r12, 0x8048ae66, &(0x7f00000003c0)={[{0x7, 0x2, 0xe, 0x1, 0x0, 0x5, 0x4, 0x1f, 0x4, 0x81, 0xff, 0x0, 0x400}, {0x2, 0x8001, 0x2, 0x6, 0x1, 0xff, 0x8, 0x6, 0x9, 0x20, 0xcf, 0x81, 0x5}, {0x6, 0x1, 0x4, 0x81, 0x7, 0x14, 0x0, 0x5, 0xba, 0x6, 0x0, 0x4, 0x5}], 0xce1b9c1}) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000100)) r13 = syz_open_procfs(0x0, &(0x7f0000000140)='ponality\x00\x00\x00\x00') sendfile(r9, r13, 0x0, 0x50000000000443) 03:34:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x1000000000, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 582.897674] audit: type=1400 audit(2000000087.829:475): avc: denied { setopt } for pid=24510 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 03:34:47 executing program 0 (fault-call:1 fault-nth:32): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 583.036964] FAULT_INJECTION: forcing a failure. [ 583.036964] name failslab, interval 1, probability 0, space 0, times 0 [ 583.066551] CPU: 0 PID: 24520 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 583.073645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.083030] Call Trace: [ 583.085682] dump_stack+0x138/0x197 [ 583.089342] should_fail.cold+0x10f/0x159 [ 583.093612] should_failslab+0xdb/0x130 [ 583.097618] kmem_cache_alloc+0x2d7/0x780 [ 583.101801] ? find_held_lock+0x35/0x130 [ 583.105882] ? copy_tree+0x4a2/0x8a0 [ 583.109622] alloc_vfsmnt+0x28/0x7d0 [ 583.113357] clone_mnt+0x70/0xee0 [ 583.116825] ? lock_downgrade+0x740/0x740 [ 583.120996] copy_tree+0x33b/0x8a0 [ 583.124570] copy_mnt_ns+0x11c/0x8c0 [ 583.128296] ? kmem_cache_alloc+0x611/0x780 [ 583.132647] ? selinux_capable+0x36/0x40 [ 583.137088] create_new_namespaces+0xc9/0x720 [ 583.141602] ? ns_capable_common+0x12c/0x160 [ 583.146127] copy_namespaces+0x284/0x310 [ 583.150235] copy_process.part.0+0x2603/0x6a00 [ 583.154857] ? proc_fail_nth_write+0x7d/0x180 [ 583.159372] ? proc_cwd_link+0x1b0/0x1b0 [ 583.163472] ? __cleanup_sighand+0x50/0x50 [ 583.167733] ? lock_downgrade+0x740/0x740 [ 583.171918] _do_fork+0x19e/0xce0 [ 583.175406] ? fork_idle+0x280/0x280 [ 583.179131] ? fput+0xd4/0x150 [ 583.182320] ? SyS_write+0x15e/0x230 [ 583.186047] SyS_clone+0x37/0x50 [ 583.189432] ? sys_vfork+0x30/0x30 [ 583.193071] do_syscall_64+0x1e8/0x640 [ 583.196956] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 583.201799] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 583.206975] RIP: 0033:0x459a59 [ 583.210155] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 583.217852] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 583.225196] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 583.232456] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 583.239719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 583.247149] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 583.254833] protocol 88fb is buggy, dev hsr_slave_0 [ 583.259966] protocol 88fb is buggy, dev hsr_slave_1 03:34:48 executing program 0 (fault-call:1 fault-nth:33): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) r2 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x3d, 0x3f, 0x21, 0x0, 0x1, 0x32, 0x1, 0x8, 0x4, 0x8}, 0xb) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) [ 583.396739] FAULT_INJECTION: forcing a failure. [ 583.396739] name failslab, interval 1, probability 0, space 0, times 0 [ 583.428363] CPU: 1 PID: 24530 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 583.435418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.444869] Call Trace: [ 583.447474] dump_stack+0x138/0x197 [ 583.451119] should_fail.cold+0x10f/0x159 [ 583.455316] should_failslab+0xdb/0x130 [ 583.460785] kmem_cache_alloc+0x2d7/0x780 [ 583.464957] ? find_held_lock+0x35/0x130 [ 583.469027] ? copy_tree+0x4a2/0x8a0 [ 583.472747] alloc_vfsmnt+0x28/0x7d0 [ 583.476464] clone_mnt+0x70/0xee0 [ 583.479921] ? lock_downgrade+0x740/0x740 [ 583.484256] copy_tree+0x33b/0x8a0 [ 583.487823] copy_mnt_ns+0x11c/0x8c0 [ 583.491565] ? kmem_cache_alloc+0x611/0x780 [ 583.495896] ? selinux_capable+0x36/0x40 [ 583.499973] create_new_namespaces+0xc9/0x720 [ 583.504476] ? ns_capable_common+0x12c/0x160 [ 583.508895] copy_namespaces+0x284/0x310 [ 583.512992] copy_process.part.0+0x2603/0x6a00 [ 583.517590] ? proc_fail_nth_write+0x7d/0x180 [ 583.522090] ? proc_cwd_link+0x1b0/0x1b0 [ 583.526166] ? __cleanup_sighand+0x50/0x50 [ 583.530429] ? lock_downgrade+0x740/0x740 [ 583.534584] _do_fork+0x19e/0xce0 [ 583.538048] ? fork_idle+0x280/0x280 [ 583.541768] ? fput+0xd4/0x150 [ 583.544966] ? SyS_write+0x15e/0x230 [ 583.548685] SyS_clone+0x37/0x50 [ 583.552086] ? sys_vfork+0x30/0x30 [ 583.555634] do_syscall_64+0x1e8/0x640 [ 583.559529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 583.564379] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 583.570433] RIP: 0033:0x459a59 [ 583.573625] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 583.581327] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 583.588592] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 03:34:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r5, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) getsockname$netrom(r3, &(0x7f0000000080)={{0x3, @default}, [@default, @bcast, @bcast, @rose, @bcast, @default, @rose, @default]}, &(0x7f0000000100)=0x48) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000880)={0x0, 0x0, 0xa, 0x0, [], [{0x3, 0x81, 0x0, 0xfff, 0x9c, 0x8001}, {0x1ff, 0x0, 0x401, 0x10001, 0x5, 0xfff}], [[], [], [], [], [], [], [], [], [], []]}) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r6, 0x0, 0x50000000000443) [ 583.595859] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 583.603124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 583.610493] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 583.750133] protocol 88fb is buggy, dev hsr_slave_0 [ 583.755354] protocol 88fb is buggy, dev hsr_slave_1 [ 583.760537] protocol 88fb is buggy, dev hsr_slave_0 [ 583.765607] protocol 88fb is buggy, dev hsr_slave_1 03:34:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:48 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x8, 0x2}, {0x8000, 0x8001}, {0x7, 0x4}, {0x7ff, 0x6}, {0x5e, 0x7fff}, {0x7879, 0x3}, {0x0, 0x303}]}) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:48 executing program 0 (fault-call:1 fault-nth:34): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 584.024276] FAULT_INJECTION: forcing a failure. [ 584.024276] name failslab, interval 1, probability 0, space 0, times 0 [ 584.041217] CPU: 1 PID: 24551 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 584.048267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.057630] Call Trace: [ 584.060232] dump_stack+0x138/0x197 [ 584.063878] should_fail.cold+0x10f/0x159 [ 584.068067] should_failslab+0xdb/0x130 [ 584.072153] kmem_cache_alloc+0x2d7/0x780 [ 584.076315] ? find_held_lock+0x35/0x130 [ 584.080382] ? copy_tree+0x4a2/0x8a0 [ 584.084108] alloc_vfsmnt+0x28/0x7d0 [ 584.087834] clone_mnt+0x70/0xee0 [ 584.091289] ? lock_downgrade+0x740/0x740 [ 584.095442] copy_tree+0x33b/0x8a0 [ 584.098999] copy_mnt_ns+0x11c/0x8c0 [ 584.102716] ? kmem_cache_alloc+0x611/0x780 [ 584.107050] ? selinux_capable+0x36/0x40 [ 584.111124] create_new_namespaces+0xc9/0x720 [ 584.115975] ? ns_capable_common+0x12c/0x160 [ 584.120388] copy_namespaces+0x284/0x310 [ 584.124548] copy_process.part.0+0x2603/0x6a00 [ 584.129147] ? proc_fail_nth_write+0x7d/0x180 [ 584.133682] ? proc_cwd_link+0x1b0/0x1b0 [ 584.137758] ? __cleanup_sighand+0x50/0x50 [ 584.142144] ? lock_downgrade+0x740/0x740 [ 584.146309] _do_fork+0x19e/0xce0 [ 584.149779] ? fork_idle+0x280/0x280 [ 584.153523] ? fput+0xd4/0x150 [ 584.156731] ? SyS_write+0x15e/0x230 [ 584.160452] SyS_clone+0x37/0x50 [ 584.163819] ? sys_vfork+0x30/0x30 [ 584.167372] do_syscall_64+0x1e8/0x640 [ 584.171266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 584.176122] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 584.181312] RIP: 0033:0x459a59 [ 584.184501] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 584.192211] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 584.199490] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 584.206847] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 584.214119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 03:34:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffe00, 0x3e5}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 584.221391] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:49 executing program 0 (fault-call:1 fault-nth:35): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$TIOCNOTTY(r3, 0x5422) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) [ 584.308622] FAULT_INJECTION: forcing a failure. [ 584.308622] name failslab, interval 1, probability 0, space 0, times 0 [ 584.336683] CPU: 1 PID: 24562 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 584.343747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.353107] Call Trace: [ 584.355707] dump_stack+0x138/0x197 [ 584.359353] should_fail.cold+0x10f/0x159 [ 584.363514] should_failslab+0xdb/0x130 [ 584.367500] kmem_cache_alloc+0x2d7/0x780 [ 584.371661] ? find_held_lock+0x35/0x130 [ 584.375730] ? copy_tree+0x4a2/0x8a0 [ 584.379452] alloc_vfsmnt+0x28/0x7d0 [ 584.383176] clone_mnt+0x70/0xee0 [ 584.386631] ? lock_downgrade+0x740/0x740 [ 584.390790] copy_tree+0x33b/0x8a0 [ 584.394345] copy_mnt_ns+0x11c/0x8c0 [ 584.398059] ? kmem_cache_alloc+0x611/0x780 [ 584.402392] create_new_namespaces+0xc9/0x720 [ 584.406982] ? ns_capable_common+0x12c/0x160 [ 584.411395] copy_namespaces+0x284/0x310 [ 584.415468] copy_process.part.0+0x2603/0x6a00 [ 584.421098] ? find_held_lock+0x35/0x130 [ 584.425161] ? finish_task_switch+0x178/0x650 [ 584.429679] ? __cleanup_sighand+0x50/0x50 [ 584.433923] ? __schedule+0x7c0/0x1cd0 [ 584.437823] _do_fork+0x19e/0xce0 [ 584.441285] ? fork_idle+0x280/0x280 [ 584.445007] ? retint_kernel+0x2d/0x2d [ 584.448903] SyS_clone+0x37/0x50 [ 584.452271] ? sys_vfork+0x30/0x30 03:34:49 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) r9 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r9, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, {0xa, 0x4e21, 0x2, @rand_addr="0f9a10440c65f0b0e8ff26ee2121e77e", 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r9, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r10}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r8, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r10}}, 0x18) getsockopt$bt_hci(r5, 0x0, 0x3, &(0x7f0000000040)=""/82, &(0x7f00000000c0)=0x52) r11 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 584.455818] do_syscall_64+0x1e8/0x640 [ 584.459705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 584.464557] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 584.469750] RIP: 0033:0x459a59 [ 584.472939] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 584.480661] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 584.487927] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 584.495180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 584.502439] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 584.509697] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:49 executing program 0 (fault-call:1 fault-nth:36): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 584.571372] selinux_nlmsg_perm: 50 callbacks suppressed [ 584.571383] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.595840] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.602925] FAULT_INJECTION: forcing a failure. [ 584.602925] name failslab, interval 1, probability 0, space 0, times 0 [ 584.619934] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.621341] CPU: 1 PID: 24573 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 584.637211] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.639019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.639025] Call Trace: [ 584.639041] dump_stack+0x138/0x197 [ 584.639060] should_fail.cold+0x10f/0x159 [ 584.639075] should_failslab+0xdb/0x130 [ 584.639088] kmem_cache_alloc+0x2d7/0x780 [ 584.651569] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.660483] ? find_held_lock+0x35/0x130 [ 584.660497] ? copy_tree+0x4a2/0x8a0 [ 584.660512] alloc_vfsmnt+0x28/0x7d0 [ 584.660525] clone_mnt+0x70/0xee0 [ 584.660534] ? lock_downgrade+0x740/0x740 [ 584.660549] copy_tree+0x33b/0x8a0 [ 584.660568] copy_mnt_ns+0x11c/0x8c0 [ 584.663468] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.666745] ? kmem_cache_alloc+0x611/0x780 [ 584.666759] ? selinux_capable+0x36/0x40 [ 584.666777] create_new_namespaces+0xc9/0x720 [ 584.666788] ? ns_capable_common+0x12c/0x160 [ 584.666802] copy_namespaces+0x284/0x310 [ 584.671298] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.674892] copy_process.part.0+0x2603/0x6a00 03:34:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) [ 584.674915] ? proc_fail_nth_write+0x7d/0x180 [ 584.674926] ? proc_cwd_link+0x1b0/0x1b0 [ 584.674947] ? __cleanup_sighand+0x50/0x50 [ 584.679414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.691121] ? lock_downgrade+0x740/0x740 [ 584.691138] _do_fork+0x19e/0xce0 [ 584.691154] ? fork_idle+0x280/0x280 [ 584.691171] ? fput+0xd4/0x150 [ 584.691182] ? SyS_write+0x15e/0x230 [ 584.691197] SyS_clone+0x37/0x50 [ 584.691204] ? sys_vfork+0x30/0x30 [ 584.691217] do_syscall_64+0x1e8/0x640 03:34:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) fanotify_init(0x1, 0x400) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:49 executing program 0 (fault-call:1 