x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:10:26 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:10:26 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x0, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:10:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:10:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 17:10:26 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:10:26 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 871.859971] FAULT_INJECTION: forcing a failure. [ 871.859971] name failslab, interval 1, probability 0, space 0, times 0 [ 871.863420] CPU: 1 PID: 6908 Comm: syz-executor.0 Not tainted 5.10.239 #1 [ 871.864931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 871.866888] Call Trace: [ 871.867525] dump_stack+0x107/0x167 [ 871.868315] should_fail.cold+0x5/0xa [ 871.869199] ? jbd2__journal_start+0x190/0x7e0 [ 871.870281] should_failslab+0x5/0x20 [ 871.871123] kmem_cache_alloc+0x5b/0x310 [ 871.872047] jbd2__journal_start+0x190/0x7e0 [ 871.873106] __ext4_journal_start_sb+0x214/0x390 [ 871.874238] ext4_dirty_inode+0xbc/0x130 [ 871.875131] ? ext4_setattr+0x20f0/0x20f0 [ 871.876074] __mark_inode_dirty+0x492/0xd40 [ 871.877102] touch_atime+0x5ea/0x6e0 [ 871.877946] ? atime_needs_update+0x600/0x600 [ 871.878921] ? add_to_page_cache_locked+0x40/0x40 [ 871.880097] generic_file_buffered_read+0x191a/0x2920 [ 871.881350] ? pagecache_get_page+0xc80/0xc80 [ 871.882327] ? __lock_acquire+0xbb1/0x5b00 [ 871.883321] generic_file_read_iter+0x33f/0x490 [ 871.884342] ext4_file_read_iter+0x184/0x4c0 [ 871.885272] __kernel_read+0x593/0xb30 [ 871.886112] ? do_sendfile+0x11e0/0x11e0 [ 871.886984] ? fsnotify_perm.part.0+0x22d/0x620 [ 871.887967] ? security_file_permission+0xb1/0xe0 [ 871.888989] kernel_read+0x52/0x70 [ 871.889773] bprm_execve+0x767/0x1960 [ 871.890591] ? open_exec+0x70/0x70 [ 871.891340] ? copy_string_kernel+0x3b6/0x450 [ 871.892318] do_execveat_common+0x772/0x8d0 [ 871.893228] ? bprm_execve+0x1960/0x1960 [ 871.894106] __x64_sys_execveat+0xed/0x140 [ 871.895010] do_syscall_64+0x33/0x40 [ 871.895810] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 871.896901] RIP: 0033:0x7fb538afab19 [ 871.897700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 871.901616] RSP: 002b:00007fb536070188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 871.903235] RAX: ffffffffffffffda RBX: 00007fb538c0df60 RCX: 00007fb538afab19 [ 871.904753] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 871.906263] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 871.907792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 871.909312] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 17:10:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 17:10:26 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:10:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) [ 871.982910] FAULT_INJECTION: forcing a failure. [ 871.982910] name failslab, interval 1, probability 0, space 0, times 0 [ 871.985678] CPU: 0 PID: 6914 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 871.987063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 871.988752] Call Trace: [ 871.989293] dump_stack+0x107/0x167 [ 871.990039] should_fail.cold+0x5/0xa [ 871.990815] ? security_file_alloc+0x34/0x170 [ 871.991739] should_failslab+0x5/0x20 [ 871.992511] kmem_cache_alloc+0x5b/0x310 [ 871.993343] security_file_alloc+0x34/0x170 [ 871.994219] __alloc_file+0xb7/0x320 [ 871.994976] alloc_empty_file+0x6d/0x170 [ 871.995820] path_openat+0xe6/0x2770 [ 871.996580] ? lock_chain_count+0x20/0x20 [ 871.997426] ? stack_trace_consume_entry+0x160/0x160 [ 871.998453] ? path_lookupat+0x860/0x860 [ 871.999287] ? kasan_save_stack+0x32/0x40 [ 872.000136] ? kasan_save_stack+0x1b/0x40 [ 872.000977] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 17:10:26 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 872.002007] ? security_prepare_creds+0x112/0x190 [ 872.003116] ? prepare_creds+0x452/0x5e0 [ 872.003956] ? prepare_exec_creds+0xd/0x260 [ 872.004843] do_filp_open+0x190/0x3e0 [ 872.005623] ? may_open_dev+0xf0/0xf0 [ 872.006421] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 872.007500] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 872.008621] ? find_held_lock+0x2c/0x110 [ 872.009453] do_open_execat+0x116/0x740 [ 872.010256] ? bprm_execve+0x49d/0x1960 [ 872.011061] ? __do_sys_uselib+0x6a0/0x6a0 [ 872.011931] ? do_raw_spin_lock+0x121/0x260 [ 872.012808] ? rwlock_bug.part.0+0x90/0x90 [ 872.013675] bprm_execve+0x4dc/0x1960 [ 872.014467] ? count.constprop.0+0x1b3/0x290 [ 872.015354] ? open_exec+0x70/0x70 [ 872.016077] ? copy_string_kernel+0x3b6/0x450 [ 872.016980] do_execveat_common+0x772/0x8d0 [ 872.017848] ? bprm_execve+0x1960/0x1960 [ 872.018674] __x64_sys_execveat+0xed/0x140 [ 872.019539] do_syscall_64+0x33/0x40 [ 872.020293] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 872.021321] RIP: 0033:0x7fd228c83b19 [ 872.022070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 872.025770] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 872.027295] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 872.028729] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 872.030150] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 872.031584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 872.033015] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 17:10:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 17:10:26 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 872.070834] FAULT_INJECTION: forcing a failure. [ 872.070834] name failslab, interval 1, probability 0, space 0, times 0 [ 872.073493] CPU: 1 PID: 6918 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 872.074940] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 872.076694] Call Trace: [ 872.077255] dump_stack+0x107/0x167 [ 872.078030] should_fail.cold+0x5/0xa [ 872.078837] ? create_object.isra.0+0x3a/0xa20 [ 872.079811] should_failslab+0x5/0x20 [ 872.080617] kmem_cache_alloc+0x5b/0x310 [ 872.081477] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 872.082646] create_object.isra.0+0x3a/0xa20 [ 872.083580] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 872.084657] kmem_cache_alloc+0x159/0x310 [ 872.085534] security_file_alloc+0x34/0x170 [ 872.086442] __alloc_file+0xb7/0x320 [ 872.087232] alloc_empty_file+0x6d/0x170 [ 872.088097] path_openat+0xe6/0x2770 [ 872.088888] ? lock_chain_count+0x20/0x20 [ 872.089768] ? stack_trace_consume_entry+0x160/0x160 [ 872.090831] ? path_lookupat+0x860/0x860 [ 872.091652] FAULT_INJECTION: forcing a failure. [ 872.091652] name failslab, interval 1, probability 0, space 0, times 0 [ 872.093984] ? kasan_save_stack+0x32/0x40 [ 872.093999] ? kasan_save_stack+0x1b/0x40 [ 872.094015] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 872.094041] ? security_prepare_creds+0x112/0x190 [ 872.097802] ? prepare_creds+0x452/0x5e0 [ 872.098656] ? prepare_exec_creds+0xd/0x260 [ 872.099577] do_filp_open+0x190/0x3e0 [ 872.100377] ? may_open_dev+0xf0/0xf0 [ 872.101203] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 872.102312] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 872.103480] ? find_held_lock+0x2c/0x110 [ 872.104361] do_open_execat+0x116/0x740 [ 872.105197] ? bprm_execve+0x49d/0x1960 [ 872.106034] ? __do_sys_uselib+0x6a0/0x6a0 [ 872.106918] ? do_raw_spin_lock+0x121/0x260 [ 872.107832] ? rwlock_bug.part.0+0x90/0x90 [ 872.108736] bprm_execve+0x4dc/0x1960 [ 872.109542] ? count.constprop.0+0x1b3/0x290 [ 872.110470] ? open_exec+0x70/0x70 [ 872.111220] ? copy_string_kernel+0x3b6/0x450 [ 872.112182] do_execveat_common+0x772/0x8d0 [ 872.113099] ? bprm_execve+0x1960/0x1960 [ 872.113978] __x64_sys_execveat+0xed/0x140 [ 872.114875] do_syscall_64+0x33/0x40 [ 872.115670] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 872.116752] RIP: 0033:0x7fe0737b3b19 [ 872.117535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 872.121430] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 872.123030] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 872.124547] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 872.126045] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 872.127546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 872.129050] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 [ 872.130580] CPU: 0 PID: 6924 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 872.131908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 872.133485] Call Trace: [ 872.133996] dump_stack+0x107/0x167 [ 872.134689] should_fail.cold+0x5/0xa [ 872.135413] ? jbd2__journal_start+0x190/0x7e0 [ 872.136286] should_failslab+0x5/0x20 [ 872.137010] kmem_cache_alloc+0x5b/0x310 [ 872.137788] jbd2__journal_start+0x190/0x7e0 [ 872.138633] __ext4_journal_start_sb+0x214/0x390 [ 872.139545] ext4_dirty_inode+0xbc/0x130 [ 872.140325] ? ext4_setattr+0x20f0/0x20f0 [ 872.141110] __mark_inode_dirty+0x492/0xd40 [ 872.141941] touch_atime+0x5ea/0x6e0 [ 872.142658] ? atime_needs_update+0x600/0x600 [ 872.143517] ? add_to_page_cache_locked+0x40/0x40 [ 872.144448] generic_file_buffered_read+0x191a/0x2920 [ 872.145454] ? pagecache_get_page+0xc80/0xc80 [ 872.146315] ? __lock_acquire+0xbb1/0x5b00 [ 872.147128] generic_file_read_iter+0x33f/0x490 [ 872.148028] ext4_file_read_iter+0x184/0x4c0 [ 872.148868] __kernel_read+0x593/0xb30 [ 872.149605] ? do_sendfile+0x11e0/0x11e0 [ 872.150384] ? fsnotify_perm.part.0+0x22d/0x620 [ 872.151263] ? security_file_permission+0xb1/0xe0 [ 872.152189] kernel_read+0x52/0x70 [ 872.152863] bprm_execve+0x767/0x1960 [ 872.153594] ? open_exec+0x70/0x70 [ 872.154265] ? copy_string_kernel+0x3b6/0x450 [ 872.155134] do_execveat_common+0x772/0x8d0 [ 872.155958] ? bprm_execve+0x1960/0x1960 [ 872.156744] __x64_sys_execveat+0xed/0x140 [ 872.157546] do_syscall_64+0x33/0x40 [ 872.158256] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 872.159233] RIP: 0033:0x7f5fcd8e1b19 [ 872.159939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 872.163389] RSP: 002b:00007f5fcae57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 872.164823] RAX: ffffffffffffffda RBX: 00007f5fcd9f4f60 RCX: 00007f5fcd8e1b19 [ 872.166166] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 872.167508] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 872.168842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 872.170185] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 17:10:39 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:10:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:10:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 17:10:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 17:10:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 17:10:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 17:10:39 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:10:39 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 884.962528] FAULT_INJECTION: forcing a failure. [ 884.962528] name failslab, interval 1, probability 0, space 0, times 0 [ 884.965570] CPU: 0 PID: 6938 Comm: syz-executor.0 Not tainted 5.10.239 #1 [ 884.967319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 884.969442] Call Trace: [ 884.970118] dump_stack+0x107/0x167 [ 884.971050] should_fail.cold+0x5/0xa [ 884.972033] ? create_object.isra.0+0x3a/0xa20 [ 884.973202] should_failslab+0x5/0x20 [ 884.974173] kmem_cache_alloc+0x5b/0x310 [ 884.975212] create_object.isra.0+0x3a/0xa20 [ 884.976335] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 884.977632] kmem_cache_alloc+0x159/0x310 [ 884.978695] jbd2__journal_start+0x190/0x7e0 [ 884.979845] __ext4_journal_start_sb+0x214/0x390 [ 884.981058] ext4_dirty_inode+0xbc/0x130 [ 884.982090] ? ext4_setattr+0x20f0/0x20f0 [ 884.983148] __mark_inode_dirty+0x492/0xd40 [ 884.984262] touch_atime+0x5ea/0x6e0 [ 884.985214] ? atime_needs_update+0x600/0x600 [ 884.986357] ? add_to_page_cache_locked+0x40/0x40 [ 884.987608] generic_file_buffered_read+0x191a/0x2920 [ 884.988948] ? pagecache_get_page+0xc80/0xc80 [ 884.990099] ? __lock_acquire+0xbb1/0x5b00 [ 884.991188] generic_file_read_iter+0x33f/0x490 [ 884.992392] ext4_file_read_iter+0x184/0x4c0 [ 884.993521] __kernel_read+0x593/0xb30 [ 884.994517] ? do_sendfile+0x11e0/0x11e0 [ 884.995568] ? fsnotify_perm.part.0+0x22d/0x620 [ 884.996687] ? security_file_permission+0xb1/0xe0 [ 884.997731] kernel_read+0x52/0x70 [ 884.998495] bprm_execve+0x767/0x1960 [ 884.999317] ? open_exec+0x70/0x70 [ 885.000084] ? copy_string_kernel+0x3b6/0x450 [ 885.001052] do_execveat_common+0x772/0x8d0 [ 885.001981] ? bprm_execve+0x1960/0x1960 [ 885.002868] __x64_sys_execveat+0xed/0x140 [ 885.003788] do_syscall_64+0x33/0x40 [ 885.004588] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.005681] RIP: 0033:0x7fb538afab19 [ 885.006479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.010419] RSP: 002b:00007fb536070188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 885.012062] RAX: ffffffffffffffda RBX: 00007fb538c0df60 RCX: 00007fb538afab19 [ 885.013586] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 885.015112] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 885.016643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 885.018171] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 17:10:39 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 885.051792] FAULT_INJECTION: forcing a failure. [ 885.051792] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 885.052375] FAULT_INJECTION: forcing a failure. [ 885.052375] name failslab, interval 1, probability 0, space 0, times 0 [ 885.054628] CPU: 0 PID: 6951 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 885.058269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.060047] Call Trace: [ 885.060613] dump_stack+0x107/0x167 [ 885.061392] should_fail.cold+0x5/0xa [ 885.062210] __alloc_pages_nodemask+0x182/0x600 [ 885.063206] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 885.064503] ? lock_downgrade+0x6d0/0x6d0 [ 885.065395] alloc_pages_current+0x187/0x280 [ 885.066335] __page_cache_alloc+0x2d2/0x360 [ 885.067266] generic_file_buffered_read+0xcd7/0x2920 [ 885.068352] ? lock_chain_count+0x20/0x20 [ 885.069254] ? pagecache_get_page+0xc80/0xc80 [ 885.070210] ? __lock_acquire+0xbb1/0x5b00 [ 885.071118] generic_file_read_iter+0x33f/0x490 [ 885.072131] ext4_file_read_iter+0x184/0x4c0 [ 885.073071] __kernel_read+0x593/0xb30 [ 885.073904] ? do_sendfile+0x11e0/0x11e0 [ 885.074783] ? fsnotify_perm.part.0+0x22d/0x620 [ 885.075786] ? security_file_permission+0xb1/0xe0 [ 885.076820] kernel_read+0x52/0x70 [ 885.077587] bprm_execve+0x767/0x1960 [ 885.078406] ? open_exec+0x70/0x70 [ 885.079166] ? copy_string_kernel+0x3b6/0x450 [ 885.080141] do_execveat_common+0x772/0x8d0 [ 885.081062] ? bprm_execve+0x1960/0x1960 [ 885.081948] __x64_sys_execveat+0xed/0x140 [ 885.082852] do_syscall_64+0x33/0x40 [ 885.083654] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.084743] RIP: 0033:0x7fe0737b3b19 [ 885.085535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.089419] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 885.091032] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 885.092557] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 885.094083] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 885.095611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 885.097131] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 [ 885.098683] CPU: 1 PID: 6952 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 885.100168] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.101967] Call Trace: [ 885.102534] dump_stack+0x107/0x167 [ 885.102747] FAULT_INJECTION: forcing a failure. [ 885.102747] name failslab, interval 1, probability 0, space 0, times 0 [ 885.103315] should_fail.cold+0x5/0xa [ 885.103336] ? create_object.isra.0+0x3a/0xa20 [ 885.103361] should_failslab+0x5/0x20 [ 885.108257] kmem_cache_alloc+0x5b/0x310 [ 885.109137] create_object.isra.0+0x3a/0xa20 [ 885.110082] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 885.111175] kmem_cache_alloc+0x159/0x310 [ 885.112080] jbd2__journal_start+0x190/0x7e0 [ 885.113029] __ext4_journal_start_sb+0x214/0x390 [ 885.114055] ext4_dirty_inode+0xbc/0x130 [ 885.114923] ? ext4_setattr+0x20f0/0x20f0 [ 885.115818] __mark_inode_dirty+0x492/0xd40 [ 885.116750] touch_atime+0x5ea/0x6e0 [ 885.117551] ? atime_needs_update+0x600/0x600 [ 885.118510] ? add_to_page_cache_locked+0x40/0x40 [ 885.119557] generic_file_buffered_read+0x191a/0x2920 [ 885.120693] ? pagecache_get_page+0xc80/0xc80 [ 885.121659] ? __lock_acquire+0xbb1/0x5b00 [ 885.122576] generic_file_read_iter+0x33f/0x490 [ 885.123589] ext4_file_read_iter+0x184/0x4c0 [ 885.124538] __kernel_read+0x593/0xb30 [ 885.125376] ? do_sendfile+0x11e0/0x11e0 [ 885.126263] ? fsnotify_perm.part.0+0x22d/0x620 [ 885.127265] ? security_file_permission+0xb1/0xe0 [ 885.128318] kernel_read+0x52/0x70 [ 885.129084] bprm_execve+0x767/0x1960 [ 885.129913] ? open_exec+0x70/0x70 [ 885.130677] ? copy_string_kernel+0x3b6/0x450 [ 885.131662] do_execveat_common+0x772/0x8d0 [ 885.132596] ? bprm_execve+0x1960/0x1960 [ 885.133485] __x64_sys_execveat+0xed/0x140 [ 885.134396] do_syscall_64+0x33/0x40 [ 885.135196] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.136301] RIP: 0033:0x7f5fcd8e1b19 [ 885.137098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.141088] RSP: 002b:00007f5fcae57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 885.142726] RAX: ffffffffffffffda RBX: 00007f5fcd9f4f60 RCX: 00007f5fcd8e1b19 [ 885.144266] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 885.145803] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 885.147336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 885.148873] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 [ 885.150430] CPU: 0 PID: 6950 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 885.151910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.153688] Call Trace: [ 885.154250] dump_stack+0x107/0x167 [ 885.155034] should_fail.cold+0x5/0xa [ 885.155859] ? create_object.isra.0+0x3a/0xa20 [ 885.156840] should_failslab+0x5/0x20 [ 885.157656] kmem_cache_alloc+0x5b/0x310 [ 885.158526] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 885.159720] create_object.isra.0+0x3a/0xa20 [ 885.160659] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 885.161752] kmem_cache_alloc+0x159/0x310 [ 885.162645] security_file_alloc+0x34/0x170 [ 885.163569] __alloc_file+0xb7/0x320 [ 885.164375] alloc_empty_file+0x6d/0x170 [ 885.165245] path_openat+0xe6/0x2770 [ 885.166050] ? lock_chain_count+0x20/0x20 [ 885.166940] ? stack_trace_consume_entry+0x160/0x160 [ 885.168031] ? path_lookupat+0x860/0x860 [ 885.168904] ? kasan_save_stack+0x32/0x40 [ 885.169785] ? kasan_save_stack+0x1b/0x40 [ 885.170670] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 885.171758] ? security_prepare_creds+0x112/0x190 [ 885.172788] ? prepare_creds+0x452/0x5e0 [ 885.173653] ? prepare_exec_creds+0xd/0x260 [ 885.174579] do_filp_open+0x190/0x3e0 [ 885.175391] ? may_open_dev+0xf0/0xf0 [ 885.176232] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 885.177357] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 885.178545] ? find_held_lock+0x2c/0x110 [ 885.179418] do_open_execat+0x116/0x740 [ 885.180279] ? bprm_execve+0x49d/0x1960 [ 885.181131] ? __do_sys_uselib+0x6a0/0x6a0 [ 885.182035] ? do_raw_spin_lock+0x121/0x260 [ 885.182957] ? rwlock_bug.part.0+0x90/0x90 [ 885.183881] bprm_execve+0x4dc/0x1960 [ 885.184701] ? count.constprop.0+0x1b3/0x290 [ 885.185642] ? open_exec+0x70/0x70 [ 885.186403] ? copy_string_kernel+0x3b6/0x450 [ 885.187373] do_execveat_common+0x772/0x8d0 [ 885.188306] ? bprm_execve+0x1960/0x1960 [ 885.189191] __x64_sys_execveat+0xed/0x140 [ 885.190097] do_syscall_64+0x33/0x40 [ 885.190894] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.192003] RIP: 0033:0x7fd228c83b19 [ 885.192802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.196757] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 885.198388] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 885.199922] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 885.201449] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 885.202975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 885.204507] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 17:10:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:10:53 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:10:53 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:10:53 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:10:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 17:10:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 17:10:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 17:10:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) [ 898.624507] FAULT_INJECTION: forcing a failure. [ 898.624507] name failslab, interval 1, probability 0, space 0, times 0 [ 898.627281] CPU: 1 PID: 6970 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 898.628813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.630661] Call Trace: [ 898.631253] dump_stack+0x107/0x167 [ 898.632074] should_fail.cold+0x5/0xa [ 898.632926] ? __request_module+0x2e0/0x920 [ 898.633887] ? bprm_execve+0x9a0/0x1960 [ 898.634771] should_failslab+0x5/0x20 [ 898.635624] kmem_cache_alloc_trace+0x55/0x320 [ 898.636655] ? bprm_execve+0x9a0/0x1960 [ 898.637538] __request_module+0x2e0/0x920 [ 898.638461] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 898.639625] ? free_modprobe_argv+0x90/0x90 [ 898.640605] ? find_held_lock+0x2c/0x110 [ 898.641520] ? find_held_lock+0x2c/0x110 [ 898.642430] ? bprm_execve+0x8f8/0x1960 [ 898.643316] ? lock_downgrade+0x6d0/0x6d0 [ 898.644244] ? elf_core_dump+0x3c50/0x3c50 [ 898.645183] ? do_raw_read_unlock+0x3b/0x70 [ 898.646139] ? _raw_read_unlock+0x1a/0x30 [ 898.647056] ? load_misc_binary+0x813/0xb50 [ 898.648037] bprm_execve+0x9a0/0x1960 [ 898.648893] ? open_exec+0x70/0x70 [ 898.649683] ? copy_string_kernel+0x3b6/0x450 [ 898.650695] do_execveat_common+0x772/0x8d0 [ 898.651660] ? bprm_execve+0x1960/0x1960 [ 898.652586] __x64_sys_execveat+0xed/0x140 [ 898.653535] do_syscall_64+0x33/0x40 [ 898.654361] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.655496] RIP: 0033:0x7f5fcd8e1b19 [ 898.656328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.660418] RSP: 002b:00007f5fcae57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 898.661651] FAULT_INJECTION: forcing a failure. [ 898.661651] name failslab, interval 1, probability 0, space 0, times 0 [ 898.662105] RAX: ffffffffffffffda RBX: 00007f5fcd9f4f60 RCX: 00007f5fcd8e1b19 [ 898.662117] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 898.662128] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 898.662138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 898.662148] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 [ 898.662621] FAULT_INJECTION: forcing a failure. [ 898.662621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 898.663924] CPU: 0 PID: 6977 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 898.663932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.663936] Call Trace: [ 898.663952] dump_stack+0x107/0x167 [ 898.663968] should_fail.cold+0x5/0xa [ 