fault-nth:37): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 584.695634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.698974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 584.698994] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 584.699002] RIP: 0033:0x459a59 [ 584.699009] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 584.699019] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 584.699027] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 03:34:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x4, 0x400) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/connector\x00') sendfile(r2, r3, 0x0, 0x50000000000443) [ 584.703068] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24566 comm=syz-executor.2 [ 584.706153] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 584.706160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 584.706166] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 584.878174] FAULT_INJECTION: forcing a failure. [ 584.878174] name failslab, interval 1, probability 0, space 0, times 0 [ 584.917624] CPU: 0 PID: 24581 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 584.924686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.934062] Call Trace: [ 584.934082] dump_stack+0x138/0x197 [ 584.934104] should_fail.cold+0x10f/0x159 [ 584.934125] should_failslab+0xdb/0x130 [ 584.934139] __kmalloc_track_caller+0x2ec/0x790 [ 584.934159] ? kstrdup_const+0x48/0x60 [ 584.940390] kstrdup+0x3a/0x70 [ 584.940407] kstrdup_const+0x48/0x60 [ 584.940422] alloc_vfsmnt+0xe5/0x7d0 [ 584.940439] clone_mnt+0x70/0xee0 [ 584.940451] ? lock_downgrade+0x740/0x740 [ 584.940474] copy_tree+0x33b/0x8a0 [ 584.940505] copy_mnt_ns+0x11c/0x8c0 [ 584.940516] ? kmem_cache_alloc+0x611/0x780 [ 584.940543] create_new_namespaces+0xc9/0x720 [ 584.953323] ? ns_capable_common+0x12c/0x160 [ 584.953345] copy_namespaces+0x284/0x310 [ 584.953363] copy_process.part.0+0x2603/0x6a00 [ 584.960522] ? proc_fail_nth_write+0x7d/0x180 [ 584.960535] ? proc_cwd_link+0x1b0/0x1b0 [ 584.960571] ? __cleanup_sighand+0x50/0x50 [ 584.960587] ? lock_downgrade+0x740/0x740 [ 584.960614] _do_fork+0x19e/0xce0 [ 584.971638] ? fork_idle+0x280/0x280 [ 584.971659] ? fput+0xd4/0x150 [ 584.971674] ? SyS_write+0x15e/0x230 [ 584.971695] SyS_clone+0x37/0x50 [ 584.979357] ? sys_vfork+0x30/0x30 [ 584.979378] do_syscall_64+0x1e8/0x640 [ 584.979389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 585.052763] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 585.057958] RIP: 0033:0x459a59 [ 585.057966] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:34:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) write$P9_RREADLINK(r2, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 03:34:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x800000000003ff, 0x1ef800000000}, 0x5000}, 0x0, 0x0, 0xffffffffffffffff, 0x13) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'user.', 'ecb-cipher_null\x00'}, &(0x7f0000000100)='securitynodev\x00', 0xe, 0x3) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x800, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000180)=0x2, &(0x7f0000000200)=0x1) [ 585.057981] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 585.068956] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 585.068965] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 585.068972] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 585.068980] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:50 executing program 0 (fault-call:1 fault-nth:38): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 585.187685] FAULT_INJECTION: forcing a failure. [ 585.187685] name failslab, interval 1, probability 0, space 0, times 0 [ 585.200344] CPU: 0 PID: 24603 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 585.207383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.216832] Call Trace: [ 585.219413] dump_stack+0x138/0x197 [ 585.223041] should_fail.cold+0x10f/0x159 [ 585.227203] should_failslab+0xdb/0x130 [ 585.231183] __kmalloc_track_caller+0x2ec/0x790 [ 585.235943] ? kstrdup_const+0x48/0x60 [ 585.239838] kstrdup+0x3a/0x70 [ 585.243027] kstrdup_const+0x48/0x60 [ 585.246731] alloc_vfsmnt+0xe5/0x7d0 [ 585.250448] clone_mnt+0x70/0xee0 [ 585.253906] ? lock_downgrade+0x740/0x740 [ 585.258061] copy_tree+0x33b/0x8a0 [ 585.261601] copy_mnt_ns+0x11c/0x8c0 [ 585.265312] ? kmem_cache_alloc+0x611/0x780 [ 585.269629] ? selinux_capable+0x36/0x40 [ 585.273788] create_new_namespaces+0xc9/0x720 [ 585.278277] ? ns_capable_common+0x12c/0x160 [ 585.282683] copy_namespaces+0x284/0x310 [ 585.286762] copy_process.part.0+0x2603/0x6a00 [ 585.291345] ? proc_fail_nth_write+0x7d/0x180 [ 585.295830] ? proc_cwd_link+0x1b0/0x1b0 [ 585.299897] ? __cleanup_sighand+0x50/0x50 [ 585.304124] ? lock_downgrade+0x740/0x740 [ 585.308306] _do_fork+0x19e/0xce0 [ 585.311770] ? fork_idle+0x280/0x280 [ 585.315491] ? fput+0xd4/0x150 [ 585.318683] ? SyS_write+0x15e/0x230 [ 585.322400] SyS_clone+0x37/0x50 [ 585.325761] ? sys_vfork+0x30/0x30 [ 585.329295] do_syscall_64+0x1e8/0x640 [ 585.333171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 585.338013] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 585.343194] RIP: 0033:0x459a59 [ 585.346370] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 585.354110] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 585.361368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 585.368636] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 585.377977] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 03:34:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffbfffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x40, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 585.385274] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:50 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r6, 0x0, 0x0, 0x0) writev(r6, &(0x7f00000001c0)=[{&(0x7f0000000040)="9b88dcfe84619e199106517739f0efe8de6c77464df1832258c52ed4f3652e0ae12ced91b77f8a87032127f36a34d48543dce1ffdf711f49ecb80e5b6ed8d0b4245438107e0333d82b957fa4dfd0845d64375702d3bef727b2c6a68af3d1fa7b356316e6f08e1c8f5e9e2d00a430b5ee965cf602e2eaa633cf1507b0d94356ae0f043f7606f407b65502cd98b46866c12fc481031dd9dc28e34da427311c11decf1879e9b83441aa12db484d28a6402ad835b43bf68163c607675eac5b76eb", 0xbf}, {&(0x7f0000000100)="3fe0a67e1367c9dcff106730e44553b896c65a487560400617898603ada23987352364deb60fee2a488a9b1a1496d25ae5041999850a5d5b10abfc287ffeebf93880661c72eeb2a0e4ef8bc494b5c296e78f5ab3", 0x54}], 0x2) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_GET_MAGIC(r9, 0x80046402, &(0x7f0000000200)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:50 executing program 0 (fault-call:1 fault-nth:39): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 585.482993] FAULT_INJECTION: forcing a failure. [ 585.482993] name failslab, interval 1, probability 0, space 0, times 0 [ 585.494935] CPU: 0 PID: 24615 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 585.501977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.511364] Call Trace: [ 585.513963] dump_stack+0x138/0x197 [ 585.517593] should_fail.cold+0x10f/0x159 [ 585.521739] should_failslab+0xdb/0x130 [ 585.525720] __kmalloc_track_caller+0x2ec/0x790 [ 585.530396] ? kstrdup_const+0x48/0x60 [ 585.534300] kstrdup+0x3a/0x70 [ 585.537490] kstrdup_const+0x48/0x60 [ 585.541196] alloc_vfsmnt+0xe5/0x7d0 [ 585.544932] clone_mnt+0x70/0xee0 [ 585.548394] ? lock_downgrade+0x740/0x740 [ 585.552566] copy_tree+0x33b/0x8a0 [ 585.556128] copy_mnt_ns+0x11c/0x8c0 [ 585.559830] ? kmem_cache_alloc+0x611/0x780 [ 585.564160] ? selinux_capable+0x36/0x40 [ 585.568216] create_new_namespaces+0xc9/0x720 [ 585.572718] ? ns_capable_common+0x12c/0x160 [ 585.577140] copy_namespaces+0x284/0x310 [ 585.581230] copy_process.part.0+0x2603/0x6a00 [ 585.585821] ? proc_fail_nth_write+0x7d/0x180 [ 585.590403] ? proc_cwd_link+0x1b0/0x1b0 [ 585.594479] ? __cleanup_sighand+0x50/0x50 [ 585.598713] ? lock_downgrade+0x740/0x740 [ 585.602871] _do_fork+0x19e/0xce0 [ 585.606332] ? fork_idle+0x280/0x280 [ 585.610060] ? fput+0xd4/0x150 [ 585.613271] ? SyS_write+0x15e/0x230 [ 585.616981] SyS_clone+0x37/0x50 [ 585.620333] ? sys_vfork+0x30/0x30 [ 585.623865] do_syscall_64+0x1e8/0x640 [ 585.627739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 585.632591] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 585.637779] RIP: 0033:0x459a59 [ 585.640972] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 585.648688] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 585.655950] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 585.663212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 585.670480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 03:34:50 executing program 0 (fault-call:1 fault-nth:40): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0xdb, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = shmget(0x1, 0x1000, 0x800, &(0x7f0000ffe000/0x1000)=nil) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r7, @ANYBLOB="000326bd7000fbdbdf2514000000980001000800030042000000100001007564703a73797a3000000000380004001400010002004e24ac1414bb0000000000000000200002000a004e2000000001fe880000000000000000000000000001030000000800030020000000100001007564703a73797a32000000002c0004001400010002004e20ac14141400000000000000001400020002004e23ac1414aa00000000000000001c00020008000200280c104b0400040008000100830d0000040004003c000100380004001400010002004e21ac1e00010000000000000000200002000a004e23000003ffff020000000000000000000000000001000400002400050008000100657468000800010069620000080001006962000008000100756470008c000500080001007564700044000200080004001f00000008000200ff07000008000100070000000800030003000000080001001e00000008000300010000800800010004000000080001000600000008000100696200002c000200080001000500000008000200090000000800040001800000080001001f000000080002000500000008000100756470000c00020008000100060000004000010008000300ffffffff08000300030000002c00020008000200ff010000080004000900000013000300080000000800030003000000080001000d000000300006000400020008000100400000000400020008000100000000000400020004000200080001000100000004000200"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) [ 585.677743] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xa020}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x268, r7, 0x106, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x400, @loopback, 0x315d}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'sit0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x2223c2b5, @rand_addr="c5f35d23ff7f73628aaf8b663ff51c6e", 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xf808}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffff9}]}, @TIPC_NLA_BEARER={0xd0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xd03, @remote, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8a}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x504a}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb177}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xfffffff8, @mcast2, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x7f}}}}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x85}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa5f7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x4000}, 0x4020084) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000080)=""/169) [ 585.745757] FAULT_INJECTION: forcing a failure. [ 585.745757] name failslab, interval 1, probability 0, space 0, times 0 [ 585.757552] CPU: 0 PID: 24625 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 585.764849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.774224] Call Trace: [ 585.776812] dump_stack+0x138/0x197 [ 585.780458] should_fail.cold+0x10f/0x159 [ 585.784624] should_failslab+0xdb/0x130 [ 585.788591] __kmalloc_track_caller+0x2ec/0x790 [ 585.793299] ? kstrdup_const+0x48/0x60 [ 585.797185] kstrdup+0x3a/0x70 [ 585.800380] kstrdup_const+0x48/0x60 [ 585.804115] alloc_vfsmnt+0xe5/0x7d0 [ 585.807831] clone_mnt+0x70/0xee0 [ 585.811300] ? lock_downgrade+0x740/0x740 [ 585.815568] copy_tree+0x33b/0x8a0 [ 585.819138] copy_mnt_ns+0x11c/0x8c0 [ 585.822879] ? kmem_cache_alloc+0x611/0x780 [ 585.827205] ? selinux_capable+0x36/0x40 [ 585.831280] create_new_namespaces+0xc9/0x720 [ 585.836144] ? ns_capable_common+0x12c/0x160 [ 585.840575] copy_namespaces+0x284/0x310 [ 585.844660] copy_process.part.0+0x2603/0x6a00 [ 585.849253] ? proc_fail_nth_write+0x7d/0x180 [ 585.853739] ? proc_cwd_link+0x1b0/0x1b0 [ 585.857835] ? __cleanup_sighand+0x50/0x50 [ 585.862085] ? lock_downgrade+0x740/0x740 [ 585.866261] _do_fork+0x19e/0xce0 [ 585.869728] ? fork_idle+0x280/0x280 [ 585.873448] ? fput+0xd4/0x150 [ 585.876631] ? SyS_write+0x15e/0x230 [ 585.880359] SyS_clone+0x37/0x50 [ 585.884128] ? sys_vfork+0x30/0x30 [ 585.888195] do_syscall_64+0x1e8/0x640 [ 585.892081] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 585.897017] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 585.902203] RIP: 0033:0x459a59 [ 585.905417] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 585.913137] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 585.920410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 585.927704] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 585.936982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 585.944248] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:50 executing program 0 (fault-call:1 fault-nth:41): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x12040, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) setsockopt$RXRPC_SECURITY_KEY(r5, 0x110, 0x1, &(0x7f00000000c0)='/dev/ion\x00', 0x9) 03:34:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = dup(r1) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x189280, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'team_slave_0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/12]}) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000001bc0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000002140)=[{}], r5, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x189280, 0x0) ioctl$sock_rose_SIOCADDRT(r6, 0x890b, &(0x7f0000000380)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x4, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000001bc0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000002140)=[{}], r7, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xffff, @dev={0xfe, 0x80, [], 0xf}, 0x5}, {0xa, 0x4e20, 0x4, @loopback, 0x1}, r7}}, 0x48) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) write$9p(r10, &(0x7f0000000440)="30ea398d0dd4209ce7adc7467f3fdcf0fa418e5f527ac068e11600f1f43becec708647a6c12640c16001c3efcc9c697b1e46b2f20c07c6ea8ea38ed1691d62a6026574a774fde7159a43c50b9467bfa0c48f386dbeb0ad6510be51f9b2bee3e20677bd3e887a3506f836b0a0cb82dc5c27ce37d741ab30b74ea9914c49f3bb3af4ab7b91efee797a93b8b830c4eebe28785d46a09670fe3069c86d12dde9334d8e827047b0d29281c44f9c37f39cba7dd802ec5e66a1a5cffebe374c570e74a767efbc68385f00faf1ac", 0xca) r11 = accept4(r0, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) [ 586.046188] FAULT_INJECTION: forcing a failure. [ 586.046188] name failslab, interval 1, probability 0, space 0, times 0 [ 586.058294] CPU: 1 PID: 24637 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 586.065328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.074688] Call Trace: [ 586.077285] dump_stack+0x138/0x197 [ 586.081109] should_fail.cold+0x10f/0x159 [ 586.085272] should_failslab+0xdb/0x130 [ 586.089260] kmem_cache_alloc+0x2d7/0x780 [ 586.093416] ? find_held_lock+0x35/0x130 [ 586.097493] ? copy_tree+0x4a2/0x8a0 [ 586.101218] alloc_vfsmnt+0x28/0x7d0 [ 586.104939] clone_mnt+0x70/0xee0 [ 586.108398] ? lock_downgrade+0x740/0x740 [ 586.112557] copy_tree+0x33b/0x8a0 [ 586.116103] copy_mnt_ns+0x11c/0x8c0 [ 586.119896] ? kmem_cache_alloc+0x611/0x780 [ 586.124217] ? selinux_capable+0x36/0x40 [ 586.128270] create_new_namespaces+0xc9/0x720 [ 586.132815] ? ns_capable_common+0x12c/0x160 [ 586.137213] copy_namespaces+0x284/0x310 [ 586.141447] copy_process.part.0+0x2603/0x6a00 [ 586.146039] ? proc_fail_nth_write+0x7d/0x180 [ 586.150523] ? proc_cwd_link+0x1b0/0x1b0 [ 586.154592] ? __cleanup_sighand+0x50/0x50 [ 586.158829] ? lock_downgrade+0x740/0x740 [ 586.162982] _do_fork+0x19e/0xce0 [ 586.166442] ? fork_idle+0x280/0x280 [ 586.170154] ? fput+0xd4/0x150 [ 586.173360] ? SyS_write+0x15e/0x230 [ 586.177076] SyS_clone+0x37/0x50 [ 586.180513] ? sys_vfork+0x30/0x30 [ 586.184060] do_syscall_64+0x1e8/0x640 [ 586.187933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 586.192780] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 586.197954] RIP: 0033:0x459a59 [ 586.201135] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 586.208840] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 586.216201] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 586.223477] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 586.230752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 586.238621] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:51 executing program 5: ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000080)={0x23, 0x8, 0xf, 0x10, 0x0, 0x6ea, 0x0, 0xa9, 0x1}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') socket$inet6(0xa, 0x80000, 0x7d) sendfile(r3, r4, 0x0, 0x50000000000443) write$P9_RREADLINK(r4, &(0x7f0000000380)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x2b2, &(0x7f0000000400)={&(0x7f00000054c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x4}, 0x10) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r10, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x11, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f0000000140)={0x1, 0x131, 0xfe, {0x0, 0x2710}, {r12, r13/1000+10000}, {0x0, 0x1, 0x0, 0x1}, 0x1, @canfd={{0x3, 0x1, 0x0, 0x1}, 0x3d, 0x1, 0x0, 0x0, "56717cb93e81ee3bd598084caeeda37e34f8edb11f5e2b6920d4e1da5aea689a0af1ad96d3c27d3125bc052c2d069ea1b7ca6a1b4c21a2c2c184847d11bb4dc3"}}, 0x80}, 0x1, 0x0, 0x0, 0x30040890}, 0x40088000) sendfile(r1, r5, 0x0, 0x50000000000443) 03:34:51 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) r7 = socket$caif_stream(0x25, 0x1, 0x3) ftruncate(r7, 0xffffffffffffffff) ioctl$VFIO_IOMMU_MAP_DMA(r6, 0x3b71, &(0x7f0000000040)={0x20, 0x2, 0xcfac, 0xe0, 0x4}) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r8, 0x40605346, &(0x7f00000000c0)={0x1, 0x2, {0x0, 0x3, 0x0, 0x0, 0x6}}) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r3, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:51 executing program 0 (fault-call:1 fault-nth:42): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 586.336936] FAULT_INJECTION: forcing a failure. [ 586.336936] name failslab, interval 1, probability 0, space 0, times 0 [ 586.354113] CPU: 1 PID: 24653 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 586.361184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.370544] Call Trace: [ 586.373140] dump_stack+0x138/0x197 [ 586.376769] should_fail.cold+0x10f/0x159 [ 586.381044] should_failslab+0xdb/0x130 [ 586.385012] __kmalloc_track_caller+0x2ec/0x790 [ 586.389668] ? kstrdup_const+0x48/0x60 [ 586.393604] kstrdup+0x3a/0x70 [ 586.396781] kstrdup_const+0x48/0x60 [ 586.400497] alloc_vfsmnt+0xe5/0x7d0 [ 586.404222] clone_mnt+0x70/0xee0 [ 586.407769] ? lock_downgrade+0x740/0x740 [ 586.411910] copy_tree+0x33b/0x8a0 [ 586.415440] copy_mnt_ns+0x11c/0x8c0 [ 586.419140] ? kmem_cache_alloc+0x611/0x780 [ 586.423463] ? selinux_capable+0x36/0x40 [ 586.427772] create_new_namespaces+0xc9/0x720 [ 586.432249] ? ns_capable_common+0x12c/0x160 [ 586.436657] copy_namespaces+0x284/0x310 [ 586.440713] copy_process.part.0+0x2603/0x6a00 [ 586.445320] ? proc_fail_nth_write+0x7d/0x180 [ 586.449087] QAT: Invalid ioctl [ 586.449812] ? proc_cwd_link+0x1b0/0x1b0 [ 586.449840] ? __cleanup_sighand+0x50/0x50 [ 586.449853] ? lock_downgrade+0x740/0x740 [ 586.449871] _do_fork+0x19e/0xce0 [ 586.449885] ? fork_idle+0x280/0x280 [ 586.465508] ? fput+0xd4/0x150 [ 586.465522] ? SyS_write+0x15e/0x230 [ 586.465540] SyS_clone+0x37/0x50 [ 586.465550] ? sys_vfork+0x30/0x30 [ 586.465563] do_syscall_64+0x1e8/0x640 [ 586.465575] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 586.472752] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 586.472762] RIP: 0033:0x459a59 [ 586.472768] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 586.472780] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 586.472787] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 586.472793] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:51 executing program 0 (fault-call:1 fault-nth:43): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 586.472799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 586.472805] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:51 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) io_setup(0xd, &(0x7f00000000c0)=0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f0000000040)=""/41, 0x29}], 0x1, 0x0) io_submit(r5, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x60ffffffffff, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000001c0)="10000000000000000086770000000000", 0x10}]) r6 = socket$kcm(0x29, 0x5, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2000000014fbf31ef334421b866603ae9369a97b8017ca5403db32109edef06a74ecf5862fb228341bfd5ceb67c21f40523c59d5497c555e4c6d8f127d08ec719d64cb58af3e97b561c89aa5fe827d614fe05cd2aa1fe5d374cae73865bcdf2c337959f50a019f87302bb82bd8fae358e03eb202b5a72555b7dbb330431a5e757ce6322768776640b4df69e8deddd850a0afcc69423ba5ccfdfb99330322729b528c6a5e889482f876a6e1b699d25cc1d6a215ac132f465c4c", @ANYRES16=r10, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000340)) io_submit(r5, 0x2, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x7, r6, &(0x7f0000000100), 0x0, 0x8001, 0x0, 0x1, r3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x101, r8, &(0x7f0000000200)="ea11cdab25d473dcfc738f0d4bfd18aa39fb6657a7165f02d77f935810a132d60f4dbd1df0dac52f1ca2fc49029c0a89f444371397b0cef0b476b383feae4942dafc4f31fa9ebb1df1bcff7723cb190e5d703bd4a5912e5cfa9fc8a670210bf68577d1d1aa95ecb36898cb9c42a59a8a488c505f86a0671f82ee744015628103f64e9922819feb682e9a16378fd125908de9b1e50234d9f2aa3113e394504cea4623de720b91984b4f02dae539cbb5238c1a0670a7f07afa95a5e1953636ebc343853e914797d48b2028e51446ef240dfec133c28f786412491e4a25b4de708cb6", 0xe1, 0x9, 0x0, 0x2, r13}]) sendfile(r2, r3, 0x0, 0x50000000000443) [ 586.632325] FAULT_INJECTION: forcing a failure. [ 586.632325] name failslab, interval 1, probability 0, space 0, times 0 [ 586.643815] CPU: 1 PID: 24668 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 586.650840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.660196] Call Trace: [ 586.662789] dump_stack+0x138/0x197 [ 586.666414] should_fail.cold+0x10f/0x159 [ 586.670561] should_failslab+0xdb/0x130 [ 586.674535] kmem_cache_alloc+0x2d7/0x780 [ 586.678669] ? find_held_lock+0x35/0x130 [ 586.682723] ? copy_tree+0x4a2/0x8a0 [ 586.686433] alloc_vfsmnt+0x28/0x7d0 [ 586.690130] clone_mnt+0x70/0xee0 [ 586.693574] ? lock_downgrade+0x740/0x740 [ 586.697735] copy_tree+0x33b/0x8a0 [ 586.701277] copy_mnt_ns+0x11c/0x8c0 [ 586.704975] ? kmem_cache_alloc+0x611/0x780 [ 586.709280] ? selinux_capable+0x36/0x40 [ 586.713340] create_new_namespaces+0xc9/0x720 [ 586.717826] ? ns_capable_common+0x12c/0x160 [ 586.722220] copy_namespaces+0x284/0x310 [ 586.726279] copy_process.part.0+0x2603/0x6a00 [ 586.730860] ? proc_fail_nth_write+0x7d/0x180 [ 586.735361] ? proc_cwd_link+0x1b0/0x1b0 [ 586.739412] ? __cleanup_sighand+0x50/0x50 [ 586.743643] ? lock_downgrade+0x740/0x740 [ 586.747798] _do_fork+0x19e/0xce0 [ 586.751256] ? fork_idle+0x280/0x280 [ 586.754977] ? fput+0xd4/0x150 [ 586.758168] ? SyS_write+0x15e/0x230 [ 586.761890] SyS_clone+0x37/0x50 [ 586.765253] ? sys_vfork+0x30/0x30 [ 586.768883] do_syscall_64+0x1e8/0x640 [ 586.772778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 586.777642] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 586.782836] RIP: 0033:0x459a59 [ 586.786024] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 586.793748] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 586.801033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 586.808314] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 586.815588] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 586.822966] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:51 executing program 0 (fault-call:1 fault-nth:44): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:51 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2, 0x6) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000000c0)={0x91cd, 0x5, 0xcf, 0xd7bd, 0x7, 0x3f, 0x70, 0x2, 0x2a7, 0x7f}) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r3, 0x0, 0x50000000000443) [ 586.906388] FAULT_INJECTION: forcing a failure. [ 586.906388] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 586.918245] CPU: 1 PID: 24676 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 586.925265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.934626] Call Trace: [ 586.937224] dump_stack+0x138/0x197 [ 586.940865] should_fail.cold+0x10f/0x159 [ 586.945025] __alloc_pages_nodemask+0x1d6/0x7a0 [ 586.949708] ? __alloc_pages_slowpath+0x2930/0x2930 [ 586.954740] cache_grow_begin+0x80/0x400 [ 586.958807] kmem_cache_alloc+0x6a6/0x780 [ 586.962962] ? find_held_lock+0x35/0x130 [ 586.967032] alloc_vfsmnt+0x28/0x7d0 [ 586.970750] clone_mnt+0x70/0xee0 [ 586.974201] ? lock_downgrade+0x740/0x740 [ 586.978356] copy_tree+0x33b/0x8a0 [ 586.981996] copy_mnt_ns+0x11c/0x8c0 [ 586.985706] ? kmem_cache_alloc+0x611/0x780 [ 586.990033] ? selinux_capable+0x36/0x40 [ 586.994108] create_new_namespaces+0xc9/0x720 [ 586.998602] ? ns_capable_common+0x12c/0x160 [ 587.003010] copy_namespaces+0x284/0x310 [ 587.007074] copy_process.part.0+0x2603/0x6a00 [ 587.011669] ? proc_fail_nth_write+0x7d/0x180 [ 587.016164] ? proc_cwd_link+0x1b0/0x1b0 [ 587.020238] ? __cleanup_sighand+0x50/0x50 [ 587.024475] ? lock_downgrade+0x740/0x740 [ 587.028636] _do_fork+0x19e/0xce0 [ 587.032100] ? fork_idle+0x280/0x280 [ 587.035815] ? fput+0xd4/0x150 [ 587.039018] ? SyS_write+0x15e/0x230 [ 587.042736] SyS_clone+0x37/0x50 [ 587.046098] ? sys_vfork+0x30/0x30 [ 587.049641] do_syscall_64+0x1e8/0x640 [ 587.053527] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.058468] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.063654] RIP: 0033:0x459a59 [ 587.066836] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 587.074543] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 587.081826] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 587.089099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 587.096376] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 03:34:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f0000000080)) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) [ 587.103649] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:52 