898.663983] ? jbd2__journal_start+0x190/0x7e0 [ 898.663999] should_failslab+0x5/0x20 [ 898.664012] kmem_cache_alloc+0x5b/0x310 [ 898.664030] jbd2__journal_start+0x190/0x7e0 [ 898.664048] __ext4_journal_start_sb+0x214/0x390 [ 898.664065] ext4_dirty_inode+0xbc/0x130 [ 898.664077] ? ext4_setattr+0x20f0/0x20f0 [ 898.664089] __mark_inode_dirty+0x492/0xd40 [ 898.664107] touch_atime+0x5ea/0x6e0 [ 898.664122] ? atime_needs_update+0x600/0x600 [ 898.664135] ? add_to_page_cache_locked+0x40/0x40 [ 898.664158] generic_file_buffered_read+0x191a/0x2920 [ 898.664188] ? pagecache_get_page+0xc80/0xc80 [ 898.664204] ? __lock_acquire+0xbb1/0x5b00 [ 898.664225] generic_file_read_iter+0x33f/0x490 [ 898.664245] ext4_file_read_iter+0x184/0x4c0 [ 898.664263] __kernel_read+0x593/0xb30 [ 898.664279] ? do_sendfile+0x11e0/0x11e0 [ 898.664308] ? fsnotify_perm.part.0+0x22d/0x620 [ 898.687294] ? security_file_permission+0xb1/0xe0 [ 898.688009] kernel_read+0x52/0x70 [ 898.688523] bprm_execve+0x767/0x1960 [ 898.689077] ? open_exec+0x70/0x70 [ 898.689589] ? copy_string_kernel+0x3b6/0x450 [ 898.690259] do_execveat_common+0x772/0x8d0 [ 898.690891] ? bprm_execve+0x1960/0x1960 [ 898.691502] __x64_sys_execveat+0xed/0x140 [ 898.692140] do_syscall_64+0x33/0x40 [ 898.692677] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.693418] RIP: 0033:0x7fe0737b3b19 [ 898.693954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.696606] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 898.697732] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 898.698763] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 898.699828] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 898.700860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 898.701905] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 [ 898.702988] CPU: 1 PID: 6972 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 898.704507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.706326] Call Trace: [ 898.706904] dump_stack+0x107/0x167 [ 898.707716] should_fail.cold+0x5/0xa [ 898.708559] __alloc_pages_nodemask+0x182/0x600 [ 898.709586] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 898.710916] ? lock_downgrade+0x6d0/0x6d0 [ 898.711846] alloc_pages_current+0x187/0x280 [ 898.712815] __page_cache_alloc+0x2d2/0x360 [ 898.713769] generic_file_buffered_read+0xcd7/0x2920 17:10:53 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 898.714881] ? lock_chain_count+0x20/0x20 [ 898.716000] ? pagecache_get_page+0xc80/0xc80 [ 898.716984] ? __lock_acquire+0xbb1/0x5b00 [ 898.717911] generic_file_read_iter+0x33f/0x490 [ 898.718941] ext4_file_read_iter+0x184/0x4c0 [ 898.719916] __kernel_read+0x593/0xb30 17:10:53 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 898.720770] ? do_sendfile+0x11e0/0x11e0 [ 898.721752] ? fsnotify_perm.part.0+0x22d/0x620 [ 898.722775] ? security_file_permission+0xb1/0xe0 [ 898.723855] kernel_read+0x52/0x70 [ 898.724634] bprm_execve+0x767/0x1960 [ 898.725473] ? open_exec+0x70/0x70 [ 898.726246] ? copy_string_kernel+0x3b6/0x450 [ 898.727234] do_execveat_common+0x772/0x8d0 [ 898.728189] ? bprm_execve+0x1960/0x1960 [ 898.729092] __x64_sys_execveat+0xed/0x140 [ 898.730019] do_syscall_64+0x33/0x40 [ 898.730833] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.731957] RIP: 0033:0x7fd228c83b19 [ 898.732768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.736796] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 898.738458] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 898.740050] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 898.741600] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 898.743140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 898.744720] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 [ 898.787650] FAULT_INJECTION: forcing a failure. [ 898.787650] name failslab, interval 1, probability 0, space 0, times 0 [ 898.790528] CPU: 1 PID: 6983 Comm: syz-executor.0 Not tainted 5.10.239 #1 [ 898.792072] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.793923] Call Trace: [ 898.794519] dump_stack+0x107/0x167 [ 898.795330] should_fail.cold+0x5/0xa [ 898.796186] ? __request_module+0x2e0/0x920 [ 898.797147] ? bprm_execve+0x9a0/0x1960 [ 898.798037] should_failslab+0x5/0x20 [ 898.798889] kmem_cache_alloc_trace+0x55/0x320 [ 898.799916] ? bprm_execve+0x9a0/0x1960 [ 898.800801] __request_module+0x2e0/0x920 [ 898.801726] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 898.802893] ? free_modprobe_argv+0x90/0x90 [ 898.803861] ? find_held_lock+0x2c/0x110 [ 898.804771] ? find_held_lock+0x2c/0x110 [ 898.805685] ? bprm_execve+0x8f8/0x1960 [ 898.806573] ? lock_downgrade+0x6d0/0x6d0 17:10:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 898.807503] ? elf_core_dump+0x3c50/0x3c50 [ 898.808607] ? do_raw_read_unlock+0x3b/0x70 [ 898.809563] ? _raw_read_unlock+0x1a/0x30 [ 898.810478] ? load_misc_binary+0x813/0xb50 [ 898.811447] bprm_execve+0x9a0/0x1960 [ 898.812313] ? open_exec+0x70/0x70 [ 898.813109] ? copy_string_kernel+0x3b6/0x450 [ 898.814113] do_execveat_common+0x772/0x8d0 [ 898.815083] ? bprm_execve+0x1960/0x1960 [ 898.816012] __x64_sys_execveat+0xed/0x140 [ 898.816957] do_syscall_64+0x33/0x40 [ 898.817789] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.818926] RIP: 0033:0x7fb538afab19 [ 898.819763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.823832] RSP: 002b:00007fb536070188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 898.825510] RAX: ffffffffffffffda RBX: 00007fb538c0df60 RCX: 00007fb538afab19 [ 898.827084] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 898.828669] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 898.830243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 898.831826] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 17:10:53 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:10:53 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:10:53 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:10:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 17:10:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 17:10:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) [ 898.958802] FAULT_INJECTION: forcing a failure. [ 898.958802] name failslab, interval 1, probability 0, space 0, times 0 [ 898.961542] CPU: 1 PID: 6997 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 898.962992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.964758] Call Trace: [ 898.965320] dump_stack+0x107/0x167 [ 898.966097] should_fail.cold+0x5/0xa [ 898.966911] ? create_object.isra.0+0x3a/0xa20 [ 898.967891] should_failslab+0x5/0x20 [ 898.968710] kmem_cache_alloc+0x5b/0x310 [ 898.969579] create_object.isra.0+0x3a/0xa20 [ 898.970504] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 898.971578] kmem_cache_alloc+0x159/0x310 [ 898.972470] jbd2__journal_start+0x190/0x7e0 17:10:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 898.973396] __ext4_journal_start_sb+0x214/0x390 [ 898.974545] ext4_dirty_inode+0xbc/0x130 [ 898.975394] ? ext4_setattr+0x20f0/0x20f0 [ 898.976271] __mark_inode_dirty+0x492/0xd40 [ 898.977180] touch_atime+0x5ea/0x6e0 [ 898.977962] ? atime_needs_update+0x600/0x600 [ 898.978903] ? add_to_page_cache_locked+0x40/0x40 [ 898.979932] generic_file_buffered_read+0x191a/0x2920 [ 898.981029] ? pagecache_get_page+0xc80/0xc80 [ 898.981218] FAULT_INJECTION: forcing a failure. [ 898.981218] name failslab, interval 1, probability 0, space 0, times 0 [ 898.981966] ? __lock_acquire+0xbb1/0x5b00 [ 898.981994] generic_file_read_iter+0x33f/0x490 [ 898.985382] ext4_file_read_iter+0x184/0x4c0 [ 898.986308] __kernel_read+0x593/0xb30 [ 898.987135] ? do_sendfile+0x11e0/0x11e0 [ 898.988010] ? fsnotify_perm.part.0+0x22d/0x620 [ 898.988997] ? security_file_permission+0xb1/0xe0 [ 898.990014] kernel_read+0x52/0x70 [ 898.990766] bprm_execve+0x767/0x1960 [ 898.991577] ? open_exec+0x70/0x70 [ 898.992445] ? copy_string_kernel+0x3b6/0x450 [ 898.993547] do_execveat_common+0x772/0x8d0 [ 898.994609] ? bprm_execve+0x1960/0x1960 [ 898.995617] __x64_sys_execveat+0xed/0x140 [ 898.996658] do_syscall_64+0x33/0x40 [ 898.997566] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.998815] RIP: 0033:0x7fe0737b3b19 [ 898.999733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 899.004198] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 899.006043] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 899.007779] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 899.009510] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 899.011238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 899.012986] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 [ 899.014740] CPU: 0 PID: 7002 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 899.015715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 899.016849] Call Trace: [ 899.017209] dump_stack+0x107/0x167 [ 899.017715] should_fail.cold+0x5/0xa [ 899.018246] ? create_object.isra.0+0x3a/0xa20 [ 899.018884] should_failslab+0x5/0x20 [ 899.019410] kmem_cache_alloc+0x5b/0x310 [ 899.019989] create_object.isra.0+0x3a/0xa20 [ 899.020598] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 899.021307] kmem_cache_alloc_trace+0x151/0x320 [ 899.021955] ? bprm_execve+0x9a0/0x1960 [ 899.022493] __request_module+0x2e0/0x920 [ 899.023067] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 899.023796] ? free_modprobe_argv+0x90/0x90 [ 899.024393] ? find_held_lock+0x2c/0x110 [ 899.024963] ? find_held_lock+0x2c/0x110 [ 899.025525] ? bprm_execve+0x8f8/0x1960 [ 899.026072] ? lock_downgrade+0x6d0/0x6d0 [ 899.026639] ? elf_core_dump+0x3c50/0x3c50 [ 899.027221] ? do_raw_read_unlock+0x3b/0x70 [ 899.027817] ? _raw_read_unlock+0x1a/0x30 [ 899.028387] ? load_misc_binary+0x813/0xb50 [ 899.028989] bprm_execve+0x9a0/0x1960 [ 899.029512] ? open_exec+0x70/0x70 [ 899.029998] ? copy_string_kernel+0x3b6/0x450 [ 899.030628] do_execveat_common+0x772/0x8d0 [ 899.031226] ? bprm_execve+0x1960/0x1960 [ 899.031807] __x64_sys_execveat+0xed/0x140 [ 899.032395] do_syscall_64+0x33/0x40 [ 899.032912] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 899.033615] RIP: 0033:0x7f5fcd8e1b19 [ 899.034129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 899.036648] RSP: 002b:00007f5fcae57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 899.037700] RAX: ffffffffffffffda RBX: 00007f5fcd9f4f60 RCX: 00007f5fcd8e1b19 [ 899.038675] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 899.039647] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 899.040628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 899.041600] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 [ 899.058390] FAULT_INJECTION: forcing a failure. [ 899.058390] name failslab, interval 1, probability 0, space 0, times 0 [ 899.061284] CPU: 1 PID: 7000 Comm: syz-executor.0 Not tainted 5.10.239 #1 17:10:53 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 899.062900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 899.065045] Call Trace: [ 899.065673] dump_stack+0x107/0x167 [ 899.066542] should_fail.cold+0x5/0xa [ 899.067442] ? create_object.isra.0+0x3a/0xa20 [ 899.068535] should_failslab+0x5/0x20 [ 899.069437] kmem_cache_alloc+0x5b/0x310 [ 899.070397] create_object.isra.0+0x3a/0xa20 [ 899.071431] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 899.072651] kmem_cache_alloc_trace+0x151/0x320 [ 899.073755] ? bprm_execve+0x9a0/0x1960 [ 899.074693] __request_module+0x2e0/0x920 [ 899.075666] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 899.076913] ? free_modprobe_argv+0x90/0x90 [ 899.077922] ? find_held_lock+0x2c/0x110 [ 899.078890] ? find_held_lock+0x2c/0x110 [ 899.079851] ? bprm_execve+0x8f8/0x1960 [ 899.080778] ? lock_downgrade+0x6d0/0x6d0 [ 899.081750] ? elf_core_dump+0x3c50/0x3c50 [ 899.082739] ? do_raw_read_unlock+0x3b/0x70 [ 899.083759] ? _raw_read_unlock+0x1a/0x30 [ 899.084723] ? load_misc_binary+0x813/0xb50 [ 899.085740] bprm_execve+0x9a0/0x1960 [ 899.086644] ? open_exec+0x70/0x70 [ 899.087475] ? copy_string_kernel+0x3b6/0x450 [ 899.088538] do_execveat_common+0x772/0x8d0 [ 899.089572] ? bprm_execve+0x1960/0x1960 [ 899.090540] __x64_sys_execveat+0xed/0x140 [ 899.091563] do_syscall_64+0x33/0x40 [ 899.092439] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 899.093637] RIP: 0033:0x7fb538afab19 [ 899.094497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 899.098775] RSP: 002b:00007fb536070188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 899.100543] RAX: ffffffffffffffda RBX: 00007fb538c0df60 RCX: 00007fb538afab19 [ 899.102197] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 899.103875] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 899.105535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 899.107200] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 17:11:06 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 17:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 17:11:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 17:11:06 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:06 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:11:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 17:11:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 911.935349] FAULT_INJECTION: forcing a failure. [ 911.935349] name failslab, interval 1, probability 0, space 0, times 0 [ 911.936714] CPU: 1 PID: 7016 Comm: syz-executor.0 Not tainted 5.10.239 #1 [ 911.937496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 911.938451] Call Trace: [ 911.938757] dump_stack+0x107/0x167 [ 911.939176] should_fail.cold+0x5/0xa [ 911.939616] ? bprm_execve+0x9a0/0x1960 [ 911.940083] should_failslab+0x5/0x20 [ 911.940517] __kmalloc_track_caller+0x79/0x370 [ 911.941037] ? __request_module+0x2fe/0x920 [ 911.941536] ? bprm_execve+0x9a0/0x1960 [ 911.941981] kstrdup+0x36/0x70 [ 911.942352] __request_module+0x2fe/0x920 [ 911.942827] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 911.943427] ? free_modprobe_argv+0x90/0x90 [ 911.943925] ? find_held_lock+0x2c/0x110 [ 911.944394] ? find_held_lock+0x2c/0x110 [ 911.944865] ? bprm_execve+0x8f8/0x1960 [ 911.945320] ? lock_downgrade+0x6d0/0x6d0 [ 911.945789] ? elf_core_dump+0x3c50/0x3c50 [ 911.946279] ? do_raw_read_unlock+0x3b/0x70 [ 911.946775] ? _raw_read_unlock+0x1a/0x30 [ 911.947250] ? load_misc_binary+0x813/0xb50 [ 911.947748] bprm_execve+0x9a0/0x1960 [ 911.948195] ? open_exec+0x70/0x70 [ 911.948598] ? copy_string_kernel+0x3b6/0x450 [ 911.949111] do_execveat_common+0x772/0x8d0 [ 911.949612] ? bprm_execve+0x1960/0x1960 [ 911.950082] __x64_sys_execveat+0xed/0x140 [ 911.950572] do_syscall_64+0x33/0x40 [ 911.951000] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 911.951580] RIP: 0033:0x7fb538afab19 [ 911.952015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 911.954138] RSP: 002b:00007fb536070188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 911.955014] RAX: ffffffffffffffda RBX: 00007fb538c0df60 RCX: 00007fb538afab19 [ 911.955845] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 911.956671] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 911.957501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 911.958326] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 [ 911.963144] FAULT_INJECTION: forcing a failure. [ 911.963144] name failslab, interval 1, probability 0, space 0, times 0 [ 911.964453] CPU: 1 PID: 7020 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 911.964821] FAULT_INJECTION: forcing a failure. [ 911.964821] name failslab, interval 1, probability 0, space 0, times 0 [ 911.965236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 911.965239] Call Trace: [ 911.965250] dump_stack+0x107/0x167 [ 911.965262] should_fail.cold+0x5/0xa [ 911.965273] ? __request_module+0x2e0/0x920 [ 911.965282] ? bprm_execve+0x9a0/0x1960 [ 911.965293] should_failslab+0x5/0x20 [ 911.965303] kmem_cache_alloc_trace+0x55/0x320 [ 911.965316] ? bprm_execve+0x9a0/0x1960 [ 911.965335] __request_module+0x2e0/0x920 [ 911.972984] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 911.973584] ? free_modprobe_argv+0x90/0x90 [ 911.974080] ? find_held_lock+0x2c/0x110 [ 911.974555] ? find_held_lock+0x2c/0x110 [ 911.975021] ? bprm_execve+0x8f8/0x1960 [ 911.975475] ? lock_downgrade+0x6d0/0x6d0 [ 911.975960] ? elf_core_dump+0x3c50/0x3c50 [ 911.976443] ? do_raw_read_unlock+0x3b/0x70 [ 911.976940] ? _raw_read_unlock+0x1a/0x30 [ 911.977414] ? load_misc_binary+0x813/0xb50 [ 911.977913] bprm_execve+0x9a0/0x1960 [ 911.978352] ? open_exec+0x70/0x70 [ 911.978757] ? copy_string_kernel+0x3b6/0x450 [ 911.979276] do_execveat_common+0x772/0x8d0 [ 911.979775] ? bprm_execve+0x1960/0x1960 [ 911.980245] __x64_sys_execveat+0xed/0x140 [ 911.980730] do_syscall_64+0x33/0x40 [ 911.981164] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 911.981748] RIP: 0033:0x7fe0737b3b19 [ 911.982168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 911.984275] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 911.985139] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 911.985955] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 911.986765] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 911.987580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 911.988401] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 [ 911.989239] CPU: 0 PID: 7019 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 911.990792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 911.992677] Call Trace: [ 911.993275] dump_stack+0x107/0x167 [ 911.994105] should_fail.cold+0x5/0xa [ 911.994964] ? jbd2__journal_start+0x190/0x7e0 [ 911.995998] should_failslab+0x5/0x20 [ 911.996854] kmem_cache_alloc+0x5b/0x310 [ 911.997779] jbd2__journal_start+0x190/0x7e0 [ 911.998770] __ext4_journal_start_sb+0x214/0x390 [ 911.999856] ext4_dirty_inode+0xbc/0x130 [ 912.000770] ? ext4_setattr+0x20f0/0x20f0 [ 912.001709] __mark_inode_dirty+0x492/0xd40 [ 912.002706] touch_atime+0x5ea/0x6e0 [ 912.003561] ? atime_needs_update+0x600/0x600 [ 912.004573] ? add_to_page_cache_locked+0x40/0x40 [ 912.005684] generic_file_buffered_read+0x191a/0x2920 [ 912.006874] ? pagecache_get_page+0xc80/0xc80 [ 912.007905] ? __lock_acquire+0xbb1/0x5b00 [ 912.008886] generic_file_read_iter+0x33f/0x490 [ 912.009954] ext4_file_read_iter+0x184/0x4c0 [ 912.010952] __kernel_read+0x593/0xb30 [ 912.011848] ? do_sendfile+0x11e0/0x11e0 [ 912.012781] ? fsnotify_perm.part.0+0x22d/0x620 [ 912.013841] ? security_file_permission+0xb1/0xe0 [ 912.014935] kernel_read+0x52/0x70 [ 912.015741] bprm_execve+0x767/0x1960 [ 912.016625] ? open_exec+0x70/0x70 [ 912.017432] ? copy_string_kernel+0x3b6/0x450 [ 912.018455] do_execveat_common+0x772/0x8d0 [ 912.019432] ? bprm_execve+0x1960/0x1960 [ 912.020385] __x64_sys_execveat+0xed/0x140 [ 912.021353] do_syscall_64+0x33/0x40 [ 912.022196] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 912.023355] RIP: 0033:0x7fd228c83b19 [ 912.024200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.028372] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 912.030093] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 912.031702] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 912.033320] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 912.034924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 912.036546] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 [ 912.047488] FAULT_INJECTION: forcing a failure. [ 912.047488] name failslab, interval 1, probability 0, space 0, times 0 [ 912.050327] CPU: 0 PID: 7031 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 912.051873] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 912.053740] Call Trace: [ 912.054336] dump_stack+0x107/0x167 [ 912.055163] should_fail.cold+0x5/0xa [ 912.056036] ? bprm_execve+0x9a0/0x1960 [ 912.056934] should_failslab+0x5/0x20 [ 912.057794] __kmalloc_track_caller+0x79/0x370 [ 912.058827] ? __request_module+0x2fe/0x920 [ 912.059814] ? bprm_execve+0x9a0/0x1960 [ 912.060709] kstrdup+0x36/0x70 [ 912.061443] __request_module+0x2fe/0x920 [ 912.062383] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 912.063583] ? free_modprobe_argv+0x90/0x90 [ 912.064563] ? find_held_lock+0x2c/0x110 [ 912.065485] ? find_held_lock+0x2c/0x110 [ 912.066408] ? bprm_execve+0x8f8/0x1960 [ 912.067305] ? lock_downgrade+0x6d0/0x6d0 [ 912.068251] ? elf_core_dump+0x3c50/0x3c50 [ 912.069204] ? do_raw_read_unlock+0x3b/0x70 [ 912.070181] ? _raw_read_unlock+0x1a/0x30 [ 912.071119] ? load_misc_binary+0x813/0xb50 [ 912.072109] bprm_execve+0x9a0/0x1960 [ 912.072987] ? open_exec+0x70/0x70 [ 912.073789] ? copy_string_kernel+0x3b6/0x450 [ 912.074808] do_execveat_common+0x772/0x8d0 [ 912.075796] ? bprm_execve+0x1960/0x1960 [ 912.076735] __x64_sys_execveat+0xed/0x140 [ 912.077698] do_syscall_64+0x33/0x40 [ 912.078544] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 912.079694] RIP: 0033:0x7f5fcd8e1b19 [ 912.080545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.084689] RSP: 002b:00007f5fcae57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 912.086408] RAX: ffffffffffffffda RBX: 00007f5fcd9f4f60 RCX: 00007f5fcd8e1b19 [ 912.088019] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 912.089634] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 912.091244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 912.092861] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 [ 912.123879] FAULT_INJECTION: forcing a failure. [ 912.123879] name failslab, interval 1, probability 0, space 0, times 0 [ 912.125277] CPU: 1 PID: 7039 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 912.126061] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 912.127012] Call Trace: [ 912.127315] dump_stack+0x107/0x167 [ 912.127734] should_fail.cold+0x5/0xa [ 912.128184] ? create_object.isra.0+0x3a/0xa20 [ 912.128702] should_failslab+0x5/0x20 [ 912.129133] kmem_cache_alloc+0x5b/0x310 [ 912.129600] create_object.isra.0+0x3a/0xa20 [ 912.130098] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 912.130686] kmem_cache_alloc_trace+0x151/0x320 [ 912.131219] ? bprm_execve+0x9a0/0x1960 [ 912.131676] __request_module+0x2e0/0x920 [ 912.132160] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 912.132755] ? free_modprobe_argv+0x90/0x90 [ 912.133242] ? find_held_lock+0x2c/0x110 [ 912.133713] ? find_held_lock+0x2c/0x110 [ 912.134179] ? bprm_execve+0x8f8/0x1960 [ 912.134638] ? lock_downgrade+0x6d0/0x6d0 [ 912.135111] ? elf_core_dump+0x3c50/0x3c50 [ 912.135599] ? do_raw_read_unlock+0x3b/0x70 [ 912.136096] ? _raw_read_unlock+0x1a/0x30 [ 912.136567] ? load_misc_binary+0x813/0xb50 [ 912.137065] bprm_execve+0x9a0/0x1960 [ 912.137504] ? open_exec+0x70/0x70 [ 912.137909] ? copy_string_kernel+0x3b6/0x450 [ 912.138423] do_execveat_common+0x772/0x8d0 [ 912.138918] ? bprm_execve+0x1960/0x1960 [ 912.139390] __x64_sys_execveat+0xed/0x140 [ 912.139888] do_syscall_64+0x33/0x40 [ 912.140312] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 912.140892] RIP: 0033:0x7fe0737b3b19 [ 912.141316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.143412] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 912.144276] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 912.145091] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 912.145901] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 912.146709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 912.147520] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 17:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 17:11:06 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:11:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 17:11:06 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 912.156736] FAULT_INJECTION: forcing a failure. [ 912.156736] name failslab, interval 1, probability 0, space 0, times 0 [ 912.159473] CPU: 0 PID: 7038 Comm: syz-executor.0 Not tainted 5.10.239 #1 [ 912.161022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 912.162955] Call Trace: [ 912.163571] dump_stack+0x107/0x167 [ 912.164429] should_fail.cold+0x5/0xa [ 912.165317] ? create_object.isra.0+0x3a/0xa20 [ 912.166383] should_failslab+0x5/0x20 [ 912.167268] kmem_cache_alloc+0x5b/0x310 [ 912.168228] create_object.isra.0+0x3a/0xa20 [ 912.169249] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 912.170435] __kmalloc_track_caller+0x177/0x370 [ 912.171520] ? __request_module+0x2fe/0x920 [ 912.172533] ? bprm_execve+0x9a0/0x1960 [ 912.173451] kstrdup+0x36/0x70 [ 912.174199] __request_module+0x2fe/0x920 [ 912.175166] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 912.176397] ? free_modprobe_argv+0x90/0x90 [ 912.177398] ? find_held_lock+0x2c/0x110 [ 912.178352] ? find_held_lock+0x2c/0x110 [ 912.179305] ? bprm_execve+0x8f8/0x1960 [ 912.180242] ? lock_downgrade+0x6d0/0x6d0 [ 912.181203] ? elf_core_dump+0x3c50/0x3c50 [ 912.182180] ? do_raw_read_unlock+0x3b/0x70 [ 912.183183] ? _raw_read_unlock+0x1a/0x30 [ 912.184159] ? load_misc_binary+0x813/0xb50 [ 912.185203] bprm_execve+0x9a0/0x1960 [ 912.186097] ? open_exec+0x70/0x70 [ 912.186924] ? copy_string_kernel+0x3b6/0x450 [ 912.187987] do_execveat_common+0x772/0x8d0 [ 912.188993] ? bprm_execve+0x1960/0x1960 [ 912.189957] __x64_sys_execveat+0xed/0x140 [ 912.190961] do_syscall_64+0x33/0x40 [ 912.191836] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 912.193027] RIP: 0033:0x7fb538afab19 [ 912.193881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.198037] RSP: 002b:00007fb536070188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 912.199748] RAX: ffffffffffffffda RBX: 00007fb538c0df60 RCX: 00007fb538afab19 [ 912.201364] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 912.202967] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 912.204582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 912.206192] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 17:11:06 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:06 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:06 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 17:11:06 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:06 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 912.339708] FAULT_INJECTION: forcing a failure. [ 912.339708] name failslab, interval 1, probability 0, space 0, times 0 [ 912.342205] CPU: 0 PID: 7056 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 912.343531] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 912.345153] Call Trace: [ 912.345666] dump_stack+0x107/0x167 [ 912.346381] should_fail.cold+0x5/0xa [ 912.347134] ? bprm_execve+0x9a0/0x1960 [ 912.347917] should_failslab+0x5/0x20 [ 912.348665] __kmalloc_track_caller+0x79/0x370 [ 912.349561] ? __request_module+0x2fe/0x920 [ 912.350415] ? bprm_execve+0x9a0/0x1960 [ 912.351188] kstrdup+0x36/0x70 [ 912.351828] __request_module+0x2fe/0x920 [ 912.352642] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 912.353645] ? free_modprobe_argv+0x90/0x90 [ 912.354492] ? find_held_lock+0x2c/0x110 [ 912.355289] ? find_held_lock+0x2c/0x110 [ 912.356096] ? bprm_execve+0x8f8/0x1960 [ 912.356879] ? lock_downgrade+0x6d0/0x6d0 [ 912.357704] ? elf_core_dump+0x3c50/0x3c50 [ 912.358512] ? do_raw_read_unlock+0x3b/0x70 [ 912.359352] ? _raw_read_unlock+0x1a/0x30 [ 912.360154] ? load_misc_binary+0x813/0xb50 [ 912.361001] bprm_execve+0x9a0/0x1960 [ 912.361750] ? open_exec+0x70/0x70 [ 912.362452] ? copy_string_kernel+0x3b6/0x450 [ 912.363339] do_execveat_common+0x772/0x8d0 [ 912.364199] ? bprm_execve+0x1960/0x1960 [ 912.365017] __x64_sys_execveat+0xed/0x140 [ 912.365837] do_syscall_64+0x33/0x40 [ 912.366576] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 912.367559] RIP: 0033:0x7fe0737b3b19 [ 912.368293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.371929] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 912.373983] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 912.375916] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 912.377776] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 912.379420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 912.381067] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 17:11:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 17:11:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 17:11:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:07 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:07 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:11:07 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 912.461302] FAULT_INJECTION: forcing a failure. [ 912.461302] name failslab, interval 1, probability 0, space 0, times 0 [ 912.463829] CPU: 0 PID: 7068 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 912.465263] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 912.467014] Call Trace: [ 912.467573] dump_stack+0x107/0x167 [ 912.468355] should_fail.cold+0x5/0xa [ 912.469163] ? __request_module+0x2e0/0x920 [ 912.470071] ? bprm_execve+0x9a0/0x1960 [ 912.470898] should_failslab+0x5/0x20 [ 912.471697] kmem_cache_alloc_trace+0x55/0x320 [ 912.472707] ? bprm_execve+0x9a0/0x1960 [ 912.473540] __request_module+0x2e0/0x920 [ 912.474420] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 912.475560] ? free_modprobe_argv+0x90/0x90 [ 912.476220] FAULT_INJECTION: forcing a failure. [ 912.476220] name failslab, interval 1, probability 0, space 0, times 0 [ 912.476780] ? find_held_lock+0x2c/0x110 [ 912.476815] ? find_held_lock+0x2c/0x110 [ 912.480149] ? bprm_execve+0x8f8/0x1960 [ 912.480983] ? lock_downgrade+0x6d0/0x6d0 [ 912.481849] ? elf_core_dump+0x3c50/0x3c50 [ 912.482735] ? do_raw_read_unlock+0x3b/0x70 [ 912.483640] ? _raw_read_unlock+0x1a/0x30 [ 912.484514] ? load_misc_binary+0x813/0xb50 [ 912.485426] bprm_execve+0x9a0/0x1960 [ 912.486235] ? open_exec+0x70/0x70 [ 912.486983] ? copy_string_kernel+0x3b6/0x450 [ 912.487938] do_execveat_common+0x772/0x8d0 [ 912.488846] ? bprm_execve+0x1960/0x1960 [ 912.489714] __x64_sys_execveat+0xed/0x140 [ 912.490604] do_syscall_64+0x33/0x40 [ 912.491385] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 912.492464] RIP: 0033:0x7f5fcd8e1b19 [ 912.493246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.497110] RSP: 002b:00007f5fcae57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 912.498702] RAX: ffffffffffffffda RBX: 00007f5fcd9f4f60 RCX: 00007f5fcd8e1b19 [ 912.500202] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 912.501701] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 912.503190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 912.504686] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 [ 912.506207] CPU: 1 PID: 7074 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 912.506999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 912.507948] Call Trace: [ 912.508255] dump_stack+0x107/0x167 [ 912.508668] should_fail.cold+0x5/0xa [ 912.509104] ? create_object.isra.0+0x3a/0xa20 [ 912.509625] should_failslab+0x5/0x20 [ 912.510063] kmem_cache_alloc+0x5b/0x310 [ 912.510525] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 912.511151] create_object.isra.0+0x3a/0xa20 [ 912.511645] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 912.512244] kmem_cache_alloc+0x159/0x310 [ 912.512717] security_file_alloc+0x34/0x170 [ 912.513213] __alloc_file+0xb7/0x320 [ 912.513637] alloc_empty_file+0x6d/0x170 [ 912.514099] path_openat+0xe6/0x2770 [ 912.514529] ? lock_chain_count+0x20/0x20 [ 912.515020] ? stack_trace_consume_entry+0x160/0x160 [ 912.515603] ? path_lookupat+0x860/0x860 [ 912.516076] ? kasan_save_stack+0x32/0x40 [ 912.516549] ? kasan_save_stack+0x1b/0x40 [ 912.517019] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 912.517596] ? security_prepare_creds+0x112/0x190 [ 912.518142] ? prepare_creds+0x452/0x5e0 [ 912.518612] ? prepare_exec_creds+0xd/0x260 [ 912.519114] do_filp_open+0x190/0x3e0 [ 912.519548] ? may_open_dev+0xf0/0xf0 [ 912.520002] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 912.520603] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 912.521234] ? find_held_lock+0x2c/0x110 [ 912.521698] do_open_execat+0x116/0x740 [ 912.522152] ? bprm_execve+0x49d/0x1960 [ 912.522617] ? __do_sys_uselib+0x6a0/0x6a0 [ 912.523105] ? do_raw_spin_lock+0x121/0x260 [ 912.523596] ? rwlock_bug.part.0+0x90/0x90 [ 912.524092] bprm_execve+0x4dc/0x1960 [ 912.524524] ? count.constprop.0+0x1b3/0x290 [ 912.525026] ? open_exec+0x70/0x70 [ 912.525433] ? copy_string_kernel+0x3b6/0x450 [ 912.525953] do_execveat_common+0x772/0x8d0 [ 912.526444] ? bprm_execve+0x1960/0x1960 [ 912.526920] __x64_sys_execveat+0xed/0x140 [ 912.527403] do_syscall_64+0x33/0x40 [ 912.527844] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 912.528438] RIP: 0033:0x7fd228c83b19 [ 912.528863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.530962] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 912.531837] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 912.532661] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 912.533478] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 912.534299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 912.535132] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 17:11:07 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 17:11:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 17:11:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 17:11:18 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:11:18 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) [ 924.329934] FAULT_INJECTION: forcing a failure. [ 924.329934] name failslab, interval 1, probability 0, space 0, times 0 [ 924.331367] CPU: 1 PID: 7094 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 924.332166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 924.333129] Call Trace: [ 924.333438] dump_stack+0x107/0x167 [ 924.333857] should_fail.cold+0x5/0xa 17:11:19 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 924.334301] ? create_object.isra.0+0x3a/0xa20 [ 924.334998] should_failslab+0x5/0x20 [ 924.335447] kmem_cache_alloc+0x5b/0x310 [ 924.335940] create_object.isra.0+0x3a/0xa20 [ 924.336458] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 924.337057] __kmalloc_track_caller+0x177/0x370 [ 924.337600] ? __request_module+0x2fe/0x920 [ 924.338118] ? bprm_execve+0x9a0/0x1960 [ 924.338587] kstrdup+0x36/0x70 [ 924.338958] __request_module+0x2fe/0x920 [ 924.339446] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 924.340069] ? free_modprobe_argv+0x90/0x90 [ 924.340576] ? find_held_lock+0x2c/0x110 [ 924.341061] ? find_held_lock+0x2c/0x110 [ 924.341537] ? bprm_execve+0x8f8/0x1960 [ 924.342004] ? lock_downgrade+0x6d0/0x6d0 [ 924.342491] ? elf_core_dump+0x3c50/0x3c50 [ 924.342991] ? do_raw_read_unlock+0x3b/0x70 [ 924.343368] FAULT_INJECTION: forcing a failure. [ 924.343368] name failslab, interval 1, probability 0, space 0, times 0 [ 924.343491] ? _raw_read_unlock+0x1a/0x30 [ 924.343510] ? load_misc_binary+0x813/0xb50 [ 924.347332] bprm_execve+0x9a0/0x1960 [ 924.347781] ? open_exec+0x70/0x70 [ 924.348210] ? copy_string_kernel+0x3b6/0x450 [ 924.348743] do_execveat_common+0x772/0x8d0 [ 924.349257] ? bprm_execve+0x1960/0x1960 [ 924.349732] __x64_sys_execveat+0xed/0x140 [ 924.350240] do_syscall_64+0x33/0x40 [ 924.350680] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 924.351271] RIP: 0033:0x7fe0737b3b19 [ 924.351707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.353818] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 924.354719] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 924.355545] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 924.356400] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.357245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.358087] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 [ 924.359077] CPU: 0 PID: 7098 Comm: syz-executor.0 Not tainted 5.10.239 #1 [ 924.360871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 924.363013] Call Trace: [ 924.363693] dump_stack+0x107/0x167 [ 924.364778] should_fail.cold+0x5/0xa [ 924.365805] ? call_usermodehelper_setup+0xa2/0x2f0 [ 924.367093] should_failslab+0x5/0x20 [ 924.368093] kmem_cache_alloc_trace+0x55/0x320 [ 924.369271] call_usermodehelper_setup+0xa2/0x2f0 [ 924.370503] ? copy_regset_to_user+0x170/0x170 [ 924.371682] ? bprm_execve+0x9a0/0x1960 [ 924.372683] __request_module+0x3f9/0x920 [ 924.373578] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 924.374710] ? free_modprobe_argv+0x90/0x90 [ 924.375716] ? find_held_lock+0x2c/0x110 [ 924.376693] ? find_held_lock+0x2c/0x110 [ 924.377613] ? bprm_execve+0x8f8/0x1960 [ 924.378561] ? lock_downgrade+0x6d0/0x6d0 [ 924.379451] ? elf_core_dump+0x3c50/0x3c50 [ 924.380379] ? do_raw_read_unlock+0x3b/0x70 [ 924.381404] ? _raw_read_unlock+0x1a/0x30 [ 924.382299] ? load_misc_binary+0x813/0xb50 [ 924.383236] bprm_execve+0x9a0/0x1960 [ 924.384079] ? open_exec+0x70/0x70 [ 924.384846] ? copy_string_kernel+0x3b6/0x450 [ 924.385820] do_execveat_common+0x772/0x8d0 [ 924.386753] ? bprm_execve+0x1960/0x1960 [ 924.387646] __x64_sys_execveat+0xed/0x140 [ 924.388574] do_syscall_64+0x33/0x40 [ 924.389380] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 924.390487] RIP: 0033:0x7fb538afab19 [ 924.391321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.394833] FAULT_INJECTION: forcing a failure. [ 924.394833] name failslab, interval 1, probability 0, space 0, times 0 [ 924.395415] RSP: 002b:00007fb536070188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 924.395436] RAX: ffffffffffffffda RBX: 00007fb538c0df60 RCX: 00007fb538afab19 [ 924.395447] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 924.395457] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.395467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.395477] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 [ 924.402302] CPU: 1 PID: 7100 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 924.403098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 924.404066] Call Trace: [ 924.404382] dump_stack+0x107/0x167 [ 924.404819] should_fail.cold+0x5/0xa [ 924.405272] ? __request_module+0x2e0/0x920 [ 924.405776] ? bprm_execve+0x9a0/0x1960 [ 924.406250] should_failslab+0x5/0x20 [ 924.406698] kmem_cache_alloc_trace+0x55/0x320 [ 924.407237] ? bprm_execve+0x9a0/0x1960 [ 924.407704] __request_module+0x2e0/0x920 [ 924.408200] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 924.408811] ? free_modprobe_argv+0x90/0x90 [ 924.409317] ? find_held_lock+0x2c/0x110 [ 924.409796] ? find_held_lock+0x2c/0x110 [ 924.410272] ? bprm_execve+0x8f8/0x1960 [ 924.410735] ? lock_downgrade+0x6d0/0x6d0 [ 924.411223] ? elf_core_dump+0x3c50/0x3c50 [ 924.411724] ? do_raw_read_unlock+0x3b/0x70 [ 924.412233] ? _raw_read_unlock+0x1a/0x30 [ 924.412717] ? load_misc_binary+0x813/0xb50 [ 924.413228] bprm_execve+0x9a0/0x1960 [ 924.413677] ? open_exec+0x70/0x70 [ 924.414095] ? copy_string_kernel+0x3b6/0x450 [ 924.414624] do_execveat_common+0x772/0x8d0 [ 924.415128] ? bprm_execve+0x1960/0x1960 [ 924.415611] __x64_sys_execveat+0xed/0x140 [ 924.416127] do_syscall_64+0x33/0x40 [ 924.416569] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 924.417168] RIP: 0033:0x7fd228c83b19 [ 924.417602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.419759] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 924.420664] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 924.421507] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 924.422346] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.423184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.424030] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 [ 924.446884] FAULT_INJECTION: forcing a failure. [ 924.446884] name failslab, interval 1, probability 0, space 0, times 0 [ 924.449786] CPU: 0 PID: 7088 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 924.451327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 924.453202] Call Trace: [ 924.453811] dump_stack+0x107/0x167 [ 924.454616] should_fail.cold+0x5/0xa [ 924.455472] ? create_object.isra.0+0x3a/0xa20 [ 924.456549] should_failslab+0x5/0x20 [ 924.457377] kmem_cache_alloc+0x5b/0x310 [ 924.458340] create_object.isra.0+0x3a/0xa20 [ 924.459305] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 924.460487] __kmalloc_track_caller+0x177/0x370 [ 924.461516] ? __request_module+0x2fe/0x920 [ 924.462461] ? bprm_execve+0x9a0/0x1960 [ 924.463394] kstrdup+0x36/0x70 [ 924.464109] __request_module+0x2fe/0x920 [ 924.464996] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 924.466200] ? free_modprobe_argv+0x90/0x90 [ 924.467110] ? find_held_lock+0x2c/0x110 [ 924.468096] ? find_held_lock+0x2c/0x110 [ 924.468992] ? bprm_execve+0x8f8/0x1960 [ 924.469913] ? lock_downgrade+0x6d0/0x6d0 [ 924.470841] ? elf_core_dump+0x3c50/0x3c50 [ 924.471750] ? do_raw_read_unlock+0x3b/0x70 [ 924.472667] ? _raw_read_unlock+0x1a/0x30 [ 924.473677] ? load_misc_binary+0x813/0xb50 [ 924.474595] bprm_execve+0x9a0/0x1960 [ 924.475412] ? open_exec+0x70/0x70 [ 924.476230] ? copy_string_kernel+0x3b6/0x450 [ 924.477301] do_execveat_common+0x772/0x8d0 [ 924.478246] ? bprm_execve+0x1960/0x1960 [ 924.479233] __x64_sys_execveat+0xed/0x140 [ 924.480166] do_syscall_64+0x33/0x40 [ 924.480993] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 924.482166] RIP: 0033:0x7f5fcd8e1b19 [ 924.482996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.487063] RSP: 002b:00007f5fcae57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 924.488787] RAX: ffffffffffffffda RBX: 00007f5fcd9f4f60 RCX: 00007f5fcd8e1b19 [ 924.490286] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 924.491879] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.493473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.495049] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 17:11:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) [ 924.520796] FAULT_INJECTION: forcing a failure. [ 924.520796] name failslab, interval 1, probability 0, space 0, times 0 [ 924.522208] CPU: 1 PID: 7105 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 924.522989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 924.523951] Call Trace: [ 924.524258] dump_stack+0x107/0x167 [ 924.524673] should_fail.cold+0x5/0xa [ 924.525111] ? create_object.isra.0+0x3a/0xa20 [ 924.525639] should_failslab+0x5/0x20 [ 924.526078] kmem_cache_alloc+0x5b/0x310 [ 924.526543] create_object.isra.0+0x3a/0xa20 [ 924.527039] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 924.527622] kmem_cache_alloc_trace+0x151/0x320 [ 924.528171] ? bprm_execve+0x9a0/0x1960 [ 924.528629] __request_module+0x2e0/0x920 [ 924.529103] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 924.529699] ? free_modprobe_argv+0x90/0x90 [ 924.530189] ? find_held_lock+0x2c/0x110 [ 924.530659] ? find_held_lock+0x2c/0x110 [ 924.531127] ? bprm_execve+0x8f8/0x1960 [ 924.531579] ? lock_downgrade+0x6d0/0x6d0 [ 924.532061] ? elf_core_dump+0x3c50/0x3c50 [ 924.532544] ? do_raw_read_unlock+0x3b/0x70 [ 924.533038] ? _raw_read_unlock+0x1a/0x30 [ 924.533547] ? load_misc_binary+0x813/0xb50 [ 924.534041] bprm_execve+0x9a0/0x1960 [ 924.534480] ? open_exec+0x70/0x70 [ 924.534884] ? copy_string_kernel+0x3b6/0x450 [ 924.535398] do_execveat_common+0x772/0x8d0 [ 924.535898] ? bprm_execve+0x1960/0x1960 [ 924.536367] __x64_sys_execveat+0xed/0x140 [ 924.536850] do_syscall_64+0x33/0x40 [ 924.537274] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 924.537858] RIP: 0033:0x7fd228c83b19 [ 924.538282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.540385] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 924.541256] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 924.542066] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 924.542877] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.543683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.544504] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 17:11:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 17:11:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 17:11:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 17:11:31 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:31 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 17:11:31 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 936.442855] FAULT_INJECTION: forcing a failure. [ 936.442855] name failslab, interval 1, probability 0, space 0, times 0 [ 936.445957] CPU: 1 PID: 7128 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 936.447730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 936.449914] Call Trace: [ 936.450625] dump_stack+0x107/0x167 [ 936.451573] should_fail.cold+0x5/0xa [ 936.452583] ? bprm_execve+0x9a0/0x1960 [ 936.453596] should_failslab+0x5/0x20 [ 936.454557] __kmalloc_track_caller+0x79/0x370 [ 936.455714] ? __request_module+0x2fe/0x920 [ 936.456830] ? bprm_execve+0x9a0/0x1960 [ 936.457836] kstrdup+0x36/0x70 [ 936.458657] __request_module+0x2fe/0x920 [ 936.459710] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 936.461077] ? free_modprobe_argv+0x90/0x90 [ 936.462195] ? find_held_lock+0x2c/0x110 [ 936.463349] ? find_held_lock+0x2c/0x110 [ 936.464629] ? bprm_execve+0x8f8/0x1960 [ 936.465657] ? lock_downgrade+0x6d0/0x6d0 [ 936.466789] ? elf_core_dump+0x3c50/0x3c50 [ 936.468049] ? do_raw_read_unlock+0x3b/0x70 [ 936.469184] ? _raw_read_unlock+0x1a/0x30 [ 936.470238] ? load_misc_binary+0x813/0xb50 [ 936.471350] bprm_execve+0x9a0/0x1960 [ 936.472359] ? open_exec+0x70/0x70 [ 936.473271] ? copy_string_kernel+0x3b6/0x450 [ 936.474446] do_execveat_common+0x772/0x8d0 [ 936.475555] ? bprm_execve+0x1960/0x1960 [ 936.476619] __x64_sys_execveat+0xed/0x140 [ 936.477701] do_syscall_64+0x33/0x40 [ 936.478650] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 936.479967] RIP: 0033:0x7fd228c83b19 [ 936.480957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 936.485626] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 936.487545] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 936.489358] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 936.489592] FAULT_INJECTION: forcing a failure. [ 936.489592] name failslab, interval 1, probability 0, space 0, times 0 [ 936.491166] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 936.491178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 936.491190] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 [ 936.492869] FAULT_INJECTION: forcing a failure. [ 936.492869] name failslab, interval 1, probability 0, space 0, times 0 [ 936.493477] CPU: 0 PID: 7122 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 936.493484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 