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x101000) ioctl$MON_IOCT_RING_SIZE(r3, 0x9204, 0x12120e) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:52 executing program 0 (fault-call:1 fault-nth:45): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 587.259979] FAULT_INJECTION: forcing a failure. [ 587.259979] name failslab, interval 1, probability 0, space 0, times 0 [ 587.280527] CPU: 0 PID: 24699 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 587.287584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.296955] Call Trace: [ 587.299562] dump_stack+0x138/0x197 [ 587.303220] should_fail.cold+0x10f/0x159 [ 587.307408] should_failslab+0xdb/0x130 [ 587.311400] __kmalloc_track_caller+0x2ec/0x790 [ 587.316089] ? kstrdup_const+0x48/0x60 [ 587.319996] kstrdup+0x3a/0x70 [ 587.323200] kstrdup_const+0x48/0x60 [ 587.326924] alloc_vfsmnt+0xe5/0x7d0 [ 587.330657] clone_mnt+0x70/0xee0 [ 587.334121] ? lock_downgrade+0x740/0x740 [ 587.338296] copy_tree+0x33b/0x8a0 [ 587.341869] copy_mnt_ns+0x11c/0x8c0 [ 587.345603] ? kmem_cache_alloc+0x611/0x780 [ 587.349961] ? selinux_capable+0x36/0x40 [ 587.354044] create_new_namespaces+0xc9/0x720 [ 587.358558] ? ns_capable_common+0x12c/0x160 [ 587.362985] copy_namespaces+0x284/0x310 [ 587.367149] copy_process.part.0+0x2603/0x6a00 [ 587.374364] ? proc_fail_nth_write+0x7d/0x180 [ 587.378866] ? proc_cwd_link+0x1b0/0x1b0 [ 587.382965] ? __cleanup_sighand+0x50/0x50 [ 587.387211] ? lock_downgrade+0x740/0x740 [ 587.391386] _do_fork+0x19e/0xce0 [ 587.394861] ? fork_idle+0x280/0x280 [ 587.398595] ? fput+0xd4/0x150 [ 587.401801] ? SyS_write+0x15e/0x230 [ 587.405534] SyS_clone+0x37/0x50 [ 587.408906] ? sys_vfork+0x30/0x30 [ 587.412462] do_syscall_64+0x1e8/0x640 [ 587.416357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.421220] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.426409] RIP: 0033:0x459a59 [ 587.429604] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 587.437354] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 587.444642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 587.451915] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$CAPI_GET_SERIAL(r7, 0xc0044308, &(0x7f0000000100)=0x2) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r8, 0x0, 0x50000000000443) [ 587.459197] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 587.466559] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:52 executing program 0 (fault-call:1 fault-nth:46): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 587.553575] FAULT_INJECTION: forcing a failure. [ 587.553575] name failslab, interval 1, probability 0, space 0, times 0 [ 587.565230] CPU: 0 PID: 24709 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 587.572493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.581952] Call Trace: [ 587.584559] dump_stack+0x138/0x197 [ 587.588220] should_fail.cold+0x10f/0x159 [ 587.592402] should_failslab+0xdb/0x130 [ 587.596411] kmem_cache_alloc+0x2d7/0x780 [ 587.596430] ? find_held_lock+0x35/0x130 [ 587.604809] ? copy_tree+0x4a2/0x8a0 [ 587.608545] alloc_vfsmnt+0x28/0x7d0 [ 587.612277] clone_mnt+0x70/0xee0 [ 587.615737] ? lock_downgrade+0x740/0x740 [ 587.615766] copy_tree+0x33b/0x8a0 [ 587.615794] copy_mnt_ns+0x11c/0x8c0 [ 587.627206] ? kmem_cache_alloc+0x611/0x780 [ 587.631547] ? selinux_capable+0x36/0x40 [ 587.635722] create_new_namespaces+0xc9/0x720 [ 587.640232] ? ns_capable_common+0x12c/0x160 [ 587.644666] copy_namespaces+0x284/0x310 [ 587.648745] copy_process.part.0+0x2603/0x6a00 [ 587.653412] ? proc_fail_nth_write+0x7d/0x180 [ 587.657921] ? proc_cwd_link+0x1b0/0x1b0 [ 587.662024] ? __cleanup_sighand+0x50/0x50 [ 587.666277] ? lock_downgrade+0x740/0x740 [ 587.670455] _do_fork+0x19e/0xce0 [ 587.673915] ? fork_idle+0x280/0x280 [ 587.677627] ? fput+0xd4/0x150 [ 587.680823] ? SyS_write+0x15e/0x230 [ 587.684538] SyS_clone+0x37/0x50 [ 587.687901] ? sys_vfork+0x30/0x30 [ 587.691435] do_syscall_64+0x1e8/0x640 [ 587.695314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.700171] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.705364] RIP: 0033:0x459a59 [ 587.708557] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 587.716283] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 587.723560] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 587.730840] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 587.738222] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 587.745543] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:52 executing program 0 (fault-call:1 fault-nth:47): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 587.822980] FAULT_INJECTION: forcing a failure. [ 587.822980] name failslab, interval 1, probability 0, space 0, times 0 [ 587.834823] CPU: 0 PID: 24717 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 587.841861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.851223] Call Trace: [ 587.853810] dump_stack+0x138/0x197 [ 587.857454] should_fail.cold+0x10f/0x159 [ 587.861626] should_failslab+0xdb/0x130 [ 587.865602] __kmalloc_track_caller+0x2ec/0x790 [ 587.870281] ? kstrdup_const+0x48/0x60 [ 587.874175] kstrdup+0x3a/0x70 [ 587.877374] kstrdup_const+0x48/0x60 [ 587.881099] alloc_vfsmnt+0xe5/0x7d0 [ 587.884813] clone_mnt+0x70/0xee0 [ 587.888254] ? lock_downgrade+0x740/0x740 [ 587.892401] copy_tree+0x33b/0x8a0 [ 587.896031] copy_mnt_ns+0x11c/0x8c0 [ 587.899750] ? kmem_cache_alloc+0x611/0x780 [ 587.904077] ? selinux_capable+0x36/0x40 [ 587.908174] create_new_namespaces+0xc9/0x720 [ 587.912680] ? ns_capable_common+0x12c/0x160 [ 587.917115] copy_namespaces+0x284/0x310 [ 587.921201] copy_process.part.0+0x2603/0x6a00 [ 587.925830] ? proc_fail_nth_write+0x7d/0x180 [ 587.930423] ? proc_cwd_link+0x1b0/0x1b0 [ 587.934502] ? __cleanup_sighand+0x50/0x50 [ 587.938730] ? lock_downgrade+0x740/0x740 [ 587.942903] _do_fork+0x19e/0xce0 [ 587.946381] ? fork_idle+0x280/0x280 [ 587.950117] ? fput+0xd4/0x150 [ 587.953324] ? SyS_write+0x15e/0x230 [ 587.957065] SyS_clone+0x37/0x50 [ 587.960445] ? sys_vfork+0x30/0x30 [ 587.964000] do_syscall_64+0x1e8/0x640 [ 587.967928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.972911] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.978099] RIP: 0033:0x459a59 [ 587.981291] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 587.989004] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 587.996283] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 588.003553] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 588.010827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 03:34:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f00000002c0)=&(0x7f0000000200)) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000140)={0x3, 0x70, 0x4, 0x1f, 0xc5, 0x40, 0x0, 0xfffffffffffffff9, 0x8, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0xc}, 0x10040, 0x9, 0x3, 0x0, 0x7, 0x0, 0x8}) sendfile(r4, r5, 0x0, 0x50000000000443) 03:34:52 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f00000000c0), 0x10) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) socket$pptp(0x18, 0x1, 0x2) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000002c0)="aca191840e06ff09c02912a11c3ad806c63a5ece9c495824de230679a9240990b8c031adf4cd6b9a718e20673d320af4a491dda3e6449f0147ee4003147679954eb40d8d781474d3300c53309f52a4a8a60e526fb2217514af1c3ba9550b91259f73b39cd0585ff5a579ff2103e74ec30768788719dfaff5390c4212f9e840ec907b32a24fc465c6996b105ca50588fd49b9cf0c5f71fc13cfdd7c", 0x9b}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xfffffffffffffd9d) fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000000)={0x6, 0x7ff}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000040)={{0x1, 0x0, @identifier="00410d527976444e23df6f6b6803ea11"}, 0x2c, [], "d5a4d359564c0a8cf5a66643a1e579fc727fd329c967270394990e43acac0940ff4fc1d5275e054a1dd8de33"}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 588.018100] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x1, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)={0x87, 0x29, 0x1, {0xffffffff, [{{0x2, 0x3, 0x8}, 0x10000, 0x0, 0x7, './file0'}, {{0x22, 0x1}, 0x1f, 0x13, 0x7, './file0'}, {{0x21, 0x2, 0x5}, 0x1f, 0xff, 0x7, './file0'}, {{0xc6, 0x0, 0x5}, 0x7, 0x40, 0x7, './file0'}]}}, 0x87) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x200, 0x0) r6 = accept4(r5, 0x0, 0x0, 0xd532627358c48e0f) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$TUNSETCARRIER(r7, 0x400454e2, &(0x7f0000000080)) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) fcntl$getown(r3, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r9 = syz_open_procfs(r8, &(0x7f00000000c0)='attr/vscreate\x00') r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) ioctl$NBD_SET_FLAGS(r12, 0xab0a, 0x3) prctl$PR_SET_FPEMU(0xa, 0x2) sendfile(r2, r9, 0x0, 0x50000000000443) 03:34:53 executing program 0 (fault-call:1 fault-nth:48): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f0000000080)={0x89f32a3, "f255572ff206b6b349c4ae36fb116b69d54eec42dba7e57a164d88fed7511a80", 0x0, 0x1}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000000c0)={@local, @loopback}, &(0x7f0000000100)=0xc) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) [ 588.169423] FAULT_INJECTION: forcing a failure. [ 588.169423] name failslab, interval 1, probability 0, space 0, times 0 [ 588.181601] CPU: 0 PID: 24737 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 588.188644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.198028] Call Trace: [ 588.200699] dump_stack+0x138/0x197 [ 588.204349] should_fail.cold+0x10f/0x159 [ 588.208505] should_failslab+0xdb/0x130 [ 588.212492] kmem_cache_alloc+0x2d7/0x780 [ 588.216647] ? retire_userns_sysctls+0x90/0x90 [ 588.222564] copy_pid_ns+0x1ae/0xa40 [ 588.226302] ? refcount_inc+0x1f/0x40 [ 588.230115] create_new_namespaces+0x267/0x720 [ 588.234705] copy_namespaces+0x284/0x310 [ 588.238772] copy_process.part.0+0x2603/0x6a00 [ 588.243418] ? proc_fail_nth_write+0x7d/0x180 [ 588.247916] ? proc_cwd_link+0x1b0/0x1b0 [ 588.252019] ? __cleanup_sighand+0x50/0x50 [ 588.256246] ? lock_downgrade+0x740/0x740 [ 588.260421] _do_fork+0x19e/0xce0 [ 588.264239] ? fork_idle+0x280/0x280 [ 588.267972] ? fput+0xd4/0x150 [ 588.271180] ? SyS_write+0x15e/0x230 [ 588.274898] SyS_clone+0x37/0x50 [ 588.278265] ? sys_vfork+0x30/0x30 [ 588.281808] do_syscall_64+0x1e8/0x640 [ 588.285706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 588.290573] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 588.295772] RIP: 0033:0x459a59 [ 588.298958] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 588.306745] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 588.314010] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 588.321274] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 588.328545] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 588.335817] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:53 executing program 0 (fault-call:1 fault-nth:49): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 588.411933] FAULT_INJECTION: forcing a failure. [ 588.411933] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 588.423773] CPU: 0 PID: 24745 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 588.430785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.440136] Call Trace: [ 588.442723] dump_stack+0x138/0x197 [ 588.446354] should_fail.cold+0x10f/0x159 [ 588.450498] __alloc_pages_nodemask+0x1d6/0x7a0 [ 588.455175] ? fs_reclaim_acquire+0x20/0x20 [ 588.459494] ? __alloc_pages_slowpath+0x2930/0x2930 [ 588.464537] cache_grow_begin+0x80/0x400 [ 588.468593] kmem_cache_alloc+0x6a6/0x780 [ 588.472732] ? retire_userns_sysctls+0x90/0x90 [ 588.477311] copy_pid_ns+0x1ae/0xa40 [ 588.481012] ? refcount_inc+0x1f/0x40 [ 588.484810] create_new_namespaces+0x267/0x720 [ 588.489391] copy_namespaces+0x284/0x310 [ 588.493443] copy_process.part.0+0x2603/0x6a00 [ 588.498027] ? proc_fail_nth_write+0x7d/0x180 [ 588.502510] ? proc_cwd_link+0x1b0/0x1b0 [ 588.506604] ? __cleanup_sighand+0x50/0x50 [ 588.510847] ? lock_downgrade+0x740/0x740 [ 588.515008] _do_fork+0x19e/0xce0 [ 588.518474] ? fork_idle+0x280/0x280 [ 588.522192] ? fput+0xd4/0x150 [ 588.525383] ? SyS_write+0x15e/0x230 [ 588.529111] SyS_clone+0x37/0x50 [ 588.532471] ? sys_vfork+0x30/0x30 [ 588.536007] do_syscall_64+0x1e8/0x640 [ 588.539881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 588.544723] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 588.550160] RIP: 0033:0x459a59 [ 588.553336] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:34:53 executing program 0 (fault-call:1 fault-nth:50): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000002c0)={0x6, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x0, 0x4, 0x3d5d}]}]}, 0x4c}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xdca527a7507ae6ca}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10000010}, 0x4000045) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 588.561121] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 588.571764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 588.579022] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 588.586280] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 588.593538] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x1d}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) [ 588.662943] FAULT_INJECTION: forcing a failure. [ 588.662943] name failslab, interval 1, probability 0, space 0, times 0 [ 588.690614] CPU: 0 PID: 24753 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 588.697715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.707115] Call Trace: [ 588.709806] dump_stack+0x138/0x197 [ 588.713440] should_fail.cold+0x10f/0x159 [ 588.717588] should_failslab+0xdb/0x130 [ 588.721684] kmem_cache_alloc+0x2d7/0x780 [ 588.725833] ? refcount_inc+0x1f/0x40 [ 588.729650] alloc_pid+0x5d/0xc70 [ 588.733116] ? copy_thread_tls+0x3c8/0x7a0 [ 588.737360] copy_process.part.0+0x272f/0x6a00 [ 588.741978] ? proc_fail_nth_write+0x7d/0x180 [ 588.746575] ? proc_cwd_link+0x1b0/0x1b0 [ 588.750666] ? __cleanup_sighand+0x50/0x50 [ 588.755838] ? lock_downgrade+0x740/0x740 [ 588.759984] _do_fork+0x19e/0xce0 [ 588.763526] ? fork_idle+0x280/0x280 [ 588.767242] ? fput+0xd4/0x150 [ 588.770425] ? SyS_write+0x15e/0x230 [ 588.777606] SyS_clone+0x37/0x50 [ 588.780972] ? sys_vfork+0x30/0x30 [ 588.784510] do_syscall_64+0x1e8/0x640 [ 588.788401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 588.793260] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 588.798456] RIP: 0033:0x459a59 [ 588.801662] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 588.809372] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 588.816644] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 588.823916] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 588.831198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 588.838463] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:53 executing program 0 (fault-call:1 fault-nth:51): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 588.913321] FAULT_INJECTION: forcing a failure. [ 588.913321] name failslab, interval 1, probability 0, space 0, times 0 [ 588.925517] CPU: 1 PID: 24767 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 588.932561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.942004] Call Trace: [ 588.942026] dump_stack+0x138/0x197 [ 588.942050] should_fail.cold+0x10f/0x159 [ 588.942071] should_failslab+0xdb/0x130 [ 588.942087] kmem_cache_alloc+0x2d7/0x780 [ 588.942099] ? refcount_inc+0x1f/0x40 [ 588.948354] alloc_pid+0x5d/0xc70 [ 588.948378] ? copy_thread_tls+0x3c8/0x7a0 [ 588.948400] copy_process.part.0+0x272f/0x6a00 [ 588.948423] ? proc_fail_nth_write+0x7d/0x180 [ 588.948434] ? proc_cwd_link+0x1b0/0x1b0 [ 588.985338] ? __cleanup_sighand+0x50/0x50 [ 588.989562] ? lock_downgrade+0x740/0x740 [ 588.993706] _do_fork+0x19e/0xce0 [ 588.997145] ? fork_idle+0x280/0x280 [ 589.000846] ? fput+0xd4/0x150 [ 589.004052] ? SyS_write+0x15e/0x230 [ 589.007768] SyS_clone+0x37/0x50 [ 589.011125] ? sys_vfork+0x30/0x30 [ 589.014660] do_syscall_64+0x1e8/0x640 [ 589.018548] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 589.023389] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 589.028568] RIP: 0033:0x459a59 [ 589.031744] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 589.039439] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 589.046691] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 589.053942] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:53 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000140)={0x80000001, 0x2, 0x80000000, 0x5, 0x5, 0x3, 0x40, 0x9, 0x4, 0x9, 0x7, 0x8001}) r6 = epoll_create(0x0) r7 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) r8 = dup2(r6, r7) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000200)={0x5, [0xda, 0xfffffffeffffffff, 0x0, 0x0, 0x6]}) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000001640)=ANY=[]}, 0x1, 0x0, 0x0, 0xc400}, 0x4000881) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:54 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$SIOCRSGL2CALL(r4, 0x89e5, &(0x7f0000000080)=@rose) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r4, 0x10e, 0x8, &(0x7f00000000c0)=0xfd23, 0x4) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$LOOP_SET_FD(r7, 0x4c00, r0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r1, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) [ 589.061194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 589.068469] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:54 executing program 0 (fault-call:1 fault-nth:52): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 589.203444] FAULT_INJECTION: forcing a failure. [ 589.203444] name failslab, interval 1, probability 0, space 0, times 0 [ 589.215196] CPU: 0 PID: 24782 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 589.222238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.231628] Call Trace: [ 589.234233] dump_stack+0x138/0x197 [ 589.237863] should_fail.cold+0x10f/0x159 [ 589.242011] should_failslab+0xdb/0x130 [ 589.245978] kmem_cache_alloc+0x2d7/0x780 [ 589.250141] ? check_preemption_disabled+0x3c/0x250 [ 589.255152] alloc_vfsmnt+0x28/0x7d0 [ 589.258859] vfs_kern_mount.part.0+0x2a/0x3d0 [ 589.263344] ? rcu_read_lock_sched_held+0x110/0x130 [ 589.268353] kern_mount_data+0x56/0xc0 [ 589.272233] pid_ns_prepare_proc+0x1e/0x90 [ 589.276461] alloc_pid+0x9ef/0xc70 [ 589.280027] copy_process.part.0+0x272f/0x6a00 [ 589.284613] ? proc_fail_nth_write+0x7d/0x180 [ 589.289099] ? proc_cwd_link+0x1b0/0x1b0 [ 589.293181] ? __cleanup_sighand+0x50/0x50 [ 589.297754] ? lock_downgrade+0x740/0x740 [ 589.301900] _do_fork+0x19e/0xce0 [ 589.305349] ? fork_idle+0x280/0x280 [ 589.309055] ? fput+0xd4/0x150 [ 589.312287] ? SyS_write+0x15e/0x230 [ 589.316043] SyS_clone+0x37/0x50 [ 589.319503] ? sys_vfork+0x30/0x30 [ 589.324267] do_syscall_64+0x1e8/0x640 [ 589.328143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 589.332987] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 589.338166] RIP: 0033:0x459a59 [ 589.341355] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:34:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x7c04c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff81, 0x20000000002}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 589.349487] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 589.356751] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 589.364008] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 589.371270] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 589.378529] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:54 executing program 0 (fault-call:1 fault-nth:53): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 03:34:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x50000000000443) r4 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x40) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$TIOCGRS485(r3, 0x542e, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r5, 0x0, 0x50000000000443) [ 589.479886] FAULT_INJECTION: forcing a failure. [ 589.479886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 589.492426] CPU: 0 PID: 24790 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 589.499468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.508834] Call Trace: [ 589.511445] dump_stack+0x138/0x197 [ 589.515102] should_fail.cold+0x10f/0x159 [ 589.519265] ? __might_sleep+0x93/0xb0 [ 589.523195] __alloc_pages_nodemask+0x1d6/0x7a0 [ 589.527879] ? __alloc_pages_slowpath+0x2930/0x2930 [ 589.532931] alloc_pages_current+0xec/0x1e0 [ 589.537279] __get_free_pages+0xf/0x40 [ 589.541189] get_zeroed_page+0x11/0x20 [ 589.545098] mount_fs+0x1cc/0x2a1 [ 589.548568] vfs_kern_mount.part.0+0x5e/0x3d0 [ 589.548585] ? rcu_read_lock_sched_held+0x110/0x130 [ 589.548607] kern_mount_data+0x56/0xc0 [ 589.548625] pid_ns_prepare_proc+0x1e/0x90 [ 589.558112] alloc_pid+0x9ef/0xc70 [ 589.558160] copy_process.part.0+0x272f/0x6a00 [ 589.558194] ? proc_fail_nth_write+0x7d/0x180 03:34:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = dup(r3) write$USERIO_CMD_REGISTER(r4, &(0x7f0000000180)={0x0, 0x1}, 0x2) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000002c0)="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", 0x1000) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) setsockopt$TIPC_DEST_DROPPABLE(r7, 0x10f, 0x81, &(0x7f0000000140)=0x1ff, 0x4) r8 = accept4(r0, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) [ 589.578906] ? proc_cwd_link+0x1b0/0x1b0 [ 589.583012] ? __cleanup_sighand+0x50/0x50 [ 589.587268] ? lock_downgrade+0x740/0x740 [ 589.591444] _do_fork+0x19e/0xce0 [ 589.594919] ? fork_idle+0x280/0x280 [ 589.598656] ? fput+0xd4/0x150 [ 589.601858] ? SyS_write+0x15e/0x230 [ 589.605592] SyS_clone+0x37/0x50 [ 589.608958] ? sys_vfork+0x30/0x30 [ 589.608980] do_syscall_64+0x1e8/0x640 [ 589.608991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 589.621259] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 589.621274] RIP: 0033:0x459a59 03:34:54 executing program 0 (fault-call:1 fault-nth:54): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 589.621282] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 589.621299] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 589.621308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 589.621316] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 589.621323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 589.621330] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 589.725201] FAULT_INJECTION: forcing a failure. [ 589.725201] name failslab, interval 1, probability 0, space 0, times 0 [ 589.737063] CPU: 1 PID: 24805 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 589.744260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.753739] Call Trace: [ 589.756331] dump_stack+0x138/0x197 [ 589.760181] should_fail.cold+0x10f/0x159 [ 589.764351] should_failslab+0xdb/0x130 [ 589.769984] kmem_cache_alloc_trace+0x2e9/0x790 [ 589.774671] ? lock_downgrade+0x740/0x740 [ 589.778820] sget_userns+0xfe/0xc30 [ 589.784094] ? set_anon_super+0x20/0x20 [ 589.788066] ? get_empty_filp.cold+0x3b/0x3b [ 589.792464] mount_ns+0x6d/0x190 [ 589.795816] ? proc_get_inode+0x620/0x620 [ 589.800104] proc_mount+0x6a/0xa0 [ 589.803562] mount_fs+0x97/0x2a1 [ 589.806928] vfs_kern_mount.part.0+0x5e/0x3d0 [ 589.811417] ? rcu_read_lock_sched_held+0x110/0x130 [ 589.816479] kern_mount_data+0x56/0xc0 [ 589.820361] pid_ns_prepare_proc+0x1e/0x90 [ 589.824594] alloc_pid+0x9ef/0xc70 [ 589.828145] copy_process.part.0+0x272f/0x6a00 [ 589.832729] ? proc_fail_nth_write+0x7d/0x180 [ 589.837401] ? proc_cwd_link+0x1b0/0x1b0 [ 589.841472] ? __cleanup_sighand+0x50/0x50 [ 589.845712] ? lock_downgrade+0x740/0x740 [ 589.849929] _do_fork+0x19e/0xce0 [ 589.853373] ? fork_idle+0x280/0x280 [ 589.857074] ? fput+0xd4/0x150 [ 589.860262] ? SyS_write+0x15e/0x230 [ 589.863983] SyS_clone+0x37/0x50 [ 589.867340] ? sys_vfork+0x30/0x30 [ 589.870877] do_syscall_64+0x1e8/0x640 [ 589.874930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 589.879802] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 589.884995] RIP: 0033:0x459a59 [ 589.888447] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 589.896256] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 589.903531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 589.910806] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 589.918081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 03:34:54 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xfffc, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x200001, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000100)={{0xe4, 0xf8, 0x2, 0x7, 0x3, 0x7}}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$alg(0x26, 0x5, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001300)={0x0, 0xffffffffffffff6c}}, 0x0) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r10, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r12, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) getsockopt$nfc_llcp(r10, 0x118, 0x4, &(0x7f00000002c0)=""/4096, 0x1000) sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$VIDIOC_ENUMAUDOUT(r8, 0xc0345642, &(0x7f0000000140)={0xffffffff, "fd1fee3a74156f02f6cd88de60b4c73632f105414857930a18c326e7526432fd", 0x2, 0x1}) r13 = accept4(r5, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) setsockopt$inet_sctp6_SCTP_NODELAY(r14, 0x84, 0x3, &(0x7f0000000040)=0x6, 0x4) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0xb660f02459c09b00) r15 = socket$inet6(0xa, 0x2, 0x0) r16 = fcntl$dupfd(r4, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 589.925353] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:54 executing program 0 (fault-call:1 fault-nth:55): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 590.011924] FAULT_INJECTION: forcing a failure. [ 590.011924] name failslab, interval 1, probability 0, space 0, times 0 [ 590.023534] CPU: 0 PID: 24817 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 590.030770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.040147] Call Trace: [ 590.042768] dump_stack+0x138/0x197 [ 590.046433] should_fail.cold+0x10f/0x159 [ 590.050607] should_failslab+0xdb/0x130 [ 590.054589] kmem_cache_alloc_trace+0x2e9/0x790 [ 590.059322] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 590.064761] ? sget_userns+0xfe/0xc30 [ 590.068549] ? rcu_read_lock_sched_held+0x110/0x130 [ 590.073563] selinux_sb_alloc_security+0x46/0x220 [ 590.078579] security_sb_alloc+0x6d/0xa0 [ 590.082635] sget_userns+0x196/0xc30 [ 590.086341] ? set_anon_super+0x20/0x20 [ 590.090414] ? get_empty_filp.cold+0x3b/0x3b [ 590.094820] mount_ns+0x6d/0x190 [ 590.098193] ? proc_get_inode+0x620/0x620 [ 590.102348] proc_mount+0x6a/0xa0 [ 590.105812] mount_fs+0x97/0x2a1 [ 590.109230] vfs_kern_mount.part.0+0x5e/0x3d0 [ 590.113755] ? rcu_read_lock_sched_held+0x110/0x130 [ 590.118787] kern_mount_data+0x56/0xc0 [ 590.122680] pid_ns_prepare_proc+0x1e/0x90 [ 590.127052] alloc_pid+0x9ef/0xc70 [ 590.130598] copy_process.part.0+0x272f/0x6a00 [ 590.135177] ? proc_fail_nth_write+0x7d/0x180 [ 590.139704] ? proc_cwd_link+0x1b0/0x1b0 [ 590.143769] ? __cleanup_sighand+0x50/0x50 [ 590.148015] ? lock_downgrade+0x740/0x740 [ 590.152185] _do_fork+0x19e/0xce0 [ 590.155646] ? fork_idle+0x280/0x280 [ 590.159373] ? fput+0xd4/0x150 [ 590.162573] ? SyS_write+0x15e/0x230 [ 590.166320] SyS_clone+0x37/0x50 [ 590.167146] selinux_nlmsg_perm: 81 callbacks suppressed [ 590.167158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 [ 590.169703] ? sys_vfork+0x30/0x30 [ 590.175630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 [ 590.187133] do_syscall_64+0x1e8/0x640 [ 590.187146] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:34:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r10, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r10, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r10, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) r12 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r12, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) poll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x4004}, {r5, 0x1}, {r6, 0x8000}, {r9, 0x1}, {r10, 0x80}, {r11, 0x10000}, {0xffffffffffffffff, 0x4}, {r1, 0x400}, {r12, 0x8000}], 0x9, 0x7fff) [ 590.187174] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 590.187187] RIP: 0033:0x459a59 [ 590.187194] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 590.187207] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 590.187214] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 590.187220] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 590.187227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 590.187234] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 590.237792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 [ 590.281102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 [ 590.293702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 03:34:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000080)={0x9adb, 0xb, 0x4, 0x8, {0x77359400}, {0x3, 0x0, 0x0, 0x77, 0x0, 0x1, "b2adc16e"}, 0x0, 0x0, @offset=0x200, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r5, 0x0, 0x50000000000443) 03:34:55 executing program 0 (fault-call:1 fault-nth:56): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 590.306223] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 [ 590.330747] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 [ 590.356093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 [ 590.387987] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 [ 590.400813] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24813 comm=syz-executor.2 [ 590.403825] FAULT_INJECTION: forcing a failure. [ 590.403825] name failslab, interval 1, probability 0, space 0, times 0 [ 590.426140] CPU: 0 PID: 24838 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 590.433251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.442614] Call Trace: [ 590.445213] dump_stack+0x138/0x197 [ 590.448856] should_fail.cold+0x10f/0x159 [ 590.453015] should_failslab+0xdb/0x130 [ 590.456989] kmem_cache_alloc_trace+0x2e9/0x790 [ 590.461650] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 590.467088] ? sget_userns+0xfe/0xc30 [ 590.470876] ? rcu_read_lock_sched_held+0x110/0x130 [ 590.475887] selinux_sb_alloc_security+0x46/0x220 [ 590.480722] security_sb_alloc+0x6d/0xa0 [ 590.484786] sget_userns+0x196/0xc30 [ 590.488489] ? set_anon_super+0x20/0x20 [ 590.492459] ? get_empty_filp.cold+0x3b/0x3b [ 590.496859] mount_ns+0x6d/0x190 [ 590.500229] ? proc_get_inode+0x620/0x620 [ 590.504368] proc_mount+0x6a/0xa0 [ 590.507809] mount_fs+0x97/0x2a1 [ 590.511173] vfs_kern_mount.part.0+0x5e/0x3d0 [ 590.515658] ? rcu_read_lock_sched_held+0x110/0x130 [ 590.520670] kern_mount_data+0x56/0xc0 [ 590.524644] pid_ns_prepare_proc+0x1e/0x90 [ 590.528871] alloc_pid+0x9ef/0xc70 [ 590.532442] copy_process.part.0+0x272f/0x6a00 [ 590.537022] ? proc_fail_nth_write+0x7d/0x180 [ 590.541506] ? proc_cwd_link+0x1b0/0x1b0 [ 590.545570] ? __cleanup_sighand+0x50/0x50 [ 590.549795] ? lock_downgrade+0x740/0x740 [ 590.554027] _do_fork+0x19e/0xce0 [ 590.557472] ? fork_idle+0x280/0x280 [ 590.561184] ? fput+0xd4/0x150 [ 590.564385] ? SyS_write+0x15e/0x230 [ 590.568184] SyS_clone+0x37/0x50 [ 590.571538] ? sys_vfork+0x30/0x30 [ 590.575071] do_syscall_64+0x1e8/0x640 [ 590.578946] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 590.583785] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 590.588962] RIP: 0033:0x459a59 [ 590.592139] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 590.599848] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 590.607194] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 590.614468] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 590.621724] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 590.628982] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="30020000", @ANYRES16=r5, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000080)=0x7000000, 0x4) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r6, 0x0, 0x50000000000443) 03:34:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x863, 0x484180) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000400)={0x0, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000100)=0x8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB='\a\x00\x00U', @ANYRES16=r7, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0xc4}, 0x8000) ioctl$sock_SIOCGIFCONF(r5, 0x8912, &(0x7f0000000140)=@buf={0x1000, &(0x7f00000004c0)="5eb72474bef8cf664ea84e48c7eda52f16a741b60ca7509e741134342c833469808aa269e4e0cb1bbd182d7753e561b3adc505b37d888165fd5cc99a5a7dd826330c08326bb42d099106d8a691ff290af6bdd49ee850a547d8210dd934aae12e3986b6f50c22c9bd65020ba2e2359af7c38dac1328836b090b719d363d8b955f32afa807fb26595d6d101d29fea3e97f76bd1a1e49944eb237b06a756d814523fc8f6e6bd94e9d4b8b1c824e344d7f268002a16d8d28b5f579a6c5add23a2d23e14040bf3f7f8c16e7533ccf5ef67ccecc3f749ea69ba8e993dd35341ee55b870053600255dae7de7f64cb0fd2ee6a1c95b4292b99095b6dd5e30f58f83e4d11f6bbefc2739ae789d0f8e6c9d011dd88176f329efae9711559d18ecc44fae162c9d3d0607a7fcbbd1715c02176ea427f07d6245c5dbe348aacb38a51d27f15b6b6d94ba325a9d234701f35d5264ce9158aff523331faccdd1296b3dbefc021727821cdf53815960b3e1a56c3457b6843494eb6456e4934ff59504a80cdeb457c54e5dbb78f47479246089434b5bd57b9092ef9457e79e8206a94fcc5d789e1a2998423ab85ee50c3a070c97b2d617ddde56dbdc8662aa6916dff276d46c96931e2420538f2ba4cac476355f45ecdcc44a91a4f14e177c1dec40d64f014548523a78194a4a02d5e940c2ce14047e5f12dd37b84e7a612e2dce14a53741e3f771769bb73897711192c6394ba5c33d82fc9f330e29d8438c1a74149140998514b403fe91c8da2cb62119d0190b2da496222505b22bf6ce0f6d2e4051f72db33c2a058a68728a9df2757c412e1a19137adba109406d4244656e292e4a6089e20e947cdaf74112c00601b8561df7ac895ef371abad8d99d88b40b1c734f824779e5e9cdebb89b253a65f21887c89d662e9ef2415a99593f11ac45ee10a3eeb28ee48ac6126065faac827a27423a8dc40193d7606e230bfb2b3629e5ae4afd250e8fb6639b63c9ea30e80c9479a109a3e1c02dbe8f562dbc5dc3581ee49a927ff42cfff351224a3a3ad42eeee2376293fed3fce1c19fde39efe0964577a14fc28d08eebd42e75d36445e6ef8639988c29d65f8190b2801b22d0693d328428d9761fc110a34f0221c104fa8fb7d1873ff15201780b487c3294bb4f5efd335ae9735d06375b15e779954bf7636af15f1604650575581d12032044cfc3bd46bd9e0de48a37500577a6f0ccf26da78ae771a7ba900b7004e6efa9d15baed132e2375a9f7b80aeb1a53586846cb20dd94c56c8af9ecc0f14815595ac511a5a2d99b1c7ce555cc8cfdbf0212451d6524e5c93b9ba36e8a1946925fc7899510da1d294de5740bf92d635c21923675433b718f798e51d9051ae0d1131e2f415cdefa6ff5e85e15139a47e67404ef0a61b2194f50d7ad362ded96a0c3225a3ec3eba70fec74a16d80046d25cc89b280060ef2ceb03f6bed5c7a0a4d88dcd6cc6d1fd1e0512bcf483a1f441bbbffda4df6281da05a64a5a62c5948d199ddee13b65f6e2dc78539c798155928f187dfc122d0147d948963a4dffa98048a7c30a0c189233431d75dba13c80b49314c31b091f5319eb20fa83cd4589ddbb230b4106fef8246c865bce8e9d48df0395dafb3bc7dc6086cd8cc47142daa87334f3a2ad03f4f6ff92e2a5193471af1f580b1892486446ad2ca36f6e9d261210559f5d7020b2c84ea25e3701dfe2a7292bfe20ef6ef54e6be3d1d8ec6d20700e4d59d53e893bdb8095e771fc4beb5060c781048c9247b619e93db9f6facf386f7214ade1a04a1cbde346174488e52914d469c8281fd796b117f4c01dba410685003b2972e500c18dd40f6cf89bf44f47d70e86a450e2974c111598dd8914d00787f57f83290bb9d94876399f74ea4830b6d0cddf5eec2012b9b811a8938f39217d11d2538c31fd60b9d7820e6c658cf48e8ea29035a11e6d196cf77c63ccabd7738df04d9d383c9ffaf21b271c47bb9ec01d9af8e8762815ce97d3d9d7198b63bee539e86f22c5d3e3d3b41f972a544dbf3c671dae631b0b54a867fd365674cf6427ded5e8f6024491b6dacf6404cd02ed57fcf50b08246ff93259b706b6d2510a87acf212413ca90b6f52879e12560692aa0bd317c592a43034b37110dd30f60d18ab6eaa2bf98dd83e9a72b6d6bf6993d3faf0200cddd6782a3ec8d8e20b158d6dbad5c9e27c751858b452f3f0031fa8778f6d3a0e086a62f19fbe969915712adb24448407d1e5d1f276c281f78c1056889b9ab4ce00b7442be91878eef68a666accfc99dfeae76cd09021ff65dc01bca5124332b92d015778bd49af013e0ab1fb45749d53a6211a1df0a970a5785bd5185d62df674dd2ea5554d0cba951497da15900ffdb52a0795b01652f69a893e1bb0756f9a6fc1e7a2e21a3b92762fc00c9387fafe1a628713049948deaf989827f20ee3902e1234f1574105941cff01e2e6eebed2f64bacbc7c0f6ffe5ca683bf5b364de72d80a25cfe0955246858afa45570fd80ec52596d54df7e2bfec990125bae3c2e0c9262147ad3798d8e714f8e1441bb2f84b8024bf3c0eab801b3713ae4d19cb185e6046e1351183640e50798db608a9059eae51e4edeb99e6f9ecf23f57b69c3a11bb238bf96181ca66fe34f47a4bd4d17bf40d5b6071fda203cae43e82dcd42080f2dc3cee4a6305eaec3ce628074404470110b461494dfe591509389fa65734afc746a2eb79ce40bd005144ab866e8940965923f4d9cb03da082a3b80b7fd1fee1c688b03a4e4588b15a5b40e9398f707b5e5fc2c8e19361bf17aa3597e20ce4ecf9578bcad5129c26d0772bcce2665a2ec155a4c906804d0800da9175762153523529f9198108b59895d65ee1287a456cbddd9df77cfa68444c76152f572e30a29cdfed2744e678f40b0dffba3e9d5356add0c07113c65dbc47cf5e64f13d75844b28e6632c57dd115beb0a06f6af7b159cfa978d323d96a910a7550cdce3bb9ced305660eb8daed06f59d9e01e295c7f9f9ce0eb0384123fac22fe4aa48b2a7f41e3c144953f8b781289f045ccf4095994b909fe24a76159353bc5352055c6ea9f2b07307d2636f83e03d8d13ae391a71c9bd757d614a610398ecdf50447f4084b2323c6db8b18e4072e7382a87d8075aecf8bd030ac06a47bac7f7415cb6086f3e9345db9f4740cdecb027f6c1d6ef68dd86222d52c985978564d58c3564488d317a3b1839b94e5e3166ba0722b4b5be8e63f4c101b91f3b4454cce7c983b2d0e9ff8d989f32a2850dffe0f2e7190b8b5a1783506f37f111cfd1ce34a6caf87470412c5052fc55f9f2dbd1c36e7892240c838566289fe60d0b72257ee242f1d719a04ecb19b96464e6518528dc936140a420fd58bea563ee2cb08160f2bbbbe93196f597892f562cec163b97929432cca34a4acfc97f2fdb3f75b8cf651da0ec8a80a2134648c68f1119c4fc67a3fab09ee09c0ceedc4061b347e4195dcfe44e0db32ef737d84896080338b421c0634de022a42a0fcc7c727f05b41c5b08cae387db432008f5ac973de2cf4b4593b719239fdc83c9e86c5a068c567f2b61ae361bb90fe07e0fd9d6ec20fb441575fa91a12644061c13c16899c21ea72710c12e498208e9299cdec4ff52f855ded139a8dd068d96deab241d38677e01c125d8910416c4e47a31a4f8947cafe49a59a71dceccd18455338c63930a3333d8a3abe4c3ae2b95e172194372f994ad13490edfb0e9180e71adfe2bc63956f80be6bd3f3f76a54bb04de614be28547b36281688f548b8320d64f3c312c2654f7efad8f55b198d104daa84ee9bdfe513c7166770860363d5eca0e9c10471d793381162ddc5f4ef44e7dbd3360f5149c6bf15c9ee0c0c6367386bc31ab5ecbd8166d9c4818a046c0822c74da5017352735cf0a2167417bd8d962e9900538134d4a7b44db9c99697bee7397c5c87839004b845e367e38136713adf1362c3cb814fc3560abcd3ed840cb7aa54345fd1ec968f2e6bbe16f68503a983d4998cf694451bd740683c12e22cee1f6910dd505e3fe8a08ea617264417bdffc93a6d7a08d548d2d6e89809d51b3da381bdca5d1155f89e522a48b86f2d5f00bd5d983fd15e20d619e8df3e81b73114330c1ba73c3e0117721746c2c71483a15fa5f68c5d0b363e9c96da11990b2e535ee6aef495d3c8112ee578d08fa5a033b78050b15ec756c8fd7110c4de7d8f4105c022899ab4269952070ec34dadea4bba0ff690c23c826b0f0b84f1a3fc969e88bf30f184501599a677cbc4d4357752928d2aba42b7810ddd3ca7262b03d65cbdba1a188dac789264dc9a55a3868b279b2f946bacfdd4ac83f12b12886e4973651b65fc7fb31036a3eaef880793c9342cc33a03ee37af4a11e3896a168e09562b027c5c31e9d8d2f0640818a6bc054a696fad23df79a186e69a6f2716b22787d6b56b68be2e5b4374881edc0ff12eff1c2b7fd8f43866c9bc9bbc519188ba2dd5acb09095b03f6a7ee6ff5cc5505265316b6399b8fd53e9a8762e1ba7414638a9e422a660e754ed5c6b53ab95fe4ebab6f1f0d2386e876405e28394767127c9772a89f55e62006598ae6a38c3402b8d7cdc097971a69ad3c8917db40efdebd06078284b0c085498e3f4443d33a1518a61ab719630f35aee8ef19148e511d00c413e5d0fde09ddf88e53300afc17a4c01db22bf1abb5bdeb703ad179aa8b526e6daa80de325c139e8a9ffd9e79b0ca0c9e2b08237de68cd4b83def5b903a5b16e92e369c874b285160860b46e7acbc92667e93a120d99e268cba0aafd79de57196e0f33d3887bf94eeca1b959851813aea9a70fca8818456005865a2e8c7ab73336bfd6c7f7366c277d39231654b0c9eb752a344d5a1977fd2baf9d179b37fbb760ecbb1d991ade28fcfac622355311f63175e3b7ba9ca2bc5e46538c6d391c068814f0228210ce99e5e9af2b1c581e5271f6a6b438f481a4e67dcebe004645e89987335b782be0ceb1f5444c882af3b8666f475563246f12fbe15ed486204b0711090077a090479c407d210fe8545879c91ffbbc734c2cb699f280e888b68ba90303bc6a5c24f1fe28efe1f1784d71c6e643b531ab4c7229a1f91a18b005f52bbcf2c8c739370334c8402b381178cfd9403e879441849059e17ac364acdf96a5c8097114da97c02f3171fae2652c580a13b5ca03b0d34438619ec93f3d1d4f6565086f0afb8b82830efe07d36a1fbc8367d6fdb942ecd78b6013da8cf6ea1279123aee53ebe7487d3dac3a09d8efde92b23329b2b7b18847cfee6b3244aed17c4ce701c59d6fd4eb3e4c07529e5d2adebe86a434a9efac9854aa03c7b7bf35781d7aff01b82e9b7014dc4a24c326995c9ed222c331b6c6683192b0b860ebb492fa90d556cab2fa35c8369bbdb871ccba261e2d876017d0a5c579c4882264eccb216974e1dd79a5b79d3d7fb5ea408d58699b9bd6d40a617a16032fd1d0365378486af375b7f5dab26ee4cc552ec9ac0fe3d656d7fce820f24dddce7d56113ce2bf103c6732200c768de12a84dff9e171c787232c70b84fc3dd490ba3988b1332b32199efc4e9bbed383a85654cdee63215e7404d73c8d7066204b70a781b8e4f67d09e716cc803e0eb15825557c0107a634d4dfcedcd4f141ee7a9b3e730094da2e506b22eb10075e98847f14a585c7a245bb18adde2cfd971987a93cc5590609d944d9c6b161729d178c0587880aaaaa251c8591a2f2bc61fb2f4e55cbfdefa485aefbcdd0fdfc262f8b5e50c"}) 