936.493487] Call Trace: [ 936.493504] dump_stack+0x107/0x167 [ 936.493518] should_fail.cold+0x5/0xa [ 936.493544] ? create_object.isra.0+0x3a/0xa20 [ 936.500908] should_failslab+0x5/0x20 [ 936.501361] kmem_cache_alloc+0x5b/0x310 [ 936.501841] create_object.isra.0+0x3a/0xa20 [ 936.502365] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 936.502968] kmem_cache_alloc_trace+0x151/0x320 [ 936.503526] call_usermodehelper_setup+0xa2/0x2f0 [ 936.504112] ? copy_regset_to_user+0x170/0x170 [ 936.504648] ? bprm_execve+0x9a0/0x1960 [ 936.505116] __request_module+0x3f9/0x920 [ 936.505600] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 936.506221] ? free_modprobe_argv+0x90/0x90 [ 936.506728] ? find_held_lock+0x2c/0x110 [ 936.507216] ? bprm_execve+0x8f8/0x1960 [ 936.507685] ? lock_downgrade+0x6d0/0x6d0 [ 936.508193] ? elf_core_dump+0x3c50/0x3c50 [ 936.508686] ? do_raw_read_unlock+0x3b/0x70 [ 936.509200] ? _raw_read_unlock+0x1a/0x30 [ 936.509683] ? load_misc_binary+0x813/0xb50 [ 936.510200] bprm_execve+0x9a0/0x1960 [ 936.510650] ? open_exec+0x70/0x70 [ 936.511073] ? copy_string_kernel+0x3b6/0x450 [ 936.511607] do_execveat_common+0x772/0x8d0 [ 936.512128] ? bprm_execve+0x1960/0x1960 [ 936.512613] __x64_sys_execveat+0xed/0x140 [ 936.513121] do_syscall_64+0x33/0x40 [ 936.513557] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 936.514167] RIP: 0033:0x7f5fcd8e1b19 [ 936.514605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 936.516783] RSP: 002b:00007f5fcae57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 936.517686] RAX: ffffffffffffffda RBX: 00007f5fcd9f4f60 RCX: 00007f5fcd8e1b19 [ 936.518532] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 936.519375] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 936.520226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 936.521066] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 [ 936.521947] CPU: 1 PID: 7123 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 936.523658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 936.525742] Call Trace: [ 936.526403] dump_stack+0x107/0x167 [ 936.527310] should_fail.cold+0x5/0xa [ 936.527745] FAULT_INJECTION: forcing a failure. [ 936.527745] name failslab, interval 1, probability 0, space 0, times 0 [ 936.528265] ? call_usermodehelper_setup+0xa2/0x2f0 [ 936.528292] should_failslab+0x5/0x20 [ 936.531693] kmem_cache_alloc_trace+0x55/0x320 [ 936.532843] call_usermodehelper_setup+0xa2/0x2f0 [ 936.534030] ? copy_regset_to_user+0x170/0x170 [ 936.535158] ? bprm_execve+0x9a0/0x1960 [ 936.536150] __request_module+0x3f9/0x920 [ 936.537191] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 936.538482] ? free_modprobe_argv+0x90/0x90 [ 936.539539] ? find_held_lock+0x2c/0x110 [ 936.540573] ? find_held_lock+0x2c/0x110 [ 936.541584] ? bprm_execve+0x8f8/0x1960 [ 936.542569] ? lock_downgrade+0x6d0/0x6d0 [ 936.543575] ? elf_core_dump+0x3c50/0x3c50 [ 936.544606] ? do_raw_read_unlock+0x3b/0x70 [ 936.545651] ? _raw_read_unlock+0x1a/0x30 [ 936.546654] ? load_misc_binary+0x813/0xb50 [ 936.547711] bprm_execve+0x9a0/0x1960 [ 936.548667] ? open_exec+0x70/0x70 [ 936.549535] ? copy_string_kernel+0x3b6/0x450 [ 936.550645] do_execveat_common+0x772/0x8d0 [ 936.551697] ? bprm_execve+0x1960/0x1960 [ 936.552710] __x64_sys_execveat+0xed/0x140 [ 936.553741] do_syscall_64+0x33/0x40 [ 936.554657] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 936.555900] RIP: 0033:0x7fe0737b3b19 [ 936.556826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 936.561388] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 936.563226] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 936.564954] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 936.566707] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 936.568443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 936.570158] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 [ 936.571891] CPU: 0 PID: 7115 Comm: syz-executor.0 Not tainted 5.10.239 #1 [ 936.572716] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 936.573687] Call Trace: [ 936.573998] dump_stack+0x107/0x167 [ 936.574429] should_fail.cold+0x5/0xa [ 936.574886] ? create_object.isra.0+0x3a/0xa20 [ 936.575426] should_failslab+0x5/0x20 [ 936.575871] kmem_cache_alloc+0x5b/0x310 [ 936.576361] create_object.isra.0+0x3a/0xa20 [ 936.576871] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 936.577466] kmem_cache_alloc_trace+0x151/0x320 [ 936.578015] call_usermodehelper_setup+0xa2/0x2f0 [ 936.578575] ? copy_regset_to_user+0x170/0x170 [ 936.579136] ? bprm_execve+0x9a0/0x1960 [ 936.579608] __request_module+0x3f9/0x920 [ 936.580113] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 936.580732] ? free_modprobe_argv+0x90/0x90 [ 936.581237] ? find_held_lock+0x2c/0x110 [ 936.581715] ? find_held_lock+0x2c/0x110 [ 936.582190] ? bprm_execve+0x8f8/0x1960 [ 936.582654] ? lock_downgrade+0x6d0/0x6d0 [ 936.583139] ? elf_core_dump+0x3c50/0x3c50 [ 936.583635] ? do_raw_read_unlock+0x3b/0x70 [ 936.584152] ? _raw_read_unlock+0x1a/0x30 [ 936.584636] ? load_misc_binary+0x813/0xb50 [ 936.585137] bprm_execve+0x9a0/0x1960 [ 936.585584] ? open_exec+0x70/0x70 [ 936.585999] ? copy_string_kernel+0x3b6/0x450 [ 936.586522] do_execveat_common+0x772/0x8d0 [ 936.587031] ? bprm_execve+0x1960/0x1960 [ 936.587516] __x64_sys_execveat+0xed/0x140 [ 936.588017] do_syscall_64+0x33/0x40 [ 936.588454] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 936.589050] RIP: 0033:0x7fb538afab19 [ 936.589482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 936.591639] RSP: 002b:00007fb536070188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 936.592536] RAX: ffffffffffffffda RBX: 00007fb538c0df60 RCX: 00007fb538afab19 [ 936.593374] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 936.594208] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 936.595045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 936.595882] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 17:11:31 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:31 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:31 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:11:31 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 17:11:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x000000000000', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:31 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 936.836291] FAULT_INJECTION: forcing a failure. [ 936.836291] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 936.837850] CPU: 0 PID: 7148 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 936.838634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 936.839582] Call Trace: [ 936.839885] dump_stack+0x107/0x167 [ 936.840307] should_fail.cold+0x5/0xa [ 936.840745] __alloc_pages_nodemask+0x182/0x600 [ 936.841285] ? mark_held_locks+0x9e/0xe0 [ 936.841750] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 936.842443] ? kmem_cache_free+0xa7/0x2d0 [ 936.842916] alloc_pages_current+0x187/0x280 [ 936.843418] __get_free_pages+0xc/0xa0 [ 936.843859] ? kmem_cache_free+0x249/0x2d0 [ 936.844353] tlb_remove_table+0x3ca/0xcb0 [ 936.844831] ___pte_free_tlb+0x86/0xb0 [ 936.845280] free_pgd_range+0x747/0x1380 [ 936.845749] free_pgtables+0x230/0x2f0 [ 936.846197] exit_mmap+0x28e/0x4f0 [ 936.846604] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 936.847213] mmput+0xca/0x340 [ 936.847574] free_bprm+0x65/0x2e0 [ 936.847978] do_execveat_common+0x2e1/0x8d0 [ 936.848473] ? bprm_execve+0x1960/0x1960 [ 936.848947] __x64_sys_execveat+0xed/0x140 [ 936.849432] do_syscall_64+0x33/0x40 [ 936.849857] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 936.850439] RIP: 0033:0x7f5fcd8e1b19 [ 936.850864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 936.852973] RSP: 002b:00007f5fcae57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 936.853838] RAX: ffffffffffffffda RBX: 00007f5fcd9f4f60 RCX: 00007f5fcd8e1b19 [ 936.854655] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 936.855473] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 936.856298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 936.857121] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 17:11:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 17:11:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 17:11:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 17:11:47 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 17:11:47 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:11:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fow', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x000000000000', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 953.165589] FAULT_INJECTION: forcing a failure. [ 953.165589] name failslab, interval 1, probability 0, space 0, times 0 [ 953.168262] CPU: 0 PID: 7168 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 953.169626] FAULT_INJECTION: forcing a failure. [ 953.169626] name failslab, interval 1, probability 0, space 0, times 0 [ 953.169706] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.169721] Call Trace: [ 953.174568] dump_stack+0x107/0x167 [ 953.175343] should_fail.cold+0x5/0xa [ 953.176165] ? create_object.isra.0+0x3a/0xa20 [ 953.177133] should_failslab+0x5/0x20 [ 953.177936] kmem_cache_alloc+0x5b/0x310 [ 953.178800] create_object.isra.0+0x3a/0xa20 [ 953.179725] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 953.180821] kmem_cache_alloc_trace+0x151/0x320 [ 953.181821] call_usermodehelper_setup+0xa2/0x2f0 [ 953.182837] ? copy_regset_to_user+0x170/0x170 [ 953.183808] ? bprm_execve+0x9a0/0x1960 [ 953.184652] __request_module+0x3f9/0x920 [ 953.185532] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 953.186639] ? free_modprobe_argv+0x90/0x90 [ 953.187558] ? find_held_lock+0x2c/0x110 [ 953.188435] ? find_held_lock+0x2c/0x110 [ 953.189305] ? bprm_execve+0x8f8/0x1960 [ 953.190144] ? lock_downgrade+0x6d0/0x6d0 [ 953.191021] ? elf_core_dump+0x3c50/0x3c50 [ 953.191910] ? do_raw_read_unlock+0x3b/0x70 [ 953.192828] ? _raw_read_unlock+0x1a/0x30 [ 953.193700] ? load_misc_binary+0x813/0xb50 [ 953.194626] bprm_execve+0x9a0/0x1960 [ 953.195444] ? open_exec+0x70/0x70 [ 953.196204] ? copy_string_kernel+0x3b6/0x450 [ 953.197160] do_execveat_common+0x772/0x8d0 [ 953.198075] ? bprm_execve+0x1960/0x1960 [ 953.198948] __x64_sys_execveat+0xed/0x140 [ 953.199847] do_syscall_64+0x33/0x40 [ 953.200645] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.201734] RIP: 0033:0x7fe0737b3b19 [ 953.202525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.206422] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 953.208031] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 953.209542] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 953.211049] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.212573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 953.214082] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 [ 953.215625] CPU: 1 PID: 7170 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 953.217252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.219146] Call Trace: [ 953.219761] dump_stack+0x107/0x167 [ 953.220598] should_fail.cold+0x5/0xa [ 953.221464] ? create_object.isra.0+0x3a/0xa20 [ 953.222500] should_failslab+0x5/0x20 [ 953.223368] kmem_cache_alloc+0x5b/0x310 [ 953.224304] create_object.isra.0+0x3a/0xa20 [ 953.225309] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 953.226462] __kmalloc_track_caller+0x177/0x370 [ 953.227518] ? __request_module+0x2fe/0x920 [ 953.228524] ? bprm_execve+0x9a0/0x1960 [ 953.229416] kstrdup+0x36/0x70 [ 953.230147] __request_module+0x2fe/0x920 [ 953.231086] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 953.232284] ? free_modprobe_argv+0x90/0x90 [ 953.233253] ? find_held_lock+0x2c/0x110 [ 953.234180] ? find_held_lock+0x2c/0x110 [ 953.235107] ? bprm_execve+0x8f8/0x1960 [ 953.236004] ? lock_downgrade+0x6d0/0x6d0 [ 953.236945] ? elf_core_dump+0x3c50/0x3c50 [ 953.237895] ? do_raw_read_unlock+0x3b/0x70 [ 953.238865] ? _raw_read_unlock+0x1a/0x30 [ 953.239815] ? load_misc_binary+0x813/0xb50 [ 953.240820] bprm_execve+0x9a0/0x1960 [ 953.241694] ? open_exec+0x70/0x70 [ 953.242496] ? copy_string_kernel+0x3b6/0x450 [ 953.243516] do_execveat_common+0x772/0x8d0 [ 953.244506] ? bprm_execve+0x1960/0x1960 [ 953.245452] __x64_sys_execveat+0xed/0x140 [ 953.246420] do_syscall_64+0x33/0x40 [ 953.247261] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.248426] RIP: 0033:0x7fd228c83b19 [ 953.249266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.253441] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 953.255175] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 953.256796] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 953.258430] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.260072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 953.261702] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 [ 953.267790] FAULT_INJECTION: forcing a failure. [ 953.267790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.270984] CPU: 1 PID: 7160 Comm: syz-executor.4 Not tainted 5.10.239 #1 [ 953.272557] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.274452] Call Trace: [ 953.275057] dump_stack+0x107/0x167 [ 953.275892] should_fail.cold+0x5/0xa [ 953.276777] _copy_to_user+0x2e/0x180 [ 953.277649] simple_read_from_buffer+0xcc/0x160 [ 953.278726] proc_fail_nth_read+0x198/0x230 [ 953.279718] ? proc_sessionid_read+0x230/0x230 [ 953.280763] ? security_file_permission+0xb1/0xe0 [ 953.281865] ? proc_sessionid_read+0x230/0x230 [ 953.282925] vfs_read+0x228/0x620 [ 953.283727] ksys_read+0x12d/0x260 [ 953.284558] ? vfs_write+0xb10/0xb10 [ 953.285412] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.286601] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.287771] do_syscall_64+0x33/0x40 [ 953.288630] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.289790] RIP: 0033:0x7f5fcd89469c [ 953.290630] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 953.292230] FAULT_INJECTION: forcing a failure. [ 953.292230] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 953.294901] RSP: 002b:00007f5fcae57170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 953.294950] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f5fcd89469c [ 953.294962] RDX: 000000000000000f RSI: 00007f5fcae571e0 RDI: 0000000000000004 [ 953.294973] RBP: 00007f5fcae571d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.294993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 953.305812] R13: 00007ffc195aed5f R14: 00007f5fcae57300 R15: 0000000000022000 [ 953.307454] CPU: 0 PID: 7171 Comm: syz-executor.0 Not tainted 5.10.239 #1 [ 953.308913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.310678] Call Trace: [ 953.311246] dump_stack+0x107/0x167 [ 953.312018] should_fail.cold+0x5/0xa [ 953.312845] __alloc_pages_nodemask+0x182/0x600 [ 953.313832] ? mark_held_locks+0x9e/0xe0 [ 953.314692] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 953.315979] ? kmem_cache_free+0xa7/0x2d0 [ 953.316873] alloc_pages_current+0x187/0x280 [ 953.317810] __get_free_pages+0xc/0xa0 [ 953.318632] ? kmem_cache_free+0x249/0x2d0 [ 953.319525] tlb_remove_table+0x3ca/0xcb0 [ 953.320419] ___pte_free_tlb+0x86/0xb0 [ 953.321247] free_pgd_range+0x747/0x1380 [ 953.322130] free_pgtables+0x230/0x2f0 [ 953.322959] exit_mmap+0x28e/0x4f0 [ 953.323710] ? __mutex_unlock_slowpath+0x2b3/0x600 [ 953.324762] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 953.325894] mmput+0xca/0x340 [ 953.326561] free_bprm+0x65/0x2e0 [ 953.327296] do_execveat_common+0x2e1/0x8d0 [ 953.328222] ? bprm_execve+0x1960/0x1960 [ 953.329105] __x64_sys_execveat+0xed/0x140 [ 953.330015] do_syscall_64+0x33/0x40 [ 953.330805] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.331893] RIP: 0033:0x7fb538afab19 [ 953.332691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.336604] RSP: 002b:00007fb536070188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 953.338217] RAX: ffffffffffffffda RBX: 00007fb538c0df60 RCX: 00007fb538afab19 [ 953.339726] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 953.341240] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.342755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 953.344275] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 17:11:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:48 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:11:48 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:11:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x000000000000', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:11:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 17:11:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) [ 953.597350] FAULT_INJECTION: forcing a failure. [ 953.597350] name failslab, interval 1, probability 0, space 0, times 0 [ 953.600298] CPU: 1 PID: 7195 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 953.601852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.603723] Call Trace: [ 953.604331] dump_stack+0x107/0x167 [ 953.605152] should_fail.cold+0x5/0xa [ 953.606018] ? call_usermodehelper_setup+0xa2/0x2f0 [ 953.607154] should_failslab+0x5/0x20 [ 953.608020] kmem_cache_alloc_trace+0x55/0x320 [ 953.609073] call_usermodehelper_setup+0xa2/0x2f0 [ 953.610175] ? copy_regset_to_user+0x170/0x170 [ 953.611212] ? bprm_execve+0x9a0/0x1960 [ 953.612122] __request_module+0x3f9/0x920 [ 953.613058] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 953.614247] ? free_modprobe_argv+0x90/0x90 [ 953.615230] ? find_held_lock+0x2c/0x110 [ 953.616178] ? find_held_lock+0x2c/0x110 [ 953.617109] ? bprm_execve+0x8f8/0x1960 [ 953.618019] ? lock_downgrade+0x6d0/0x6d0 [ 953.618951] ? elf_core_dump+0x3c50/0x3c50 [ 953.619900] ? do_raw_read_unlock+0x3b/0x70 [ 953.620885] ? _raw_read_unlock+0x1a/0x30 [ 953.621813] ? load_misc_binary+0x813/0xb50 [ 953.622794] bprm_execve+0x9a0/0x1960 [ 953.623658] ? open_exec+0x70/0x70 [ 953.624466] ? copy_string_kernel+0x3b6/0x450 [ 953.625515] do_execveat_common+0x772/0x8d0 [ 953.626519] ? bprm_execve+0x1960/0x1960 [ 953.627475] __x64_sys_execveat+0xed/0x140 [ 953.628466] do_syscall_64+0x33/0x40 [ 953.629330] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.630521] RIP: 0033:0x7fd228c83b19 [ 953.631382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.635644] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 953.637420] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 953.639065] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 953.640719] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.642364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 953.644008] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 [ 953.656765] FAULT_INJECTION: forcing a failure. [ 953.656765] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.659605] CPU: 1 PID: 7192 Comm: syz-executor.0 Not tainted 5.10.239 #1 [ 953.661195] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.663113] Call Trace: [ 953.663723] dump_stack+0x107/0x167 [ 953.664575] should_fail.cold+0x5/0xa [ 953.665460] _copy_to_user+0x2e/0x180 [ 953.666343] simple_read_from_buffer+0xcc/0x160 [ 953.667422] proc_fail_nth_read+0x198/0x230 [ 953.668421] ? proc_sessionid_read+0x230/0x230 [ 953.669476] ? security_file_permission+0xb1/0xe0 [ 953.670598] ? proc_sessionid_read+0x230/0x230 [ 953.671666] vfs_read+0x228/0x620 [ 953.672483] ksys_read+0x12d/0x260 [ 953.673303] ? vfs_write+0xb10/0xb10 [ 953.674171] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.675342] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.676551] do_syscall_64+0x33/0x40 [ 953.677411] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.678584] RIP: 0033:0x7fb538aad69c [ 953.679438] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 953.683612] RSP: 002b:00007fb536070170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 953.685338] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fb538aad69c [ 953.686950] RDX: 000000000000000f RSI: 00007fb5360701e0 RDI: 0000000000000004 [ 953.688574] RBP: 00007fb5360701d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.690193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 953.691813] R13: 00007ffed007f5cf R14: 00007fb536070300 R15: 0000000000022000 17:12:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 17:12:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2) 17:12:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 17:12:00 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:12:00 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:12:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,c', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:00 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:12:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,c', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 965.848147] FAULT_INJECTION: forcing a failure. [ 965.848147] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 965.849657] CPU: 1 PID: 7207 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 965.850508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.850748] FAULT_INJECTION: forcing a failure. [ 965.850748] name failslab, interval 1, probability 0, space 0, times 0 [ 965.851543] Call Trace: [ 965.851562] dump_stack+0x107/0x167 [ 965.851575] should_fail.cold+0x5/0xa [ 965.851592] __alloc_pages_nodemask+0x182/0x600 [ 965.851606] ? mark_held_locks+0x9e/0xe0 [ 965.851617] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 965.851635] ? kmem_cache_free+0xa7/0x2d0 [ 965.851650] alloc_pages_current+0x187/0x280 [ 965.851671] __get_free_pages+0xc/0xa0 [ 965.858544] ? kmem_cache_free+0x249/0x2d0 [ 965.859062] tlb_remove_table+0x3ca/0xcb0 [ 965.859577] ___pte_free_tlb+0x86/0xb0 [ 965.860058] free_pgd_range+0x747/0x1380 [ 965.860585] free_pgtables+0x230/0x2f0 [ 965.861067] exit_mmap+0x28e/0x4f0 [ 965.861508] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 965.862160] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 965.862824] ? trace_hardirqs_on+0x5b/0x180 [ 965.863365] mmput+0xca/0x340 [ 965.863760] free_bprm+0x65/0x2e0 [ 965.864200] do_execveat_common+0x2e1/0x8d0 [ 965.864731] ? bprm_execve+0x1960/0x1960 [ 965.865244] __x64_sys_execveat+0xed/0x140 [ 965.865778] do_syscall_64+0x33/0x40 [ 965.866239] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 965.866867] RIP: 0033:0x7fe0737b3b19 [ 965.867331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.869605] RSP: 002b:00007fe070d29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 965.870548] RAX: ffffffffffffffda RBX: 00007fe0738c6f60 RCX: 00007fe0737b3b19 [ 965.871427] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 965.872318] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.873195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.874068] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 [ 965.874986] CPU: 0 PID: 7211 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 965.876500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.878310] Call Trace: [ 965.878899] dump_stack+0x107/0x167 [ 965.879707] should_fail.cold+0x5/0xa [ 965.880573] ? create_object.isra.0+0x3a/0xa20 [ 965.881583] should_failslab+0x5/0x20 [ 965.882424] kmem_cache_alloc+0x5b/0x310 [ 