03:34:55 executing program 0 (fault-call:1 fault-nth:57): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 590.749676] FAULT_INJECTION: forcing a failure. [ 590.749676] name failslab, interval 1, probability 0, space 0, times 0 [ 590.761689] CPU: 1 PID: 24855 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 590.768724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.778087] Call Trace: [ 590.780698] dump_stack+0x138/0x197 [ 590.784351] should_fail.cold+0x10f/0x159 [ 590.788516] should_failslab+0xdb/0x130 [ 590.792497] __kmalloc+0x2f0/0x7a0 [ 590.796053] ? __list_lru_init+0x6b/0x660 03:34:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x0, 0x1, &(0x7f0000ffe000/0x2000)=nil, 0x20}) sendfile(r1, r2, 0x0, 0x50000000000443) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000400)={r5, @in={{0x2, 0x0, @loopback}}, 0x5, 0xe1ae, 0x2, 0x8}, 0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000002c0)={r5, @in6={{0xa, 0x4e21, 0x50b, @rand_addr="46060b48b212e5a2ae4e01b3cc964e52", 0x4}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r6, 0x1, 0xffffffff, 0x7fe0}, &(0x7f0000000200)=0x10) [ 590.800210] __list_lru_init+0x6b/0x660 [ 590.804291] sget_userns+0x4e0/0xc30 [ 590.808003] ? set_anon_super+0x20/0x20 [ 590.811987] ? get_empty_filp.cold+0x3b/0x3b [ 590.816400] mount_ns+0x6d/0x190 [ 590.819770] ? proc_get_inode+0x620/0x620 [ 590.824005] proc_mount+0x6a/0xa0 [ 590.827463] mount_fs+0x97/0x2a1 [ 590.830839] vfs_kern_mount.part.0+0x5e/0x3d0 [ 590.835339] ? rcu_read_lock_sched_held+0x110/0x130 [ 590.840366] kern_mount_data+0x56/0xc0 [ 590.844259] pid_ns_prepare_proc+0x1e/0x90 [ 590.848501] alloc_pid+0x9ef/0xc70 [ 590.852058] copy_process.part.0+0x272f/0x6a00 [ 590.856656] ? proc_fail_nth_write+0x7d/0x180 [ 590.861154] ? proc_cwd_link+0x1b0/0x1b0 [ 590.865232] ? __cleanup_sighand+0x50/0x50 [ 590.869473] ? lock_downgrade+0x740/0x740 [ 590.874270] _do_fork+0x19e/0xce0 [ 590.877737] ? fork_idle+0x280/0x280 [ 590.881460] ? fput+0xd4/0x150 [ 590.884656] ? SyS_write+0x15e/0x230 [ 590.888553] SyS_clone+0x37/0x50 [ 590.892017] ? sys_vfork+0x30/0x30 [ 590.895559] do_syscall_64+0x1e8/0x640 03:34:55 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x8}) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000080)={'syzkaller1\x00', 0xffe0}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 590.899454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 590.904308] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 590.909498] RIP: 0033:0x459a59 [ 590.912687] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 590.922067] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 590.922148] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 590.922154] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:55 executing program 0 (fault-call:1 fault-nth:58): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 590.922160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 590.922166] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 590.997276] FAULT_INJECTION: forcing a failure. [ 590.997276] name failslab, interval 1, probability 0, space 0, times 0 [ 591.011806] CPU: 1 PID: 24876 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 591.018883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.028233] Call Trace: [ 591.030926] dump_stack+0x138/0x197 [ 591.034566] should_fail.cold+0x10f/0x159 [ 591.038720] should_failslab+0xdb/0x130 [ 591.042687] __kmalloc+0x2f0/0x7a0 [ 591.046216] ? __list_lru_init+0x6b/0x660 [ 591.050707] __list_lru_init+0x6b/0x660 [ 591.054675] sget_userns+0x500/0xc30 [ 591.058387] ? set_anon_super+0x20/0x20 [ 591.062352] ? get_empty_filp.cold+0x3b/0x3b [ 591.066753] mount_ns+0x6d/0x190 [ 591.070110] ? proc_get_inode+0x620/0x620 [ 591.074261] proc_mount+0x6a/0xa0 [ 591.077716] mount_fs+0x97/0x2a1 [ 591.081073] vfs_kern_mount.part.0+0x5e/0x3d0 [ 591.085551] ? rcu_read_lock_sched_held+0x110/0x130 [ 591.090561] kern_mount_data+0x56/0xc0 [ 591.094443] pid_ns_prepare_proc+0x1e/0x90 [ 591.098662] alloc_pid+0x9ef/0xc70 [ 591.102202] copy_process.part.0+0x272f/0x6a00 [ 591.106786] ? proc_fail_nth_write+0x7d/0x180 [ 591.111280] ? proc_cwd_link+0x1b0/0x1b0 [ 591.115349] ? __cleanup_sighand+0x50/0x50 [ 591.119584] ? lock_downgrade+0x740/0x740 [ 591.123780] _do_fork+0x19e/0xce0 [ 591.127263] ? fork_idle+0x280/0x280 [ 591.130980] ? fput+0xd4/0x150 [ 591.134179] ? SyS_write+0x15e/0x230 [ 591.137898] SyS_clone+0x37/0x50 [ 591.141363] ? sys_vfork+0x30/0x30 [ 591.144916] do_syscall_64+0x1e8/0x640 [ 591.148799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 591.153651] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 591.158840] RIP: 0033:0x459a59 [ 591.162031] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 591.170271] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 591.177543] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 591.184806] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) fsetxattr$security_capability(r3, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0xfffffe69, 0x5}]}, 0xc, 0x2) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) [ 591.192067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 591.199345] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:56 executing program 0 (fault-call:1 fault-nth:59): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 591.288029] FAULT_INJECTION: forcing a failure. [ 591.288029] name failslab, interval 1, probability 0, space 0, times 0 [ 591.301379] CPU: 1 PID: 24886 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 591.308414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.318369] Call Trace: [ 591.320974] dump_stack+0x138/0x197 [ 591.324618] should_fail.cold+0x10f/0x159 [ 591.328880] should_failslab+0xdb/0x130 [ 591.332858] __kmalloc+0x2f0/0x7a0 [ 591.336395] ? __list_lru_init+0x6b/0x660 [ 591.340542] __list_lru_init+0x6b/0x660 [ 591.344511] sget_userns+0x4e0/0xc30 [ 591.348210] ? set_anon_super+0x20/0x20 [ 591.352182] ? get_empty_filp.cold+0x3b/0x3b [ 591.356676] mount_ns+0x6d/0x190 [ 591.360032] ? proc_get_inode+0x620/0x620 [ 591.364182] proc_mount+0x6a/0xa0 [ 591.367642] mount_fs+0x97/0x2a1 [ 591.371008] vfs_kern_mount.part.0+0x5e/0x3d0 [ 591.375507] ? rcu_read_lock_sched_held+0x110/0x130 [ 591.380546] kern_mount_data+0x56/0xc0 [ 591.384435] pid_ns_prepare_proc+0x1e/0x90 [ 591.388659] alloc_pid+0x9ef/0xc70 [ 591.392213] copy_process.part.0+0x272f/0x6a00 [ 591.396802] ? proc_fail_nth_write+0x7d/0x180 [ 591.401297] ? proc_cwd_link+0x1b0/0x1b0 [ 591.405366] ? __cleanup_sighand+0x50/0x50 [ 591.409641] ? lock_downgrade+0x740/0x740 [ 591.414586] _do_fork+0x19e/0xce0 [ 591.418053] ? fork_idle+0x280/0x280 [ 591.421862] ? fput+0xd4/0x150 [ 591.425042] ? SyS_write+0x15e/0x230 [ 591.428755] SyS_clone+0x37/0x50 [ 591.432129] ? sys_vfork+0x30/0x30 [ 591.435682] do_syscall_64+0x1e8/0x640 [ 591.439642] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 591.444585] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 591.449769] RIP: 0033:0x459a59 [ 591.453055] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 591.460775] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 591.468041] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 591.475307] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 591.483398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 591.490658] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:56 executing program 0 (fault-call:1 fault-nth:60): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 591.582802] FAULT_INJECTION: forcing a failure. [ 591.582802] name failslab, interval 1, probability 0, space 0, times 0 [ 591.595114] CPU: 1 PID: 24895 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 591.602274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.611646] Call Trace: [ 591.614767] dump_stack+0x138/0x197 [ 591.618400] should_fail.cold+0x10f/0x159 [ 591.622552] should_failslab+0xdb/0x130 [ 591.627046] __kmalloc+0x2f0/0x7a0 [ 591.630598] ? lock_downgrade+0x740/0x740 [ 591.634738] ? register_shrinker+0xbd/0x220 [ 591.639079] register_shrinker+0xbd/0x220 [ 591.643242] sget_userns+0x9bf/0xc30 [ 591.647047] ? set_anon_super+0x20/0x20 [ 591.651045] ? get_empty_filp.cold+0x3b/0x3b [ 591.656773] mount_ns+0x6d/0x190 [ 591.660126] ? proc_get_inode+0x620/0x620 [ 591.664278] proc_mount+0x6a/0xa0 [ 591.667726] mount_fs+0x97/0x2a1 [ 591.671117] vfs_kern_mount.part.0+0x5e/0x3d0 [ 591.675831] ? rcu_read_lock_sched_held+0x110/0x130 03:34:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0xffffffffffffffd2, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000000000, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='procem0eth0\x00') r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r5, 0x0, 0x50000000000443) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080)={0x0, 0x8}, 0x8) [ 591.680843] kern_mount_data+0x56/0xc0 [ 591.684715] pid_ns_prepare_proc+0x1e/0x90 [ 591.688950] alloc_pid+0x9ef/0xc70 [ 591.692496] copy_process.part.0+0x272f/0x6a00 [ 591.697093] ? proc_fail_nth_write+0x7d/0x180 [ 591.701602] ? proc_cwd_link+0x1b0/0x1b0 [ 591.705682] ? __cleanup_sighand+0x50/0x50 [ 591.709916] ? lock_downgrade+0x740/0x740 [ 591.714081] _do_fork+0x19e/0xce0 [ 591.717543] ? fork_idle+0x280/0x280 [ 591.721287] ? fput+0xd4/0x150 [ 591.724478] ? SyS_write+0x15e/0x230 [ 591.728199] SyS_clone+0x37/0x50 [ 591.731565] ? sys_vfork+0x30/0x30 [ 591.735126] do_syscall_64+0x1e8/0x640 [ 591.739007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 591.743870] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 591.749048] RIP: 0033:0x459a59 [ 591.752233] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 591.759942] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 591.767224] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 591.774494] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:56 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$VHOST_GET_FEATURES(r8, 0x8008af00, &(0x7f00000022c0)) r9 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x2, &(0x7f00000001c0)=[{&(0x7f00000002c0)="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", 0x1000, 0x800}, {&(0x7f00000012c0)="cef4df8e3fbaa33020e3ba8417d0919b8b581ffeafb9ad4f0327fad83243f209cdbe8ab2444f6064f50a6d3f9217ce67db4838fec11b935060543e5b42bd4ba32d62acfc56b55c72b5a699315937a21aad091f9e1270850020f42d350c2fad5da5929a2a5a04e89cf50ba0e4d47e8ddaf3f062c4c6052d7e7a668ad87fd95806b1df58d6449e8fc6dc43c67c51f25742fb65c55eaa83aa9e82ea460227264387cf9f1b3cc1bf839ee19158e4e3ffe1c0ce658e326cbeb9b348ac60418004fc3fbab06e1ba5aae5df6f6fb331aab0337ddc16fc862d2dd2222c5241babaecd49e0d48ffbceb43301a3c6deccd7b624fe4264babc36bb28b660ddda2ca6da16936b42b0a18315ecc215189966bbd5d1054d060f2f5ad83959ac9aa8bf2ed176b2fa1bd9693e1e5bbb11aabf3670a35e1d969759616a25fa8fc0ec7a68aeb70b56f68636f52a8e04099ed0bf1a5a34aedc29bcae939405d21ffaa31e7ad008b5f3b983a445f6179a9a69cfc1b08a2fa1afb661127dc9972eb488717b02c271c13e006df19c94f099c4d45aa7ba1fd94199f693f54f601189b887412787b2b66797a861eff49137a9361284dc169096eed85ddc3e6a23090dfdab662f33e46fac05dfa32f67476561867018ba454e5f0430fef6e0a04179e5c9ebe85160443e970caa609e5abf6e794036a42fed0789ac9eb79ccafc48f0f103af07cf3acb324aab7ed7b3973b248be43a0f044a9674c4a06517e651124e2955932ecb7370c324847bb85d9f7de38ca2fa7febd62d3ab192cd4c84b616ea3e56255e8b038d33d1af1d62ebee79d49483b0c8cd8f158e4f29bcfcba0cfae3423e479184b8c5e1f07bbb77b5829f3e38e42e365b6ff7d9126eb93b838f4180ec8accd96d44e4c9403e8baf0c46c2bf9d7e052f4574244f584ee293fdedbe4e25afda28405bd5f48384702153cabab5e8b502e0e43d1b3ce802684a5bc11b9997ab4555682ce98b7cb921778ee41a7192cd4e55647c8bdd4d5b34d5cf6bd79a4d592cd8b64232e3df7f5ef47454ea2a76439e2850167f69a2c6c2f6b67902ea18517edb04526f6bc21988a9408708412adf2cc4861d6ac94e4791d7baea6326bfb07ef0032c4ad638b05b7bf990bbb0ac105c8e51d61e840af245db70b0625b15bf781e8b9774ea84a2674d48436a49ebe21d042b52c9a2322413d82f2299928af5518ae564693c11ba6c7d9e3d12e7b56756d108309e96e73d81ca97106ac887d58ec6e58a317e8c1c8a92a4b1ad9d3bfe358c0fddf832d6e6d5d500666ccd4f5e6a8f97e42b2fa65ed51999186bc257c47099329a8084d0bd311ec4e7c09cd5e368116bb435d13091960c8051d8b633f17b0715f24c8b3b331a43f5487b49361b4eb95826ee4d0b4dc92672646c616f21b3c482d61b847dd6034443e46663d2fd94c5a002dce6f15b38a2fb57b0ac202ae64af1a4e94e341ff5c7137390163ed6455bf87a7d06cf1dfab14ef25fd4ad2fc93935518b5f1737a73c1c4b1a918a8808adfea604b590a552d436201eeb9b4c6397fb831121893c3f224991446b4d9ae9ec3ef695144db0fbc76f6a471586b4f465d57be92ddc76c252dea08b4c4d4896124478f3b32b52f5df5a1503e77b82456aad02c4e30159590f48bb9bebe3615cb08f9d11d9e1f459b1b37a4af140f027280ebd727a59534b8f26840bbdf09f65f541f87c80f09c34f6a16425f980f419b371638d584ff9dd198bc1d2c540f0dad85bfabb9cb9b6d2268ac80818c73b3a843d8c76469bedd1b71420a282014959f42068daaf18fe07570efeaa4f18e5de7902cb4fc4e96995847416f1484765704e67eb206607659774bb3df522d38d2ba9c87447ba51f3f3ca2d169c9d2dca088f7b78355ace662c2b80f67580e528b068c47e1fb77c53ac195d390a273d0a2777ea6aeee34b01e57fb951d26f4a7a5f7ff999bfd36bef88a6b1d28106c5f5b50792105211ee27e2cbf38a61276c99d6e7e852fcfeb5613e668fcc6019a6e390c0f221fd498578a6a152b2f577ce00658813593f43fdf5cc78d44d0cc5f6a28b0c9c77e98424c5d0d9cc497bb12557