965.883325] create_object.isra.0+0x3a/0xa20 [ 965.884320] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 965.885445] kmem_cache_alloc_trace+0x151/0x320 [ 965.886480] call_usermodehelper_setup+0xa2/0x2f0 [ 965.887542] ? copy_regset_to_user+0x170/0x170 [ 965.888582] ? bprm_execve+0x9a0/0x1960 [ 965.889453] __request_module+0x3f9/0x920 [ 965.890369] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 965.891522] ? free_modprobe_argv+0x90/0x90 [ 965.892498] ? find_held_lock+0x2c/0x110 [ 965.893403] ? find_held_lock+0x2c/0x110 [ 965.894302] ? bprm_execve+0x8f8/0x1960 [ 965.895179] ? lock_downgrade+0x6d0/0x6d0 [ 965.896091] ? elf_core_dump+0x3c50/0x3c50 [ 965.897049] ? do_raw_read_unlock+0x3b/0x70 [ 965.897997] ? _raw_read_unlock+0x1a/0x30 [ 965.898905] ? load_misc_binary+0x813/0xb50 [ 965.899867] bprm_execve+0x9a0/0x1960 [ 965.900739] ? open_exec+0x70/0x70 [ 965.901523] ? copy_string_kernel+0x3b6/0x450 [ 965.902519] do_execveat_common+0x772/0x8d0 [ 965.903468] ? bprm_execve+0x1960/0x1960 [ 965.904404] __x64_sys_execveat+0xed/0x140 [ 965.905343] do_syscall_64+0x33/0x40 [ 965.906161] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 965.907297] RIP: 0033:0x7fd228c83b19 [ 965.908113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.912213] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 965.913898] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 965.915479] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 965.917075] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.918666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.920290] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 17:12:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2) 17:12:00 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:12:00 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:12:00 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:12:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 17:12:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3) 17:12:00 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:12:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3) 17:12:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 17:12:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4) 17:12:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4) 17:12:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,c', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 966.192675] FAULT_INJECTION: forcing a failure. [ 966.192675] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 966.194073] CPU: 1 PID: 7235 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 966.194859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 966.195823] Call Trace: [ 966.196136] dump_stack+0x107/0x167 [ 966.196567] should_fail.cold+0x5/0xa [ 966.197006] __alloc_pages_nodemask+0x182/0x600 [ 966.197544] ? mark_held_locks+0x9e/0xe0 [ 966.198017] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 966.198723] ? kmem_cache_free+0xa7/0x2d0 [ 966.199200] alloc_pages_current+0x187/0x280 [ 966.199716] __get_free_pages+0xc/0xa0 [ 966.200180] ? kmem_cache_free+0x249/0x2d0 [ 966.200664] tlb_remove_table+0x3ca/0xcb0 [ 966.201152] ___pte_free_tlb+0x86/0xb0 [ 966.201598] free_pgd_range+0x747/0x1380 [ 966.202082] free_pgtables+0x230/0x2f0 [ 966.202528] exit_mmap+0x28e/0x4f0 [ 966.202946] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 966.203565] mmput+0xca/0x340 [ 966.203927] free_bprm+0x65/0x2e0 [ 966.204329] do_execveat_common+0x2e1/0x8d0 [ 966.204823] ? bprm_execve+0x1960/0x1960 [ 966.205301] __x64_sys_execveat+0xed/0x140 [ 966.205793] do_syscall_64+0x33/0x40 [ 966.206226] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 966.206812] RIP: 0033:0x7fd228c83b19 [ 966.207244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 966.209368] RSP: 002b:00007fd2261f9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 966.210247] RAX: ffffffffffffffda RBX: 00007fd228d96f60 RCX: 00007fd228c83b19 [ 966.211061] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 966.211881] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 966.212717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 966.213545] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 [ 966.285768] FAULT_INJECTION: forcing a failure. [ 966.285768] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 966.288538] CPU: 0 PID: 7253 Comm: syz-executor.5 Not tainted 5.10.239 #1 [ 966.290018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 966.291890] Call Trace: [ 966.292573] dump_stack+0x107/0x167 [ 966.293344] should_fail.cold+0x5/0xa [ 966.294161] _copy_to_user+0x2e/0x180 [ 966.294978] simple_read_from_buffer+0xcc/0x160 [ 966.295967] proc_fail_nth_read+0x198/0x230 [ 966.296925] ? proc_sessionid_read+0x230/0x230 [ 966.297893] ? security_file_permission+0xb1/0xe0 [ 966.298921] ? proc_sessionid_read+0x230/0x230 [ 966.299940] vfs_read+0x228/0x620 [ 966.300907] ksys_read+0x12d/0x260 [ 966.301883] ? vfs_write+0xb10/0xb10 [ 966.302917] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 966.304358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 966.305763] do_syscall_64+0x33/0x40 [ 966.306778] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 966.308133] RIP: 0033:0x7fe07376669c [ 966.309079] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 966.313298] RSP: 002b:00007fe070d29170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 966.314984] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fe07376669c [ 966.316628] RDX: 000000000000000f RSI: 00007fe070d291e0 RDI: 0000000000000004 [ 966.318251] RBP: 00007fe070d291d0 R08: 0000000000000000 R09: 0000000000000000 [ 966.319755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 966.321419] R13: 00007fff16f9e86f R14: 00007fe070d29300 R15: 0000000000022000 17:12:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,c', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5) 17:12:13 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:12:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5) 17:12:13 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:12:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 17:12:13 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {0x0}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:12:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6) [ 979.382909] FAULT_INJECTION: forcing a failure. [ 979.382909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 979.386379] CPU: 1 PID: 7273 Comm: syz-executor.6 Not tainted 5.10.239 #1 [ 979.388357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 979.390759] Call Trace: [ 979.391521] dump_stack+0x107/0x167 [ 979.392607] should_fail.cold+0x5/0xa [ 979.393712] _copy_to_user+0x2e/0x180 [ 979.394831] simple_read_from_buffer+0xcc/0x160 [ 979.396191] proc_fail_nth_read+0x198/0x230 [ 979.397466] ? proc_sessionid_read+0x230/0x230 [ 979.398790] ? security_file_permission+0xb1/0xe0 [ 979.400189] ? proc_sessionid_read+0x230/0x230 [ 979.401533] vfs_read+0x228/0x620 [ 979.402563] ksys_read+0x12d/0x260 [ 979.403596] ? vfs_write+0xb10/0xb10 [ 979.404550] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 979.406037] ? syscall_enter_from_user_mode+0x1d/0x50 [ 979.407284] do_syscall_64+0x33/0x40 [ 979.408177] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 979.409424] RIP: 0033:0x7fd228c3669c [ 979.410326] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 979.414744] RSP: 002b:00007fd2261f9170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 979.416594] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fd228c3669c [ 979.418334] RDX: 000000000000000f RSI: 00007fd2261f91e0 RDI: 0000000000000004 [ 979.420045] RBP: 00007fd2261f91d0 R08: 0000000000000000 R09: 0000000000000000 [ 979.421761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 979.423477] R13: 00007ffec0569d6f R14: 00007fd2261f9300 R15: 0000000000022000 17:12:14 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:12:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6) 17:12:14 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) (fail_nth: 1) 17:12:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2) [ 979.519446] FAULT_INJECTION: forcing a failure. [ 979.519446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 979.522212] CPU: 1 PID: 7292 Comm: syz-executor.7 Not tainted 5.10.239 #1 [ 979.523671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 979.525429] Call Trace: [ 979.526006] dump_stack+0x107/0x167 [ 979.526789] should_fail.cold+0x5/0xa [ 979.527612] _copy_to_user+0x2e/0x180 [ 979.528438] simple_read_from_buffer+0xcc/0x160 [ 979.529432] proc_fail_nth_read+0x198/0x230 [ 979.530357] ? proc_sessionid_read+0x230/0x230 [ 979.531323] ? security_file_permission+0xb1/0xe0 [ 979.532367] ? proc_sessionid_read+0x230/0x230 [ 979.533340] vfs_read+0x228/0x620 [ 979.534089] ksys_read+0x12d/0x260 [ 979.534844] ? vfs_write+0xb10/0xb10 [ 979.535647] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 979.536778] ? syscall_enter_from_user_mode+0x1d/0x50 [ 979.537877] do_syscall_64+0x33/0x40 [ 979.538669] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 979.539752] RIP: 0033:0x7f412d2cb69c [ 979.540561] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 979.544464] RSP: 002b:00007f412a88e170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 979.546082] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f412d2cb69c [ 979.547591] RDX: 000000000000000f RSI: 00007f412a88e1e0 RDI: 0000000000000004 [ 979.549118] RBP: 00007f412a88e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 979.550633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.552151] R13: 00007ffdc15d3acf R14: 00007f412a88e300 R15: 0000000000022000 17:12:27 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:12:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7) 17:12:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loo', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3) 17:12:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7) 17:12:27 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:12:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:27 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) (fail_nth: 1) [ 992.951399] FAULT_INJECTION: forcing a failure. [ 992.951399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 992.952919] CPU: 1 PID: 7316 Comm: syz-executor.1 Not tainted 5.10.239 #1 [ 992.953722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 992.954708] Call Trace: [ 992.955024] dump_stack+0x107/0x167 [ 992.955456] should_fail.cold+0x5/0xa [ 992.955911] _copy_to_user+0x2e/0x180 [ 992.956370] simple_read_from_buffer+0xcc/0x160 [ 992.956925] proc_fail_nth_read+0x198/0x230 [ 992.957432] ? proc_sessionid_read+0x230/0x230 [ 992.957975] ? security_file_permission+0xb1/0xe0 [ 992.958556] ? proc_sessionid_read+0x230/0x230 [ 992.959095] vfs_read+0x228/0x620 [ 992.959505] ksys_read+0x12d/0x260 [ 992.959922] ? vfs_write+0xb10/0xb10 [ 992.960370] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 992.960987] ? syscall_enter_from_user_mode+0x1d/0x50 [ 992.961598] do_syscall_64+0x33/0x40 [ 992.962038] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 992.962633] RIP: 0033:0x7feb92c5069c [ 992.963073] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 992.965274] RSP: 002b:00007feb90213170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 992.966181] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007feb92c5069c [ 992.967020] RDX: 000000000000000f RSI: 00007feb902131e0 RDI: 0000000000000004 [ 992.967865] RBP: 00007feb902131d0 R08: 0000000000000000 R09: 0000000000000000 [ 992.968728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 992.969590] R13: 00007ffdf739472f R14: 00007feb90213300 R15: 0000000000022000 17:12:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4) 17:12:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8) 17:12:42 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f00, 0x10) 17:12:42 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:12:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5) 17:12:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2) 17:12:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8) 17:12:43 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:12:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10) 17:12:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loo', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3) 17:12:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x48) 17:12:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6) 17:12:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10) 17:12:43 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:12:43 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x4000, 0x10) 17:12:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loo', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c) 17:12:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7) 17:12:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4) 17:12:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x48) 17:12:56 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f00, 0x10) 17:12:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5) 17:12:56 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:12:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x68) 17:12:56 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f, 0x10) 17:12:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,u', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8) 17:12:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c) 17:12:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x68) 17:12:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6) 17:12:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10) 17:12:57 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x400000, 0x10) 17:12:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c) 17:12:57 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x4000, 0x10) 17:12:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,u', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:12:57 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:12:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x48) 17:12:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c) 17:12:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x74) 17:13:11 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f, 0x10) 17:13:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7) 17:13:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,u', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:13:11 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:13:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x74) 17:13:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c) 17:13:11 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x1000000, 0x10) 17:13:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a) 17:13:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a) 17:13:24 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:13:24 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f000000, 0x10) 17:13:24 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x400000, 0x10) 17:13:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8) 17:13:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x68) 17:13:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2f0) 17:13:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2f0) 17:13:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:13:24 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x1000000, 0x10) 17:13:24 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f0000, 0x10) 17:13:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c) 17:13:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:13:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10) 17:13:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300) 17:13:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300) 17:13:24 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:13:24 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f000000, 0x10) 17:13:24 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x40000000000000, 0x10) 17:13:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x321) 17:13:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x74) 17:13:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x48) 17:13:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:13:24 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x100000000000000, 0x10) 17:13:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x321) 17:13:36 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f00000000000000, 0x10) 17:13:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a) 17:13:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c) 17:13:36 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f0000, 0x10) 17:13:36 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:13:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:13:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x480) 17:13:36 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:13:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x68) 17:13:36 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f000000000000, 0x10) 17:13:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x480) 17:13:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500) 17:13:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2f0) 17:13:49 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xffffffff00000000, 0x10) 17:13:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:13:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600) 17:13:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c) 17:13:49 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x40000000000000, 0x10) 17:13:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300) 17:13:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500) 17:13:49 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:13:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x74) 17:13:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x321) 17:13:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600) 17:13:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700) 17:13:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:13:50 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:13:50 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x100000000000000, 0x10) 17:13:50 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x2) 17:14:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a) 17:14:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700) 17:14:02 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:14:02 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f00000000000000, 0x10) 17:14:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000) 17:14:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:14:02 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x3) 17:14:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x480) 17:14:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500) 17:14:02 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xb) 17:14:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000) 17:14:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:14:14 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xc) 17:14:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103) 17:14:14 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:14:14 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f000000000000, 0x10) 17:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600) 17:14:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2f0) 17:14:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103) 17:14:14 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xd) 17:14:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300) 17:14:14 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xffffffff00000000, 0x10) 17:14:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2123) 17:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700) 17:14:14 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:14:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2123) 17:14:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:14:15 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x2) 17:14:15 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 17:14:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000) 17:14:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2321) 17:14:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x321) 17:14:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2321) 17:14:27 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:14:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000) 17:14:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000) 17:14:27 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x3) 17:14:27 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xf) 17:14:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x480) 17:14:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103) 17:14:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:14:27 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xb) 17:14:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4800) 17:14:27 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:14:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2123) 17:14:27 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x11) 17:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4800) 17:14:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:14:42 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:14:42 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xc) 17:14:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c00) 17:14:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2321) 17:14:42 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x12) 17:14:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500) 17:14:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000) 17:14:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6800) 17:14:42 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x13) 17:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c00) 17:14:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600) 17:14:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c00) 17:14:54 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x14) 17:14:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700) 17:14:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4800) 17:14:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6800) 17:14:54 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:14:54 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xd) 17:14:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:14:54 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x4000) 17:14:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c00) 17:14:54 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:14:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7400) 17:14:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000) 17:14:54 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 17:14:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:14:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c00) 17:14:54 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff}, 0x0, 0xffffffffffffffff, r0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:14:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a00) 17:14:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7400) 17:14:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6800) 17:15:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004) 17:15:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c00) 17:15:06 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(0x0, 0x68) 17:15:06 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000080)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x6, 0xd2e, &(0x7f0000000040)="716bc4760358f15c8c49ec144645db", 0x378e, 0x0, 0x1, {0x1}}, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:15:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103) 17:15:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a00) 17:15:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:15:06 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xf) 17:15:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2123) 17:15:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7400) 17:15:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf002) 17:15:06 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x11) 17:15:06 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat2(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x604002, 0x1, 0xd}, 0x18) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/215, 0xd7}, {&(0x7f0000002480)=""/243, 0xf3}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f00000000c0)=""/42, 0x2a}], 0x5}, 0x3ff}, {{&(0x7f0000000740)=@can, 0x80, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/175, 0xaf}], 0x1}, 0x3}, {{&(0x7f0000001940)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000019c0)=""/178, 0xb2}, {&(0x7f0000001a80)=""/42, 0x2a}, {&(0x7f0000001ac0)=""/185, 0xb9}], 0x3, &(0x7f0000001bc0)=""/110, 0x6e}, 0x3f}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000001c40)=""/115, 0x73}], 0x1}, 0xfffffffb}, {{&(0x7f0000001d00)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000002240)=[{&(0x7f0000001e00)=""/95, 0x5f}, {&(0x7f0000001e80)=""/93, 0x5d}, {&(0x7f0000001f00)=""/208, 0xd0}, {&(0x7f0000002000)=""/93, 0x5d}, {&(0x7f0000002080)=""/11, 0xb}, {&(0x7f00000020c0)=""/236, 0xec}, {&(0x7f00000021c0)=""/100, 0x64}], 0x7, &(0x7f00000022c0)=""/7, 0x7}, 0x7}], 0x5, 0x40000000, &(0x7f0000002440)={0x0, 0x989680}) semctl$IPC_RMID(0x0, 0x0, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 17:15:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004) 17:15:06 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(0x0, 0x68) 17:15:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:15:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xff0f) 17:15:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2321) 17:15:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000) 17:15:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:15:19 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:15:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf002) 17:15:19 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(0x0, 0x68) 17:15:19 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x12) 17:15:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a00) 17:15:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x20000) 17:15:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004) 17:15:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4800) 17:15:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xff0f) 17:15:19 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x13) 17:15:31 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x102) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = semget$private(0x0, 0x4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x2080000, &(0x7f0000000680)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c6e669cd16364", @ANYRESHEX=r1, @ANYBLOB=',fscache,loose,version=9p2000,afid=0x0000000000000005,subj_type=\x00,fscontext=sysadm_u,euid=', @ANYRESDEC=0xee01, @ANYBLOB=',smackfsdef=,smackfshat=&-$*[,uid>', @ANYRESDEC, @ANYBLOB=',uid>', @ANYRESDEC=0x0, @ANYBLOB=',fsuuid=643\x0036ed-Q89f-0da8-c6U0-ac4532c9,subj_role=/dev/vcsu\x00,\x00']) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x4001, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) semtimedop(0x0, &(0x7f0000000380)=[{0x4, 0x5, 0x800}, {0x3, 0x8, 0x800}, {0x3, 0x6, 0x1000}, {0x4, 0x1ff, 0x1000}], 0x4, &(0x7f00000003c0)) open_by_handle_at(r2, &(0x7f0000000400)=@isofs_parent={0x14, 0x2, {0x0, 0x8, 0x7f, 0x7, 0x200, 0x7}}, 0x220141) 17:15:31 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x14) 17:15:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf002) 17:15:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:15:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80000) 17:15:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c00) 17:15:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80000) 17:15:31 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x0) 17:15:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000) 17:15:32 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x4000) 17:15:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6800) 17:15:32 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x0) 17:15:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xff0f) 17:15:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000) 17:15:32 executing program 7: restart_syscall() unshare(0x8000000) unshare(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) unshare(0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x15082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xedd44c6b7b3476fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x40001, 0x62) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) 17:15:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:15:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c00) 17:15:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80000) 17:15:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000) 17:15:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000) 17:15:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000) 17:15:46 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x0) 17:15:46 executing program 1: truncate(&(0x7f0000000240)='./file0\x00', 0xd2) restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000840)='./file0\x00', 0x1, 0x8) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x1, 0x80, 0xf7, 0x40, 0x7, 0xff, 0x0, 0x0, 0x80101, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000780), 0x7}, 0x220, 0x3, 0x200, 0x1, 0x9, 0xffffff81, 0x14fd, 0x0, 0x0, 0x0, 0xfffffffe}, r0, 0xa, 0xffffffffffffffff, 0x4) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x0, 0x1800}, {0x4, 0x7ff, 0x1800}, {0x2, 0x4, 0x1c00}, {0x3, 0x8, 0x1800}, {0x4, 0x4, 0x800}, {0x1, 0x463, 0x1c00}, {0x1, 0x3, 0x1000}, {0x0, 0x6, 0x1000}, {0x1, 0x1ff, 0x2000}, {0x2, 0x6, 0x1800}], 0xa, &(0x7f00000000c0)={0x0, 0x989680}) r2 = getpgrp(0x0) prlimit64(r2, 0x6, &(0x7f0000000100)={0x1}, &(0x7f0000000200)) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x81403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x3ff, 0xfffffffc, 0x2, 0x3, 0x400, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(r2, 0xb, &(0x7f0000000000)={0x8001, 0x6}, &(0x7f0000000400)) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x2, 0x3, 0x6, 0x7, 0x0, 0x9, 0x82900, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x8240, 0x5, 0x1, 0x2, 0xc459170, 0x3, 0x401}, r2, 0xe, 0xffffffffffffffff, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0xd3, 0x0, 0x80, 0x6c, 0x0, 0x80000000, 0x10, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000440)}, 0x4010, 0x2, 0x10000, 0x8, 0x9, 0x9, 0x0, 0x0, 0x6, 0x0, 0xffff}, 0xffffffffffffffff, 0xc, r3, 0x1) semop(0x0, &(0x7f0000000040)=[{0x1, 0xd3b}, {0x0, 0x8, 0x1800}, {0x1, 0x1, 0x1000}, {0xf, 0x0, 0x1000}, {0x3, 0x2, 0x1800}, {0x2, 0x2, 0x1000}, {0x3, 0x7, 0x800}, {0x1, 0x7f, 0x800}, {0x0, 0xfff9, 0x800}, {0x2, 0x6}], 0xa) 17:15:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 17:15:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000) 17:15:46 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x1010, r1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:15:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000) 17:15:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7400) 17:15:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000) 17:15:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 17:15:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000000) 17:15:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000000) 17:15:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3000000) 17:15:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a00) 17:15:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000) 17:15:58 executing program 1: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:15:58 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfffffdbb) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000480)) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x741042, 0xcb) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:15:58 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f0000, 0x10) 17:15:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3000000) 17:15:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 17:15:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004) 17:15:58 executing program 1: restart_syscall() unshare(0x8000000) unshare(0x10000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1e0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0xfffffffeffffffff, 0x5, &(0x7f0000000940)=[{&(0x7f0000000240)="d3a5879c943f624ad5b55d45a651d8dc9261c7491ea6bcd315396716d62712979af00cf62d37b5a5d387dd9d428cb683a6d81838975162d1b0e3ef", 0x3b, 0x1}, {&(0x7f0000000380), 0x0, 0x100000001}, {&(0x7f00000003c0)="18126f147889d16923c570422f162a466c730860fbf6c9714a5d7c51269e55a1114bcb2e79c9506d229db6f67bd2531d78ad505fca915af2448c603308c91dcfcdbfc30824865651087b9e726d9c0d0bbb60cba3915c56c297e38ec7b67d41ac8c8f180f7cf06d9c1e2249fe7398d814e79684a81d17e4f2d5539aa12927f5445710e010a78bcfbf1d7e47cc1f5de6996cdcf34d1866b4ca55", 0x99, 0x9bd}, {&(0x7f0000000680)="508284fefdabbc3b775418e1b739c3b9f4273e1ed327f8c7eb648e804dbb57f9d13452bc603183f3ed6f29f58ec1832f6c27b4ad21fbe84dbf9d5ec3405c67c4f196acb70d2b19d9c9882e453d75498ec6270a0e137267e3f146f86f09dbce0cede70f470641be4abb0366b945d6e6e85aeabe57920f704d02f8438003387de4f694536acdceffc49ea290209243836410c80516f2121f8492284c5b35b52d43c196cb6946a2e3fb14a617db4acd0278bc775fa9e155b013fd5eb721f98bc0b543f5e72dcf7ee14d226093f1088d004ca1fb82d5293349fcf6d32f46815df84878ca9ef109f01ef9b5267ebb4f9d3b9f96ddd0452cae34", 0xf7, 0x8}, {&(0x7f0000000780)="d6d3c5fec5f728877e4a6bb31100c6f55b7a55dcae21846db6faa9d14405bb20a5463a8225b3c079ea4efa53c70397875854dfb4911f9169eb7b481f9a4dd413551f272484dafe04e2d99bad50974ef78d1989f5a5987145b9f1eeb1d039a25420dc24c413c20c350e21d6b989609e86364b47c18d97e39b80219591b8c3ffec28bfc5ed4b85a0b1b62c211832aa96da5f8f7c90856060fa06b46a72296ebed5d039e8b6a01d4f89638156430c3b795f061ad068d9d6544296f7775f7eb1f45d3d16f04648c9cca7", 0xc8, 0x400}], 0x2000880, &(0x7f0000000a40)={[{@uni_xlateno}, {@numtail}, {@uni_xlateno}, {@uni_xlateno}, {@numtail}, {@rodir}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_measure}]}) mkdirat(r2, &(0x7f00000008c0)='./file0\x00', 0x1e) r3 = socket$nl_audit(0x10, 0x3, 0x9) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x20040, 0x0) sendfile(r1, r3, &(0x7f0000000040)=0x100, 0x8) semctl$IPC_RMID(0x0, 0x0, 0x10) unshare(0x40880) 17:15:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000000) 17:15:58 executing program 2: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x400000, 0x10) 17:15:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000) 17:15:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000) [ 1204.180876] loop1: detected capacity change from 0 to 135266304 [ 1204.191369] FAT-fs (loop1): Unrecognized mount option "fowner=00000000000000060928" or missing value 17:15:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf002) 17:15:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3000000) 17:15:58 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(r1, &(0x7f0000000240)=[{{&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000780)=[{&(0x7f00000000c0)=""/16, 0x10}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000200)}, {&(0x7f0000000380)=""/214, 0xd6}, {&(0x7f0000000680)=""/197, 0xc5}], 0x5, &(0x7f0000000800)=""/101, 0x65}, 0x7ff}], 0x1, 0x40000120, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:15:58 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f, 0x10) 17:15:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5000000) 17:15:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xff0f) 17:16:14 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x0, 0xea60}, {0x77359400}}) 17:16:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80000) 17:16:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5000000) 17:16:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6000000) 17:16:14 executing program 1: restart_syscall() restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) unshare(0x40000000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:16:14 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:16:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000) 17:16:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) [ 1219.406578] FAULT_INJECTION: forcing a failure. [ 1219.406578] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.409344] CPU: 0 PID: 8236 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1219.410804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.412545] Call Trace: [ 1219.413100] dump_stack+0x107/0x167 [ 1219.413869] should_fail.cold+0x5/0xa [ 1219.414676] ? getname_flags.part.0+0x50/0x4f0 [ 1219.415629] should_failslab+0x5/0x20 [ 1219.416420] kmem_cache_alloc+0x5b/0x310 [ 1219.417273] getname_flags.part.0+0x50/0x4f0 [ 1219.418202] getname_flags+0x9a/0xe0 [ 1219.418990] __x64_sys_execveat+0xd6/0x140 [ 1219.419871] do_syscall_64+0x33/0x40 [ 1219.420647] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.421718] RIP: 0033:0x7f008031cb19 [ 1219.422506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.426378] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1219.427971] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1219.429451] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1219.430955] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.432440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1219.433922] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:16:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000) 17:16:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7000000) 17:16:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6000000) 17:16:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5000000) 17:16:14 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000140)={{}, {0x0, 0x3938700}}, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:16:14 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) (fail_nth: 1) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 1219.686109] FAULT_INJECTION: forcing a failure. [ 1219.686109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1219.689108] CPU: 0 PID: 8264 Comm: syz-executor.3 Not tainted 5.10.239 #1 [ 1219.690573] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.692314] Call Trace: [ 1219.692870] dump_stack+0x107/0x167 [ 1219.693639] should_fail.cold+0x5/0xa [ 1219.694452] _copy_to_user+0x2e/0x180 [ 1219.695252] simple_read_from_buffer+0xcc/0x160 [ 1219.696240] proc_fail_nth_read+0x198/0x230 [ 1219.697118] ? proc_sessionid_read+0x230/0x230 [ 1219.698076] ? security_file_permission+0xb1/0xe0 [ 1219.699111] ? proc_sessionid_read+0x230/0x230 [ 1219.700077] vfs_read+0x228/0x620 [ 1219.700814] ksys_read+0x12d/0x260 [ 1219.701570] ? vfs_write+0xb10/0xb10 [ 1219.702372] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.703480] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.704578] do_syscall_64+0x33/0x40 [ 1219.705367] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.706455] RIP: 0033:0x7feb4e1c569c [ 1219.707254] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1219.711136] RSP: 002b:00007feb4b788170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1219.712747] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007feb4e1c569c [ 1219.714262] RDX: 000000000000000f RSI: 00007feb4b7881e0 RDI: 0000000000000004 [ 1219.715778] RBP: 00007feb4b7881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.717283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1219.718804] R13: 00007ffe0f5f2e9f R14: 00007feb4b788300 R15: 0000000000022000 17:16:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) [ 1231.566413] FAULT_INJECTION: forcing a failure. [ 1231.566413] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.567812] CPU: 1 PID: 8274 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1231.568622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1231.569605] Call Trace: [ 1231.569924] dump_stack+0x107/0x167 [ 1231.570373] should_fail.cold+0x5/0xa [ 1231.570837] ? create_object.isra.0+0x3a/0xa20 [ 1231.571381] should_failslab+0x5/0x20 [ 1231.571837] kmem_cache_alloc+0x5b/0x310 [ 1231.572325] create_object.isra.0+0x3a/0xa20 [ 1231.572847] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1231.573443] kmem_cache_alloc+0x159/0x310 [ 1231.573931] getname_flags.part.0+0x50/0x4f0 [ 1231.574458] getname_flags+0x9a/0xe0 [ 1231.574901] __x64_sys_execveat+0xd6/0x140 [ 1231.575409] do_syscall_64+0x33/0x40 [ 1231.575845] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1231.576445] RIP: 0033:0x7f008031cb19 [ 1231.576882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1231.579046] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1231.579929] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1231.580761] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1231.581589] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1231.582422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1231.583251] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:16:26 executing program 1: restart_syscall() unshare(0x8000000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000000600), 0x5}, 0xffffffff}, {{&(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @private}}, 0x0, &(0x7f0000000480)=[{&(0x7f0000000180)=""/101}, {&(0x7f0000000200)=""/111}]}, 0xb}, {{&(0x7f0000000680)=@in={0x2, 0x0, @multicast2}, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000700)=""/171}, {&(0x7f0000000040)=""/89}, {&(0x7f0000000840)=""/67}, {&(0x7f0000000940)=""/132}, {&(0x7f0000000a00)=""/4096}, {&(0x7f00000004c0)=""/60}]}}, {{&(0x7f0000001a80)=@isdn, 0x0, &(0x7f00000008c0)=[{&(0x7f0000001b00)=""/230}], 0x0, &(0x7f0000001c00)=""/167}, 0x2}], 0x1, 0x0, &(0x7f0000000900)={0x0, 0x3938700}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0xa4af}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) unshare(0x100) 17:16:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7000000) 17:16:26 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:16:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000) 17:16:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000) 17:16:26 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880), 0x0, 0x21, &(0x7f0000000900)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6000000) 17:16:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000) 17:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7000000) 17:16:26 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000680)=""/259, 0x103}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000200)=""/234, 0xea}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x8c7a81e06fb27637) semget$private(0x0, 0x4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x5, 0xfffffffc}}, './file0\x00'}) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:16:26 executing program 7: restart_syscall() clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000380)=""/221, 0xdd}, 0x80000001}, {{&(0x7f0000000200)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000500)=""/19, 0x13}, {&(0x7f0000000680)=""/216, 0xd8}, {&(0x7f0000000540)=""/162, 0xa2}, {&(0x7f0000000780)=""/166, 0xa6}], 0x4, &(0x7f0000000940)=""/126, 0x7e}, 0x2a}], 0x2, 0x2000, &(0x7f0000000a40)={r0, r1+10000000}) unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:16:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000000) 17:16:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x21030000) 17:16:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000) 17:16:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 17:16:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x3000000) [ 1231.763600] FAULT_INJECTION: forcing a failure. [ 1231.763600] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1231.765019] CPU: 1 PID: 8318 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1231.765796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1231.766750] Call Trace: [ 1231.767061] dump_stack+0x107/0x167 [ 1231.767479] should_fail.cold+0x5/0xa [ 1231.767919] strncpy_from_user+0x34/0x470 [ 1231.768406] getname_flags.part.0+0x95/0x4f0 [ 1231.768914] getname_flags+0x9a/0xe0 [ 1231.769349] __x64_sys_execveat+0xd6/0x140 [ 1231.769841] do_syscall_64+0x33/0x40 [ 1231.770277] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1231.770869] RIP: 0033:0x7f008031cb19 [ 1231.771298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1231.773405] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1231.774285] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1231.775101] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1231.775913] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1231.776731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1231.777544] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:16:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000) 17:16:26 executing program 7: restart_syscall() unshare(0x8000000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) unlinkat(r0, &(0x7f0000001a00)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/81, 0x51}, {&(0x7f0000000500)=""/227, 0xe3}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/75, 0x4b}], 0x4, &(0x7f0000000940)=""/130, 0x82}, 0x3ff}, {{&(0x7f0000000800)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000a00)=""/4086, 0xff6}], 0x1, &(0x7f0000001a00)}, 0x1ff}], 0x2, 0x12100, &(0x7f0000001ac0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, {0x440c}}, 0x5) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001b40)=@IORING_OP_OPENAT={0x12, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001b00)='./file0\x00', 0x0, 0x0, 0x12345}, 0x2a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) readlinkat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=""/204, 