606e35e09f63ce7256dc070c2cbddf0fcaff4da2d21964ca8c81cb295f1ec3767cdab6442d82838f8be29cf795477721bac27858ac1c9561076adf7fe2fa5681d29c9eb0edab5c5a1ccc4edf9b703280f74a2d489c70568f6615e64ccd2549c27c8640b4665ba911b99ccd26872b3e123683d0b6c142f81b2a662e89780bcee18e9b65870ca330d1aa700ff76a587e79ee506ba1551102a506a7711dd52a522355291cd3b9230340d908f3496811358fc647ea76a07ef156a0c7a901a72e369f2eea591d6f694985640f070e2bfbbf7547c59dfd088da418457496aea80b660a7b9c5413537685c4aae032972e4302a7fc947eb86d8cf4e9cd3bd31b62938aeb1850888595b60ae718af8a5785b8f9bb69b4d729a3bac6b451a0e11af39830246a78020295e362cdd9d53d6715428010370c77c81e1f86dd414f6cd7f8d6379e59c97feac3056fd0e02dfedb3de389bc8724950b31ee378140ce2064c92c744c3478adba90dc6a3398f1e7c9020e16149ac880fc4120127b384454c54f4e5678a67400470d6d30d9d23e96c11b895518d5af04302615a13838b97eaa46833e4cf2e12bbb664e7aa8397abe62662c9fd271bd044d49b0989ac58446e87c4b9e61399ecc32210272f520cdee45aed4e83f2e9a628e782dcf75b0f4f58c9f01146fde1c33adb484e15021a2ada0d5e5158d7265f732f69e787b346432150678cd5217f63e2e8bd97c8d908f1e541238894ff2aa60da9773edfdb30c29eb7ef252c0935217d418592bf52ae16d5124aa8bc0f56c99ff4c2b6c196f2c9832ded352e5a85a65b71c1c155356159c79adef88b29af631697ee7cb30babc676a8c533afa1abd15247f00608e5d57da5d22a82c3f3b822b8fd40596e6b5542b46d7c58492ff511cae8ec4bfae6dc53bea0cb670114b1eccbc5392ce3844b1be79bb620b37a5646ff1db826fbdf477890a1a790425972029b82bcccde0ce1fc78b87afef0c68b2717aa8e2d2523782bace03ba6dd4f50a459d85292d9d6b4f5766516db676da94216f31a90f79f5b0fc5fd50d8b02c049cd98bec739e7f792c082db28086ab69f49a06609ef517427bdaa264c0883aa026cdead8d201d554980b58248d7b83a4bc7c033e109520cca1a45d73e679a96315f2061cc617179c180055c8aa5076d497fed65c1e006f9a1c3b685e17b5f8a1702d33400f5e29f3930ff0d38da9103237bd71f89dee3e03503fd23860ea4aef1d6b8ef35c4b23f4e62cdf552cc96b74d84b16346c370cbf2bb308957e5bbaf67293ace05a1f0edcaad24c03444c9eacaf99fc1c373be66438cec5d451e825c3a7f91d01313a07c24ec52268eb5489e34eaca9485f056d2a5d8d999adb489d4e9aeb29abb6e1a968c47fa1c6a230448f55142fac602ffdbf20062ffa6869c25dec45774d2d13823645b32d3035a7df3ebf523d7296f6362b60526af6afa7a27badc83510ea4a4d5cb0029e5b4ad321276349dd1107240db338f2f9a6a87f6529cda3ffe0366ba56f246a956fbae35b6d9df03a5531c8324176255ea7218276d548c768bee4d247b3bb6ca3f43439345b8459eaca09e9661ad9d43278678cd4b73fe135b0d7781f00a2082ef7646a206c6d5ff021b3aefa3acaf87787123b1f3513cc0eccf50329d54259a03ec4d9e06051e3546d36908068a344b0458f6efc01c2468878d042e6acdbe194f983f394f616eeea2409170f846820efa52cdf0cab9b4bec03b7cb5aafdecb0af1e40a3eae1983d874a59cbefc27654a08c7b7e2315b1a4e5c8fe57a18a6bcbd4faee3c0085c0afe9d480d5bfbc7e75abe738e19e2da410f0950a2d832a319cc69e67533c992575663350dc37908913e44399924c6813c9b70eaded9022a9e09d40d1529a740c0bd90d8d5c7b43521bb6d1fe6e7f74629dcaef4b0425e4aa3d8df2dccec6b6f4f2707b3fb15c28d5dd0637d6fd95b296e32bdcbde3dfe2631f9c0f3ea31903443204645f845c0a5ff7b14710ecd355e737bb639ca4a123a20c122d78810b634ea292dcd659d4611abb8b8f3bd7a518d852464cb5f83137793173eeea0a033bf333f26660e4636ecad19f4e4cee2b162a5e246702d0cf6b147761c6e9853e4f7b27f593ac48a8663e761894c9e00b042c5633394b47868cf74698f55656391ca573786977649b3e76c900e38d3a767027a0c2fd850d0aac0e9504612fd72678e838a6f0fbecc36bf3cb3a7b284c4cdb5bc020c44de7588f8a957e0747d2979dbb1e8fc9fe79dfa095999713ed07316edb70eeba35a0b0c676352f014fe25a64a849c72a42adca3b0b5998787d0489933a55f11510157c6c42cb91b379f973da4077f3ae1d99176f11fd8a23f5813fe33342456b2ea67692b3a6f36f8cd7b6b2699c9ad7f6b0cc13899c7e3a54e5d587d9ca80dff141858b3b4a0edf12718ffaa784f2e4d31795de8aa0c7ecac257e014f4e4169f850fe83f1aa57e5f053a4f1152c795f56a67d6ef28ce88588dcd67b1067e745c6499cde0042526622dff5294963299c3151c1cac80b9f8fe516725d853d007c97e2325947c661402cccabd56ec9e1647e8d538cab08f7c261ea90db27b86423a6a6eab02c92d98b1f032dd508d31a8a902db9ded43b21f9856ae85942a0d78e11a0044b6c6a94754fed8d021eb5556f8fe56d3f3c221c67f2de0ffe85a8eed157d5d7fbc7c1e80fdba99daf08a08941e157b60570370f2b55b66197a40776a18bbdcbc14faf3e6b7690053bef1c4fc2c799f9d8be6a88e1ddfc4c2950247bd5ec2ca56641078f5b091b9cda8a4a35c0914d6a6b684181d5dcb82426edd351b0c8a309f8ee26aff68fc528c24343b2a0ee446b5e8ba2f178c2d3a99c38d09015f407da2f6b14ba61069440151db334cdaf9aaab7898bc19e3dd7f8cd7b9fafef9462993afc4bea7989f852659177936160fb50fd3ad714be2e47e2d6339320f4353de867f41cdfd157a03a1bf32d4c006c4f0d19363537a36b2a074a3b4c1c55c226aaa1156d30885fbe879ddcbb0a5ee2acde8b047d5e11bfb66da4b2d1b2ea7c8a816bc440934c4f1956f8372c99dabe2b41dbc7024d004c1884e96f3974d72949d730aaee3e570dfd441ca623c1752b5b5e515ad6c31b62b7fed0bccdc685738860600ded7bd8c42860f473175ece83a657b0bfe98ffc5f82aed7307b6f55e61da9bd26f9f4fbcf4092749ed1716f59e0021be6784aa587cfa86c0488bed15764d72f057f127e4089860328c3a886c6c01b63bbd94f0f46dc1c19dfae93361f2525d5f1886ae41fbdc290426e7472f72a3113ebb43896af07f991b3d2e18bc25f7f42a782bd0501d34907f2bce2879aa2aceaf4ec9258be2e1b4a73ea731249f91d1d5b989b5a83604350bd54e84da783e172bca4fd15aed20c1cdadd3792311506265175bd7aee6b9bcc6ea4362167c0173c74cc12f536dff48ea09b404071a8db6e7ea08d5c1379fd8dcc79b404f4d318bb7bdce7c3c1f64696bd8db1d3153f96babbef5c1308efba0d96123d567ad0b7ac922a456ea6d426e69d51e8a6a46ba21f72a7f96b95ed21b777c9bd40ad9c2329e436255ab220d8367c0582fd2d15a151cb24d3b1359d0b9778544b866b414d85998e50e07a8ca2e637a4a984a37c266c6b4b24481ae3b6a664157f347389908e17836e379c33d4a073a42f3d26012", 0x1000, 0x2}], 0x22c48c, &(0x7f0000000200)={[{@dots='dots'}, {@fat=@flush='flush'}, {@dots='dots'}]}) splice(r0, 0x0, r9, 0x0, 0xffff, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r10, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r10, 0x401c5820, &(0x7f0000000240)={0x73a, 0x9, 0xfff, 0x9, 0x1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190000003fffffffda060200000000e80001040000040d0014", 0x1f}], 0x1) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x8001, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e24, @local}, {0x2, 0x4e23, @local}, 0x3, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)='bcsf0\x00', 0xfffffffffffffffa, 0x80000001, 0xb99}) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 591.781854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 591.789132] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 03:34:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) sendfile(r1, r2, 0x0, 0x50000000000443) 03:34:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x40000) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 591.889078] ================================================================== [ 591.896881] BUG: KASAN: use-after-free in put_pid_ns+0x100/0x110 [ 591.903039] Read of size 8 at addr ffff88807ea1eb38 by task syz-executor.0/24895 [ 591.910582] [ 591.912221] CPU: 1 PID: 24895 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 591.919235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.928606] Call Trace: [ 591.931183] dump_stack+0x138/0x197 [ 591.934795] ? put_pid_ns+0x100/0x110 [ 591.938585] print_address_description.cold+0x7c/0x1dc [ 591.943932] ? put_pid_ns+0x100/0x110 [ 591.947726] kasan_report.cold+0xa9/0x2af [ 591.951860] __asan_report_load8_noabort+0x14/0x20 [ 591.956781] put_pid_ns+0x100/0x110 [ 591.956801] free_nsproxy+0x103/0x200 [ 591.956814] switch_task_namespaces+0x98/0xb0 [ 591.964251] exit_task_namespaces+0x18/0x20 [ 591.964266] copy_process.part.0+0x3b59/0x6a00 [ 591.964287] ? proc_fail_nth_write+0x7d/0x180 [ 591.982260] ? proc_cwd_link+0x1b0/0x1b0 [ 591.986334] ? __cleanup_sighand+0x50/0x50 [ 591.990553] ? lock_downgrade+0x740/0x740 [ 591.994827] _do_fork+0x19e/0xce0 [ 591.998335] ? fork_idle+0x280/0x280 [ 592.002050] ? fput+0xd4/0x150 [ 592.005229] ? SyS_write+0x15e/0x230 [ 592.008986] SyS_clone+0x37/0x50 [ 592.012337] ? sys_vfork+0x30/0x30 [ 592.016131] do_syscall_64+0x1e8/0x640 [ 592.020014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 592.024853] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 592.030299] RIP: 0033:0x459a59 [ 592.033473] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 592.041249] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 592.048514] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 592.055837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 592.063099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 592.070358] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 592.077622] [ 592.079233] Allocated by task 24895: [ 592.082937] save_stack_trace+0x16/0x20 [ 592.086895] save_stack+0x45/0xd0 [ 592.090327] kasan_kmalloc+0xce/0xf0 [ 592.094024] kasan_slab_alloc+0xf/0x20 [ 592.097907] kmem_cache_alloc+0x12e/0x780 [ 592.102039] copy_pid_ns+0x1ae/0xa40 [ 592.105739] create_new_namespaces+0x267/0x720 [ 592.110319] copy_namespaces+0x284/0x310 [ 592.114364] copy_process.part.0+0x2603/0x6a00 [ 592.118926] _do_fork+0x19e/0xce0 [ 592.122372] SyS_clone+0x37/0x50 [ 592.125739] do_syscall_64+0x1e8/0x640 [ 592.129614] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 592.134964] [ 592.136575] Freed by task 17: [ 592.139686] save_stack_trace+0x16/0x20 [ 592.143642] save_stack+0x45/0xd0 [ 592.147081] kasan_slab_free+0x75/0xc0 [ 592.150965] kmem_cache_free+0x83/0x2b0 [ 592.154923] delayed_free_pidns+0x89/0xb0 [ 592.159067] rcu_process_callbacks+0x7b8/0x12b0 [ 592.164689] __do_softirq+0x244/0x9a0 [ 592.168470] [ 592.170081] The buggy address belongs to the object at ffff88807ea1e300 [ 592.170081] which belongs to the cache pid_namespace of size 2264 [ 592.183035] The buggy address is located 2104 bytes inside of [ 592.183035] 2264-byte region [ffff88807ea1e300, ffff88807ea1ebd8) [ 592.195088] The buggy address belongs to the page: [ 592.200002] page:ffffea0001fa8780 count:1 mapcount:0 mapping:ffff88807ea1e300 index:0x0 compound_mapcount: 0 [ 592.209981] flags: 0x1fffc0000008100(slab|head) [ 592.214638] raw: 01fffc0000008100 ffff88807ea1e300 0000000000000000 0000000100000003 [ 592.223376] raw: ffffea000270e220 ffffea0000e92120 ffff888219c94ac0 0000000000000000 [ 592.231252] page dumped because: kasan: bad access detected [ 592.236944] [ 592.238554] Memory state around the buggy address: [ 592.243486] ffff88807ea1ea00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 592.250826] ffff88807ea1ea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 592.258180] >ffff88807ea1eb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 592.265521] ^ [ 592.270693] ffff88807ea1eb80: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 592.278033] ffff88807ea1ec00: fc fc fc fc fc fc fc fc fc fc fc fb fb fb fb fb [ 592.285373] ================================================================== [ 592.292890] Disabling lock debugging due to kernel taint [ 592.302307] Kernel panic - not syncing: panic_on_warn set ... [ 592.302307] [ 592.307366] kobject: 'loop3' (ffff8880a49ea160): kobject_uevent_env [ 592.309705] CPU: 1 PID: 24895 Comm: syz-executor.0 Tainted: G B 4.14.150 #0 [ 592.324405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.332548] kobject: 'loop3' (ffff8880a49ea160): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 592.333760] Call Trace: [ 592.333778] dump_stack+0x138/0x197 [ 592.333793] ? put_pid_ns+0x100/0x110 [ 592.333806] panic+0x1f9/0x42d [ 592.357951] ? add_taint.cold+0x16/0x16 [ 592.359585] kobject: 'loop4' (ffff8880a4a441e0): kobject_uevent_env [ 592.361928] ? ___preempt_schedule+0x16/0x18 [ 592.361943] kasan_end_report+0x47/0x4f [ 592.361953] kasan_report.cold+0x130/0x2af [ 592.361966] __asan_report_load8_noabort+0x14/0x20 [ 592.361977] put_pid_ns+0x100/0x110 [ 592.361989] free_nsproxy+0x103/0x200 [ 592.369048] kobject: 'loop4' (ffff8880a4a441e0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 592.372773] switch_task_namespaces+0x98/0xb0 [ 592.372784] exit_task_namespaces+0x18/0x20 [ 592.372797] copy_process.part.0+0x3b59/0x6a00 [ 592.372812] ? proc_fail_nth_write+0x7d/0x180 [ 592.372819] ? proc_cwd_link+0x1b0/0x1b0 [ 592.372837] ? __cleanup_sighand+0x50/0x50 [ 592.426209] kobject: 'loop1' (ffff8880a49746e0): kobject_uevent_env [ 592.428941] ? lock_downgrade+0x740/0x740 [ 592.428956] _do_fork+0x19e/0xce0 03:34:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='G\xa0\x8b\x84\xb0\x05\xc8i\xec\x02', 0x24c300, 0x0) write$UHID_DESTROY(r2, &(0x7f00000002c0), 0x4) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r3, 0x0, 0x50000000000443) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2dacf0f350eb715c}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x30e975d75baf00a) 03:34:57 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) 03:34:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 592.442451] kobject: 'loop1' (ffff8880a49746e0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 592.442945] ? fork_idle+0x280/0x280 [ 592.456086] ? fput+0xd4/0x150 [ 592.459284] ? SyS_write+0x15e/0x230 [ 592.463002] SyS_clone+0x37/0x50 [ 592.466370] ? sys_vfork+0x30/0x30 [ 592.469920] do_syscall_64+0x1e8/0x640 [ 592.473813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 592.478678] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 592.483860] RIP: 0033:0x459a59 [ 592.487055] RSP: 002b:00007f6980938c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 592.494745] RAX: ffffffffffffffda RBX: 00007f6980938c90 RCX: 0000000000459a59 [ 592.502001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 592.509262] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 592.516524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69809396d4 [ 592.523779] R13: 00000000004bff5a R14: 00000000004d2210 R15: 0000000000000004 [ 592.532531] Kernel Offset: disabled [ 592.536243] Rebooting in 86400 seconds..