0xcc) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:16:41 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f00, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:16:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000) 17:16:41 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x3, 0x81, 0x3f, 0xf8, 0x0, 0x100000000, 0xc80, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x8, 0xff}, 0x2128, 0x329, 0x0, 0x7, 0x5, 0x7ff, 0x1ff, 0x0, 0x9, 0x0, 0xfff}, r0, 0xe, r2, 0x0) r3 = io_uring_setup(0x3abc, &(0x7f0000000200)={0x0, 0xa65a, 0x8, 0x3, 0x3cc}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r4, &(0x7f0000000000)='./file0\x00', 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000380)={0x4, 0x80, 0x20, 0x5d, 0x3, 0x9, 0x0, 0x8, 0x2018, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x800, 0x5}, 0xa0, 0xe07, 0xa608, 0x5, 0x200, 0x9, 0x3, 0x0, 0xbf, 0x0, 0x6}, r1, 0xb, 0xffffffffffffffff, 0x8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000400)=[r3, r0, r4, r0, r5, r0, r2, r1], 0x8) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:16:41 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) dup2(r0, r1) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) semget$private(0x0, 0x2, 0x188) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:16:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x23210000) 17:16:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x21030000) 17:16:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) 17:16:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x5000000) [ 1246.508392] FAULT_INJECTION: forcing a failure. [ 1246.508392] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.511125] CPU: 1 PID: 8351 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1246.512594] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1246.514393] Call Trace: [ 1246.514972] dump_stack+0x107/0x167 [ 1246.515762] should_fail.cold+0x5/0xa [ 1246.516592] ? alloc_bprm+0x51/0x8f0 [ 1246.517408] should_failslab+0x5/0x20 [ 1246.518235] kmem_cache_alloc_trace+0x55/0x320 [ 1246.519228] ? lock_downgrade+0x6d0/0x6d0 [ 1246.520126] alloc_bprm+0x51/0x8f0 [ 1246.520900] ? __virt_addr_valid+0x170/0x5d0 [ 1246.521987] do_execveat_common+0x275/0x8d0 [ 1246.523060] ? strncpy_from_user+0x9e/0x470 [ 1246.523987] ? bprm_execve+0x1960/0x1960 [ 1246.524889] __x64_sys_execveat+0xed/0x140 [ 1246.525799] do_syscall_64+0x33/0x40 [ 1246.526627] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1246.527729] RIP: 0033:0x7f008031cb19 [ 1246.528531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.532478] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1246.534122] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1246.535765] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1246.537315] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1246.538887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1246.540406] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:16:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6000000) 17:16:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x23210000) 17:16:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x40000000) 17:16:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x21030000) 17:16:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 17:16:53 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x4000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:16:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x23210000) 17:16:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x48000000) 17:16:53 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x304c0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x0, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:16:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7000000) 17:16:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x40000000) 17:16:53 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000008, 0x100010, r1, 0x4ca27000) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1259.229468] FAULT_INJECTION: forcing a failure. [ 1259.229468] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.231053] CPU: 1 PID: 8385 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1259.231950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.233036] Call Trace: [ 1259.233392] dump_stack+0x107/0x167 [ 1259.233871] should_fail.cold+0x5/0xa [ 1259.234376] ? create_object.isra.0+0x3a/0xa20 [ 1259.234992] should_failslab+0x5/0x20 [ 1259.235500] kmem_cache_alloc+0x5b/0x310 [ 1259.236045] create_object.isra.0+0x3a/0xa20 [ 1259.236625] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1259.237302] kmem_cache_alloc_trace+0x151/0x320 [ 1259.237912] alloc_bprm+0x51/0x8f0 [ 1259.238385] ? __virt_addr_valid+0x170/0x5d0 [ 1259.238976] do_execveat_common+0x275/0x8d0 [ 1259.239544] ? strncpy_from_user+0x9e/0x470 [ 1259.240109] ? bprm_execve+0x1960/0x1960 [ 1259.240659] __x64_sys_execveat+0xed/0x140 [ 1259.241230] do_syscall_64+0x33/0x40 [ 1259.241711] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.242382] RIP: 0033:0x7f008031cb19 [ 1259.242888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.245289] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1259.246285] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1259.247221] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1259.248148] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1259.249088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1259.250017] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:16:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x48000000) 17:16:53 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) sendmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="d4d4d73c07f00d88a76685958b7024b0323ce2913105152e369085bd9cdce44086ed834f1c8281b06324d4db0b45b1624cc7757aeb5d004d31892d7cdbb7e365b55c0332971052edb3dc349605f58bec07d934", 0x53}, {&(0x7f0000000940)="beaad1266b73e427d82963aa86ac57e84b12604f9ce74767bf012c0e6e208cefaebb365254e9c71ccd51c1b5dd7e7b816dd38a25179123bdf881d0546a1a7d2ce337ece66f786d6fe9fa1b640fa043fb7eea8943767e0469c93ec925988843e953796b2481e2093ccf17a3efb8426753202969b51572dce31173295e83dc33f012194fa5ea66a0b27005467bf56d2440f0fdbf1c472cea1dab85733437a6b13453f3ffb804cce39caab64e2856fc758b31c217a915e2217cce9dc17ff8569be10ac4f9e4ad63a3e0ce54eb22dce98ded83aa6df9e7b647a53348c52f0de4232d11630785fa09a43639e1bd6ecc1338c25c4dffab9f81af8930b552fb387b284e7ac16f9a7b1630b8760bc35c73aa87db7858ef0cddf6481cb63ed79a86bd809e44902a902ed2984f7cda60aeede4afa6bae6d3ad02e7b4ba314cdb0a9beb98ec5e392647f4ddfda2865b73c570809a115b7a2f4e38acebeea9cbf9f06b0f797c34e2c43d36986f95f688b384ffee5f5367e1fd755f7976c0f58c8f3cc43f4c5f26c5aee924a8cdece0c9f66d6e47d43573df9dd65a63ba777a7ba6b63afabc28e2490f6f5d44fb5b8b23cd801d694921dcb2ca4d231e8280f3b1b8f7e7af8de66f784023fad2cef87edf864447abd79a2a7daddc0c60ec99322d96d3102bf49ed2f92799181307e81ca681be4f901ed5f5ccd6372397df9e5f421081d64e51cae11737ab429a8cd4dd048a2a37406b36d62127f42f07865469a947a6eda4af9c0aaee874c979d32d5d3d2b5be9a33f024ea8b5fe6b391749b1c9a2d629d941aff3ec6f0029dd9e9720e6a9de3d32fbeada11165adef9d2888e8d34a831b0f059bc2ca09ac21cd3c3180d767f9dc3f7c48f943161247e002e97239721a58bdd0d0e9d34525e27964412b6426cba40c1ba32b1eac67b4765c66eb01d6188ec73b86c60c50c4ec7d3a47196e0b6577ef63b126c8c86ee61adc5995548650961529d9b48d74c302d5a519796a070394f02ad10d92d5696d7b5e06ca83e0a217a9beab379229743ac125d9f79a98c40346be49b91166ec50230b26d90dab96401c472c9f485da0306338954ae6b667d4bd9828df9c14d8e64175a729e848280d22175fad006d558d3e855a955cb238f7b92334778a7cf2a101e0776226c39400dd15065562eaf080f70512a6f376eea629b9efdf3970f82d966ce4d72e1e15a658175ac49ab92710eb2499451e9a752b98b68b1ab387e900b398901f0a7fc3c1d613c55b9255f34bccd7c09f7d28405543297f3e14a363913e2c790edc1dd58532d1ff359f8dea378eaeb21e1768ee123fecf329caefeb939b57d6f6a864bc5d0fb2a1dd7a9c21e5df7a44d4cd9475468b4ba7f98bd37c5a6ed4fdd27d365af86ae2873bfc251fe64c395a96315ad52f6b00ec9514f7dfbfd238dd8452fe487fd5d4e2dab0073b2c15ebbd63a11f822ae22a1249442a9f88587263b0ca552160a3249facd1dbc1f5c5c963af9e2cb2e586d4bf3a7ad1235456c1a834028dc4e8319642d6e12c0e232f83badf7e0bcc95ee3c61d3b8d5146e7aecf933bf00dbd3b2d7db6359fdaaa0eae44d3d89c1821c59b5796d43edb99f8631bf3dcf7d74c01559617991f02f7633897c72c4b91a07c20b0e40ab790994b067f45accefb5d4704268363e27414d8ab02ad39ccfe10533d073009b3d6d876017879568aa83ed17cbafbd336711b8cfcce8ae5e9230fbd948abf4f38ce411e8c8ec7e46e7ed33176c357b3eb1c5e5beaff061f948ea57040e1da5d853e98642a3246c7c49e9ac6ae1d6e8f5e9e44cea29423b8fb86627d3870bbb931efd56086f7101ea01a59754bbde9fbe072d653d71ebddb7ddea218b843222724b393d53cc93e79030446ca4221c5163ff0be47a20b942ccc6911ba67b5f643ddd7c313e566cc88b045bd8ed0acbaa31691587a71027efea16d5996beba7677822d3ec26920e2575a1deb423b96289ca996ae814d0d70be008752de359c0ebf694a13166aaeba33658b9e71cc860612bac0a0099d30ee7d1bb95df9e602191b73644e7aa6f9758f1a276391c9ea50dc9b25e58ac095ca62fddc61c93a2d663452c77c5516febe32e2264170f9ea43e4af6c8a0e9b9686996974d305c96aa5a2e9253041237aedc7fdece1d38f343ad23c29b6824f4c13bd55a6c19895e1b91d8d18d7fa4b11feaa04c1575da75647647c504ccc04d444ea66f4830d2fca56a733a518c4a3b54590402c6451412c02e5782217576be62c542656faf6d90c7314933aeee2d57b50c41053666e099561f7b7909921cfbba1dd80d2f3e02ff540fd4c0f17dfa0ac0f2351b7788be0b8889333a18a9b58a319c5228975598e2e3dd5aededb1a9cd04d999b4f0b6c43620b207f4c7c0c5218a69bef2fea8237eac2946401a74ed9316bde8ad8f58a769c37b9f61d73fcbf7ad112a83cecffe95fbe8eb7351d49a6b371c2394adeb75f52c78637492ab5ecdd2b0ac382a26221def4fb7448b8908de1435495c7bbd72b4dce8717fdfddc43d1b3bac60e3f1fdac03eeea9149fb8fbc8a29d6593783d5390b5f08fa8a4d4c8d6f7e8ce137eece866a67f32bd6fd95accb9b3683926fad1877e42c3920102c4aad5d91fe69da5321b89872311864289b2adf1f2c01ca914489bd2b3d7099076f9334c4b73d09fdec44e93e68cf11f19dfd942f8da473f9e19f0216f2263eefd5e878c02f4d031ce02e0ac47c777c764971c1dc96854b87a53447dc56d267e2630fc1902ac09722139a5e9f8425f62721ea156e0adbeba2ef28dd926bc7b185157300d4ce36fb345ec13b9e735dfdc1da1d12c30947e279511fc672565b76a56177272498c2913536e1130d14a609564a610909662f36fe927f1afbb145256c17c5e5e0ef3c0a2da456941ec6678a4d5b960cee2299f08092b9dda138e9f604ec52ba07ac75db26bbac507b70cfdbbd28708d90f108378d62c4b55ecbdcb0a70e06622273b3fef65762a6768f3d3247db272d2c600b92dd96deec5b0da94d68e9d6f0397b459b18ace6629ea8bd254a275a3370da2d078f62628cbe33259f6f35eca3f377ce7770af4c124c688e706a343efc8b96645125dd1e759cf5e1ee2ad91eb4373c45f2dc4ed68d8b7b34ffbf977f50d6c691b120882305c7a91642e1d14fc2129d38dedaf6fefd9e83d9b1cc5607b82c5c46f4f6ccd7f475b71d037803666f4b6a6ed0c56d3e6ab450080533ba3b00dc154f86c755f8e917d4e56b2ae0a4100c080e42b59abbb55b063632c872d5ae836047d363e11fe5f5e5f63381fa7cc090ace298868c7b9540f30d74513c08865ea587ebd053240fd51e1c1ea98fd91cc5cb172a456ca27bf9da44e59ecb335fbe9e3136a3c33fd416566cf17f5306c38e0061f93ee185b97da50928f9f303bd59710f2ad423fbef5d28e5f9b2b995e724a8b8eb8df9ca65b88530cb4c2ac1132795d76b8fe883784b6c88aabb1781d0eae570c782de6580a6a56a1a7955b83de04906d74765fc01bb0c043c6f42dc340803d09fad6571516e96bb07e0ef756f4fc71132b07a0905ffc4b2c987a4ded7d7695f53e514c7ac60ed23835cf9c54305d0a5e675f9b50ac186c7fa68438bdb3b9cac719a61a4987d4dcb0c9d14f6021ad7e3b131de784e2112b7cb484b73aa6cca5b7c32252cae5943e3b80d9f0d3fc9d89f6be9a652fdebac79b2d5c8632d1f1136cd22c17631147b1772590a98e282e4f205bcc477ae3d4f0fb0fd64a1144eea985edafa675e9a8de0ba5d056fe4e62800e29be8bf26f2579b0e055cad1b59cf5c25d6808467501cf4a322234736d82ce0464e42af19219545e7d9428cf386eb84ddc2e28f09f7889ed075d234be30e6884e6e51bac09e4ff2c2f44045e1b925e41f742dc89aaa68215e53c9864d0e251b6ff20ff22f9494361a4dcd8378d70e4e81d20c8c457e7e352d0dc6915a7e4bba7530f38a549252db5e6c6bae0c8f4bc382255c773075f6867781d79452a1dd4ddcf9cd777c318380bcdddcd7189f53b6cea830dc16c1fac484115ff3aff6b3cf52490a29926576575bbb740e58aa28a954d91801075df3b1bd7d10d93f326ea80e131baa8e0609e64252fd2aa4fa8137b7a07889c2a47381d823d313348486cdfc4feae05d3490b162a4c9d5f091d8b0877f178e002a0fdbec4a1de30bb0e1ab2c890a8059757c2bae22fb400cf1ff5735b2f0cea8f3767ae4a30ca24b91c81228a0f2c6a560548a0e338ca5b2ce92efb73fe41b38659778fcb6080d9f62b850b833700d15b39051d417f9b0aaf5c710a959cc65bab4c56f72351ed0bb0eae79de6a5574d7b20728e0349f977c4fef034d5396843109fc7d44a414a99e4586231ae8215e323c8a32f5ca5e1b9c66826ceb427b2ee612ec9b619c534c16dfb0866748b146cbdb84b45c28e027cb095617a46700b69a8f8909a44580b70429401f2f5e8e12c29e15fe2a00f8fc14cbeee0426fc7a417cbc1068357590f457cde32798628b6aae56c3eca13a77d8ffee002f0216c9949a11848bf01b2099fd921449a3dc20579ac93c2b1b4ad3af22cf7aecdfdff3ba4c49cee84b8cbedc2f1f405140a2a9f0bf8032778594420e1362a26fd2308416123511ee713a3719bdacf857bafef0b0d8ff0958e596323575ebeee2738b7d75d32a83384075f2098d7e60d5efc08e587400aad38c4c2026796838c3cc0e95f7c6040e7aec2694dd862c83d619f1e671280fccf6194fa0652c42995a738a0bc089a6de886bf50ab19c171e26efb449ab37a4906d93f2fcc13251e325863c506c54a10b1c212ca4a9616c3cb48a7f16548ed5ae7661ff38d365ffcc2348bd5ce98c9149d7001955badf219bbea0fe743e5ab5c8de4602e61aea923aceaaa623f88a5a9e0402a17477433be324c0a4b0efebff8740423000aa3c882861da23ec9637d6e413fc29ddc7d60c4f5c1e9a88d41aebaef4171d360d85429abb59c93fd437f79db5b4b6c78b577f42666e8135585f1d4b3b3a0f9a403649b4704833dff351d6becdf9c3c7ed44909eb6731c9115cc96e56667f575c12883f2bb05fbaa1d90dcaff4045670da43fa8bc2d3f878ebfd0ea5f1b2b682c0c7b428f6d55ba46ccb9f9f975799289691b14d1d91735c66f98fc41f080700ba0d0d22b3c3b50ff5f78e9bb3bf81fdacac19eec9cbde8acb8dc6300e651ba468a751a012eef3c327f456aaf9b8ab991c2cc8307aa65ea180b12fc1a67de1d31b2205f050e552ecd56c236ce2a37ac45415f3f9ae59bf13e1b1d6a06193041d250da4b62a95cb0d59e87b99cc994ea1423e3e7a1e4abc50167896b884228ceb2a85c411765999dc05912b53e369a7128edb6969321de533ee2afae43fef2c8ec77957af447d3715cf6ae3a83c565ba997d24b92584c698b79bc8d01d918cc73e9bcbe7c7d9666d7dd5f9b7e30f226d2a4e068d5335eafec6a9ec25334894765833ce56a5ef2580e8b200efd172be9cf406cbf0ce3f5c50c7d6cd4f7842e89cf9e817f94c1a90fe82f917dc70594fa108e396de31173510e84f5a2622700e0a87615e4dcbad860d650d09b401c35faf92a942b28b903d464eb37c04dc4485811c55ec522a305b11e2a2790b82c9b87927033402ce0042efe247afc9100d49f3cf6a5f81980eba92b6782bcf2c18e37ad7e91495940aaab209c2f96f2fbccd22206410b61c3dca6a5dda7c16eb89e7746ca4b2082b174cdd736ba59099ae650c1fc21153714d941debd48c9ffe6e064a4d1025d7b70e92e27", 0x1000}], 0x2, &(0x7f0000001940)=[{0x50, 0x10e, 0x40, "00c350a1a0fe03f59349f60c1b9b171e3bf1c90d8f954e283357e77a232efc9e8323613b7707ea51d2bd037f4bd8df28b06da86c493826c52a"}, {0xb8, 0x10a, 0xff, "f047f577132f203607de3a24b5c576e32ffa09bb38112c29e80d1e6e9e60a597667e70baeb71a1a6b0b3514cd35f758cf3d2b7bbc0dfbc21fd15a7412f8ad658a45e71efa377ace3b317611818baebafc0339b429f7d55f4ef951323f6b216b05081d14ce90f94c2e45e7575b82db3cb58dd329f55d0315b47336ed215f2d98faba765ee4ece728608217d27570c6867eb99729368d03c71670460a34459273bac14"}, {0x38, 0x105, 0x3, "8f93e82b92ebfe89b176b888113cf6870f7c68bebe390e9944249a19f629cc507859"}, {0x48, 0x112, 0x10000, "f323cc1c1df1f93d60b60fc051ad41132f8cae1e467b663378184c14b3c3c90ff5f71b5151a8a093d05dfd511b797dbea24e75ea"}, {0xc0, 0x117, 0x9, "9ca1e75f8898f9880d60b4d921aee4f4f6d0dbff9908c1dc6ce25c8db8dda2f72880eba017c32125ae04825a872e2e1071220b6e8cc20091aa9581f043ba43297b0d60676841a4981998143db030294861cdec4f9a4535c645536ecf0052d65d3480f8eb5f1c985909d63f9ed803b82b4d13f1158bba40a74ee7c59503732ce2c6a9fc1c759602841e41eb280f4c51a14acf099aae3bff53a54c86aab9c9987d1afbcff933bc5d93b6a66f648b90"}], 0x248}, 0x4041) 17:16:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x40000000) 17:16:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000) 17:16:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c000000) 17:16:54 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:16:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c000000) 17:16:54 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) r4 = syz_io_uring_setup(0x12a8, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r8 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r8, 0x0, 0x0, 0x0, {0x440c}, 0x0, {0x0, r7}}, 0x5) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_LINK_TIMEOUT={0xf, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x1, 0x0, 0x1, {0x0, r7}}, 0x1) 17:16:54 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:04 executing program 1: restart_syscall() unshare(0x8000000) restart_syscall() recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x2, 0xee01, 0x0, 0x0, 0x0, 0x100, 0x3}, 0x0, 0x0, 0x7, 0x5, 0x7f, 0x1, 0xff, 0x4, 0x8, 0x3, 0x0, 0xffffffffffffffff}) stat(&(0x7f00000000c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000380)={{0x2, 0xffffffffffffffff, 0x0, r2, 0xee00, 0x80, 0x8e}, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x8}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r3, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000b80)={0x20, r4, 0x221, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, r5}, 0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x80, r4, 0x705, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xa0f7dfede5cebda2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x44000}, 0x40014) unshare(0x2010000) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x48000000) 17:17:04 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) r5 = syz_io_uring_setup(0x12a8, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) r9 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r9, 0x0, 0x0, 0x0, {0x440c}, 0x0, {0x0, r8}}, 0x5) syz_io_uring_submit(0x0, r3, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x7, 0x3, &(0x7f0000000080)="064862b473c0eaa798ff67065283e4f7c1a8901faac0340fcb3d17907afe9d75f7b4defd0bd4f31f8b9c45b796f25eeecf8c22e02d", 0xded, 0x0, 0x0, {0x0, r8}}, 0xfffff001) 17:17:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x68000000) 17:17:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x68000000) 17:17:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x20000000) 17:17:04 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x400000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:17:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) [ 1270.277897] FAULT_INJECTION: forcing a failure. [ 1270.277897] name failslab, interval 1, probability 0, space 0, times 0 [ 1270.280941] CPU: 0 PID: 8466 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1270.282419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1270.284207] Call Trace: [ 1270.284808] dump_stack+0x107/0x167 [ 1270.285614] should_fail.cold+0x5/0xa [ 1270.286464] ? mm_alloc+0x19/0xd0 [ 1270.287235] should_failslab+0x5/0x20 [ 1270.288053] kmem_cache_alloc+0x5b/0x310 [ 1270.288936] ? kasan_unpoison_shadow+0x33/0x50 [ 1270.289920] mm_alloc+0x19/0xd0 [ 1270.290645] alloc_bprm+0x1cb/0x8f0 [ 1270.291437] ? __virt_addr_valid+0x170/0x5d0 [ 1270.292386] do_execveat_common+0x275/0x8d0 [ 1270.293328] ? strncpy_from_user+0x9e/0x470 [ 1270.294255] ? bprm_execve+0x1960/0x1960 [ 1270.295151] __x64_sys_execveat+0xed/0x140 [ 1270.296066] do_syscall_64+0x33/0x40 [ 1270.296917] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1270.298033] RIP: 0033:0x7f008031cb19 [ 1270.298856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1270.302829] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1270.304458] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1270.306001] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1270.307577] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1270.309116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1270.310673] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:17:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c000000) 17:17:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c000000) 17:17:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c000000) 17:17:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x21030000) 17:17:05 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = semget$private(0x0, 0x4000, 0x0) semtimedop(r2, &(0x7f0000000000)=[{0x3, 0x0, 0x1000}, {0x1, 0x7fff, 0x1000}, {0x6, 0x2, 0x800}, {0x3, 0xff00}, {0x4, 0x6468}, {0x0, 0x5, 0x1000}, {0x3, 0x4, 0x1800}, {0x3, 0x9, 0x1800}], 0x8, &(0x7f0000000040)) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$SEM_STAT_ANY(r2, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x4, 0xfff7, 0x1000}, {0x0, 0x4}, {0x2, 0x65fa, 0x1000}, {0x4, 0xfe00, 0x1c00}, {0x3, 0x4}, {0x4, 0x7, 0x1000}, {0x4, 0x1f, 0x1800}, {0x4, 0x6, 0x1800}, {0x0, 0x2, 0x1000}], 0x9) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:05 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x1000000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:17:05 executing program 7: restart_syscall() unshare(0x8000000) unshare(0x900) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:18 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x8, 0x8, 0x81, 0x5, 0x0, 0x2, 0x40128, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xfff, 0xb36}, 0x1701a, 0x5, 0x3, 0x7, 0x8001, 0x5, 0x1ff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(r1, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}, {0x2, 0x8, 0x800}, {0x4}], 0x4) semctl$SEM_INFO(r1, 0x5, 0x13, &(0x7f0000000080)=""/101) 17:17:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x74000000) 17:17:18 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0x4]}, 0x8) sendto(r0, &(0x7f0000000080)="187b1ca5c7aa1dbc9ea777eca65b484b899e1a39db1bee0d769767ea79488ae75f660465ef78f2e464e50585956126755b8fd0ada4111b432a59b1ee1f768fa408aa2ca2fe031a6d69ba13f4d1b63234cba675d07f2d28c90a2be14e9c11", 0x5e, 0x24000010, &(0x7f0000000200)=@can, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x23210000) 17:17:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x68000000) 17:17:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) 17:17:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x74000000) 17:17:18 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f000000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 1284.218560] FAULT_INJECTION: forcing a failure. [ 1284.218560] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.221160] CPU: 1 PID: 8517 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1284.222613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.224412] Call Trace: [ 1284.224976] dump_stack+0x107/0x167 [ 1284.225756] should_fail.cold+0x5/0xa [ 1284.226573] ? create_object.isra.0+0x3a/0xa20 [ 1284.227552] should_failslab+0x5/0x20 [ 1284.228369] kmem_cache_alloc+0x5b/0x310 [ 1284.229235] create_object.isra.0+0x3a/0xa20 [ 1284.230166] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1284.231255] kmem_cache_alloc+0x159/0x310 [ 1284.232139] mm_alloc+0x19/0xd0 [ 1284.232836] alloc_bprm+0x1cb/0x8f0 [ 1284.233613] ? __virt_addr_valid+0x170/0x5d0 [ 1284.234554] do_execveat_common+0x275/0x8d0 [ 1284.235481] ? strncpy_from_user+0x9e/0x470 [ 1284.236398] ? bprm_execve+0x1960/0x1960 [ 1284.237279] __x64_sys_execveat+0xed/0x140 [ 1284.238180] do_syscall_64+0x33/0x40 [ 1284.238984] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1284.240068] RIP: 0033:0x7f008031cb19 [ 1284.240864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.244775] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1284.246403] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1284.247929] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1284.249440] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1284.250964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1284.252481] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:17:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x40000000) 17:17:18 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', '{\'\xce\\-!{\n[#\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c000000) 17:17:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a000000) 17:17:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a000000) 17:17:19 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f0000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:17:19 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) unshare(0x10000000) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffff9, 0x6, &(0x7f0000000940)=[{&(0x7f00000000c0), 0x0, 0x13f7}, {&(0x7f0000000200)="c37b14ae9b369ed806365438e1c305d56f3b7dbbf36c2ac416", 0x19, 0x3}, {&(0x7f0000000380)="729fa8c88c159d26b9f6573d7a7fe7759bec967d4d204c0b652ba7fa204c70798c61e9333f6d6623f705ebc1d5b1fe6405ce2fac2f78444a988fc159bb02951f98d208590b5090322a452416ee74f22f4b9b07c4fd90af498ff3027d8cd69583f80df672994785e3abc40f6270d0a6833d74547a5340c1374a9c1b60b7d17aa63bd13ff9853760c727dfe9b716a2aebf31776ec6a06403313695594ffc2a15a1", 0xa0, 0xbb23}, {&(0x7f0000000680)="bf6ea2a6376ca2d5f0ae3c939d4bc13fce76dda447669dddb2ac02f754ad0e3a9b737b97616741cc2e291c8ca3577c129a1d51ef023543252328fa749fcfc60a41196cb1c63f271563174eb96178b640c656e02eb39d78fa125b89cd986156d59171279eea", 0x65}, {&(0x7f0000000700)="964700a00095b672c0ec2c57c4279de95d85367c9ff3f66f1dc3096144b92fa532f76d96bbbdf7d2b0925d6706474d42dca833767da7ff9cf319e1dfb9146f4a35fa6e729eefe249d4beac75978d61dd3da0474d16f352f1a0cb80b5048b327902870f20849d511a938bbc2a410f667cdfc997ccfc970c89ca78a40cf4b2a57750da626879bb186f257ffd013a61fc8997d232c01a864c3567c60f65f0cdfd86e97f8729a339f9f12a358a9cc3ce908b847f6b6e31186c9ce0246644db5f8bc376436a34b71893ab44800819133e75438ffd59b280bd82ebc09ec0d2b9f2b6561136ff7294e6e3688ebd43df0fae9a", 0xef, 0x9}, {&(0x7f0000000800)="05324a8b903dcee796663b46a95fd1fe2bec7c82e426b15d40fa746230de7be4c3ccf8eb6acf35ae83a56858cef9b0a09b0f3399d8b8fd7a5808ac684ca5777fc2cc42eb0f195a73711258225bcf28b8aa9f0f92c2a96cceb296032c", 0x5c, 0x53c}], 0x1020402, &(0x7f0000000a00)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@quiet}, {@dots}, {@fat=@dmask={'dmask', 0x3d, 0x9}}, {@dots}, {@nodots}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '-E]-('}}]}) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x200) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) 17:17:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x48000000) 17:17:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80040000) [ 1284.503334] loop1: detected capacity change from 0 to 135266304 [ 1284.525479] FAULT_INJECTION: forcing a failure. [ 1284.525479] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1284.528315] CPU: 0 PID: 8560 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1284.529852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.531703] Call Trace: [ 1284.532296] dump_stack+0x107/0x167 [ 1284.533137] should_fail.cold+0x5/0xa [ 1284.533990] __alloc_pages_nodemask+0x182/0x600 [ 1284.535050] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1284.536247] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1284.537631] alloc_pages_current+0x187/0x280 [ 1284.538211] loop1: detected capacity change from 0 to 135266304 [ 1284.538609] __get_free_pages+0xc/0xa0 [ 1284.538634] pgd_alloc+0x84/0x4e0 [ 1284.541577] ? pgd_page_get_mm+0x40/0x40 [ 1284.542477] ? lockdep_init_map_type+0x2c7/0x780 [ 1284.543553] ? lockdep_init_map_type+0x2c7/0x780 [ 1284.544630] mm_init+0x670/0xab0 [ 1284.545412] mm_alloc+0xa2/0xd0 [ 1284.546168] alloc_bprm+0x1cb/0x8f0 [ 1284.547014] ? __virt_addr_valid+0x170/0x5d0 [ 1284.547991] do_execveat_common+0x275/0x8d0 [ 1284.548959] ? strncpy_from_user+0x9e/0x470 [ 1284.549911] ? bprm_execve+0x1960/0x1960 [ 1284.550848] __x64_sys_execveat+0xed/0x140 [ 1284.551803] do_syscall_64+0x33/0x40 [ 1284.552642] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1284.553797] RIP: 0033:0x7f008031cb19 [ 1284.554645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.558785] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1284.560481] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1284.562065] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1284.563717] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1284.565307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1284.566915] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:17:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) 17:17:35 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000200)={'syzkaller1\x00', &(0x7f0000000040)=@ethtool_rx_ntuple={0x35, {0x4, @ether_spec={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 0x5}, @ah_ip4_spec={@private=0xa010101, @local, 0x3ff, 0x2}, 0x9, 0x81, 0x0, 0x0, 0xfffffffffffffffe}}}) 17:17:35 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x40000000000000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:17:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80040000) 17:17:35 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x600) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) r2 = dup3(r1, r0, 0x0) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x807f0000) 17:17:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c000000) 17:17:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x74000000) [ 1300.764801] FAULT_INJECTION: forcing a failure. [ 1300.764801] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.767358] CPU: 0 PID: 8587 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1300.768802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1300.770577] Call Trace: [ 1300.771165] dump_stack+0x107/0x167 [ 1300.771935] should_fail.cold+0x5/0xa [ 1300.772742] ? vm_area_alloc+0x1c/0x110 [ 1300.773588] should_failslab+0x5/0x20 [ 1300.774393] kmem_cache_alloc+0x5b/0x310 [ 1300.775277] vm_area_alloc+0x1c/0x110 [ 1300.776083] alloc_bprm+0x337/0x8f0 [ 1300.776852] ? __virt_addr_valid+0x170/0x5d0 [ 1300.777796] do_execveat_common+0x275/0x8d0 [ 1300.778713] ? strncpy_from_user+0x9e/0x470 [ 1300.779638] ? bprm_execve+0x1960/0x1960 [ 1300.780509] __x64_sys_execveat+0xed/0x140 [ 1300.781407] do_syscall_64+0x33/0x40 [ 1300.782190] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1300.783287] RIP: 0033:0x7f008031cb19 [ 1300.784070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1300.787983] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1300.789603] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1300.791125] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1300.792638] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1300.794340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1300.795863] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:17:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x807f0000) 17:17:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a000000) 17:17:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x68000000) 17:17:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8cffffff) 17:17:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) 17:17:35 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x100000000000000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 1300.990355] FAULT_INJECTION: forcing a failure. [ 1300.990355] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.993144] CPU: 1 PID: 8611 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1300.994660] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1300.996515] Call Trace: [ 1300.997092] dump_stack+0x107/0x167 [ 1300.997891] should_fail.cold+0x5/0xa [ 1300.998715] ? create_object.isra.0+0x3a/0xa20 [ 1300.999744] should_failslab+0x5/0x20 [ 1301.000568] kmem_cache_alloc+0x5b/0x310 [ 1301.001497] create_object.isra.0+0x3a/0xa20 [ 1301.002464] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1301.003587] kmem_cache_alloc+0x159/0x310 [ 1301.004508] vm_area_alloc+0x1c/0x110 [ 1301.005328] alloc_bprm+0x337/0x8f0 [ 1301.006147] ? __virt_addr_valid+0x170/0x5d0 [ 1301.007131] do_execveat_common+0x275/0x8d0 [ 1301.008105] ? strncpy_from_user+0x9e/0x470 [ 1301.009044] ? bprm_execve+0x1960/0x1960 [ 1301.009973] __x64_sys_execveat+0xed/0x140 [ 1301.010930] do_syscall_64+0x33/0x40 [ 1301.011764] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1301.012917] RIP: 0033:0x7f008031cb19 [ 1301.013751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1301.017884] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1301.019576] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1301.021111] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1301.022640] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1301.024176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1301.025737] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:17:48 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f00000000000000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:17:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8cffffff) 17:17:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) 17:17:48 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x84900, 0x2) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x115) 17:17:48 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000001, 0x20010, 0xffffffffffffffff, 0x6328b000) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c000000) 17:17:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0020000) 17:17:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80040000) 17:17:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x74000000) [ 1313.504646] FAULT_INJECTION: forcing a failure. [ 1313.504646] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1313.508266] CPU: 0 PID: 8638 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1313.509998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1313.512091] Call Trace: [ 1313.512655] dump_stack+0x107/0x167 [ 1313.513427] should_fail.cold+0x5/0xa [ 1313.514231] __alloc_pages_nodemask+0x182/0x600 [ 1313.515221] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1313.516495] ? add_mm_counter_fast+0x220/0x220 [ 1313.517471] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1313.518580] alloc_pages_current+0x187/0x280 [ 1313.519514] get_zeroed_page+0x14/0xb0 [ 1313.520330] __pud_alloc+0x33/0x270 [ 1313.521097] handle_mm_fault+0x1a73/0x3500 [ 1313.521991] ? register_lock_class+0xbb/0x17b0 [ 1313.522955] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1313.524069] ? __pmd_alloc+0x630/0x630 [ 1313.524911] __get_user_pages+0x6ec/0x1620 [ 1313.525808] ? follow_page_mask+0x1900/0x1900 [ 1313.526754] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1313.527764] __get_user_pages_remote+0x1d5/0x870 [ 1313.528778] ? lock_downgrade+0x6d0/0x6d0 [ 1313.529665] get_user_pages_remote+0x63/0x90 [ 1313.530598] get_arg_page+0xba/0x200 [ 1313.531397] ? acct_arg_size+0xe0/0xe0 [ 1313.532212] ? downgrade_write+0x3a0/0x3a0 17:17:48 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f000000000000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 1313.533111] ? count.constprop.0+0x1b3/0x290 [ 1313.534218] copy_string_kernel+0x1b4/0x450 [ 1313.535148] do_execveat_common+0x525/0x8d0 [ 1313.536060] ? bprm_execve+0x1960/0x1960 [ 1313.536940] __x64_sys_execveat+0xed/0x140 [ 1313.537827] do_syscall_64+0x33/0x40 [ 1313.538606] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1313.539697] RIP: 0033:0x7f008031cb19 [ 1313.540494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1313.544365] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1313.545950] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1313.547466] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1313.548974] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1313.550481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1313.551991] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:17:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 17:17:48 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x48000080) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:17:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a000000) 17:17:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0020000) 17:17:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x807f0000) 17:17:48 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xffffffff00000000, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:17:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x80040000) 17:18:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfbffffff) 17:18:04 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x141041, 0x0) unshare(0x10000080) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000740)=[{{&(0x7f0000000040)=@x25, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/38, 0x26}, 0x7fffffff}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f0000000240)=[{&(0x7f0000000400)=""/101, 0x65}, {&(0x7f0000000500)=""/162, 0xa2}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x3, &(0x7f0000000680)=""/191, 0xbf}, 0xc809}], 0x2, 0x41, &(0x7f00000005c0)={0x0, 0x989680}) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000800)={0xffffffffffffffff}, 0x4800) dup(r3) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:18:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 17:18:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x807f0000) [ 1329.433869] FAULT_INJECTION: forcing a failure. [ 1329.433869] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1329.435508] CPU: 1 PID: 8687 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1329.436238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.437127] Call Trace: [ 1329.437425] dump_stack+0x107/0x167 [ 1329.437926] should_fail.cold+0x5/0xa [ 1329.438449] __alloc_pages_nodemask+0x182/0x600 [ 1329.438981] ? lock_acquire+0x197/0x470 [ 1329.439547] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1329.440369] ? lock_downgrade+0x6d0/0x6d0 [ 1329.440935] ? do_raw_spin_lock+0x121/0x260 [ 1329.441529] alloc_pages_current+0x187/0x280 [ 1329.442129] __pmd_alloc+0x37/0x630 [ 1329.442632] handle_mm_fault+0x1ac4/0x3500 [ 1329.443223] ? register_lock_class+0xbb/0x17b0 [ 1329.443749] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1329.444464] ? __pmd_alloc+0x630/0x630 [ 1329.445013] __get_user_pages+0x6ec/0x1620 [ 1329.445600] ? follow_page_mask+0x1900/0x1900 [ 1329.446213] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1329.446864] __get_user_pages_remote+0x1d5/0x870 [ 1329.447518] ? lock_downgrade+0x6d0/0x6d0 [ 1329.448086] get_user_pages_remote+0x63/0x90 [ 1329.448694] get_arg_page+0xba/0x200 [ 1329.449202] ? acct_arg_size+0xe0/0xe0 [ 1329.449736] ? downgrade_write+0x3a0/0x3a0 [ 1329.450323] ? count.constprop.0+0x1b3/0x290 [ 1329.450816] copy_string_kernel+0x1b4/0x450 [ 1329.451420] do_execveat_common+0x525/0x8d0 [ 1329.452021] ? bprm_execve+0x1960/0x1960 [ 1329.452584] __x64_sys_execveat+0xed/0x140 [ 1329.453165] do_syscall_64+0x33/0x40 [ 1329.453672] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.454376] RIP: 0033:0x7f008031cb19 [ 1329.454887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.457348] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1329.458382] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1329.459176] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1329.460137] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.461111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1329.461895] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:18:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 17:18:04 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) r1 = getpgrp(0x0) syz_io_uring_setup(0x1b14, &(0x7f0000000380)={0x0, 0xfe9, 0x8, 0x3, 0x3, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000440)=0x0) syz_io_uring_submit(0x0, r2, &(0x7f00000006c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x0, 0x989680}}, 0x6) prlimit64(r1, 0x6, &(0x7f0000000100)={0x1}, &(0x7f0000000200)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x81403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4, 0x3, 0xfffffffc, 0x2, 0x3, 0x400, 0xfffe, 0x0, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(r1, 0xb, &(0x7f0000000000)={0x8001, 0x6}, &(0x7f0000000400)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x2, 0xd1, 0x3f, 0xdd, 0x0, 0x5, 0x2104c, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={&(0x7f0000000040), 0x5}, 0xa010, 0x10001, 0x2, 0x4, 0x6, 0x8000, 0x5, 0x0, 0x3}, r1, 0x2, r3, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:18:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8cffffff) 17:18:04 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:18:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 17:18:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8cffffff) 17:18:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0020000) 17:18:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfeffffff) 17:18:04 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x3) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:18:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfbffffff) 17:18:04 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1329.604864] FAULT_INJECTION: forcing a failure. [ 1329.604864] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.607612] CPU: 0 PID: 8718 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1329.609073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.610841] Call Trace: [ 1329.611409] dump_stack+0x107/0x167 [ 1329.612187] should_fail.cold+0x5/0xa [ 1329.613004] ? __pmd_alloc+0x94/0x630 [ 1329.613825] should_failslab+0x5/0x20 [ 1329.614642] kmem_cache_alloc+0x5b/0x310 [ 1329.615523] __pmd_alloc+0x94/0x630 [ 1329.616311] handle_mm_fault+0x1ac4/0x3500 [ 1329.617215] ? register_lock_class+0xbb/0x17b0 [ 1329.618205] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1329.619350] ? __pmd_alloc+0x630/0x630 [ 1329.620202] __get_user_pages+0x6ec/0x1620 [ 1329.621112] ? follow_page_mask+0x1900/0x1900 [ 1329.622079] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1329.623075] __get_user_pages_remote+0x1d5/0x870 [ 1329.624101] ? lock_downgrade+0x6d0/0x6d0 [ 1329.624997] get_user_pages_remote+0x63/0x90 [ 1329.625929] get_arg_page+0xba/0x200 [ 1329.626718] ? acct_arg_size+0xe0/0xe0 [ 1329.627556] ? downgrade_write+0x3a0/0x3a0 [ 1329.628469] ? count.constprop.0+0x1b3/0x290 [ 1329.629420] copy_string_kernel+0x1b4/0x450 [ 1329.630357] do_execveat_common+0x525/0x8d0 [ 1329.631302] ? bprm_execve+0x1960/0x1960 [ 1329.632178] __x64_sys_execveat+0xed/0x140 [ 1329.633072] do_syscall_64+0x33/0x40 [ 1329.633855] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.634927] RIP: 0033:0x7f008031cb19 [ 1329.635737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.639705] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1329.641341] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1329.642885] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1329.644424] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.645957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1329.647502] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:18:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0020000) 17:18:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 17:18:16 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xb) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:18:16 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semtimedop(r1, &(0x7f0000000040)=[{0x3, 0x942a, 0x1000}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}) unshare(0x30200) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:18:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 17:18:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfeffffff) 17:18:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xff0f0000) 17:18:16 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/203, 0xcb}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) unshare(0x443041585e866f98) semget$private(0x0, 0x4000, 0x0) ftruncate(r0, 0x24c4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') semctl$IPC_RMID(0x0, 0x0, 0x10) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x113) [ 1341.459753] FAULT_INJECTION: forcing a failure. [ 1341.459753] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.461506] CPU: 1 PID: 8746 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1341.462508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1341.463730] Call Trace: [ 1341.464128] dump_stack+0x107/0x167 [ 1341.464661] should_fail.cold+0x5/0xa [ 1341.465225] ? create_object.isra.0+0x3a/0xa20 [ 1341.465891] should_failslab+0x5/0x20 [ 1341.466441] kmem_cache_alloc+0x5b/0x310 [ 1341.467030] create_object.isra.0+0x3a/0xa20 [ 1341.467688] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1341.468423] kmem_cache_alloc+0x159/0x310 [ 1341.469040] __pmd_alloc+0x94/0x630 [ 1341.469598] handle_mm_fault+0x1ac4/0x3500 [ 1341.470211] ? register_lock_class+0xbb/0x17b0 [ 1341.470877] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1341.471662] ? __pmd_alloc+0x630/0x630 [ 1341.472249] __get_user_pages+0x6ec/0x1620 [ 1341.472869] ? follow_page_mask+0x1900/0x1900 [ 1341.473537] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1341.474218] __get_user_pages_remote+0x1d5/0x870 [ 1341.474907] ? lock_downgrade+0x6d0/0x6d0 [ 1341.475529] get_user_pages_remote+0x63/0x90 [ 1341.476166] get_arg_page+0xba/0x200 [ 1341.476699] ? acct_arg_size+0xe0/0xe0 [ 1341.477270] ? downgrade_write+0x3a0/0x3a0 [ 1341.477883] ? count.constprop.0+0x1b3/0x290 [ 1341.478527] copy_string_kernel+0x1b4/0x450 [ 1341.479157] do_execveat_common+0x525/0x8d0 [ 1341.479790] ? bprm_execve+0x1960/0x1960 [ 1341.480387] __x64_sys_execveat+0xed/0x140 [ 1341.480994] do_syscall_64+0x33/0x40 [ 1341.481527] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1341.482257] RIP: 0033:0x7f008031cb19 [ 1341.482787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.485441] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1341.486529] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1341.487568] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1341.488586] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1341.489604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1341.490630] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:18:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff7f) 17:18:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 17:18:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xff0f0000) 17:18:16 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) getsockname(r1, &(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f00000000c0)=0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:18:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfbffffff) 17:18:16 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8005, 0x0, 0x0, 0x6, 0xfffffffffffffd1b, 0x0, 0x3ff, 0x0, 0x1000, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) getpgid(0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_WRITEV={0x2, 0x1, 0x2004, @fd_index=0x1, 0x81, &(0x7f00000014c0)=[{&(0x7f0000000280)="f1292d1e6ac3d35b77e09834850fe1d4e36a3b0c92aa5475154799457b48b25085766f1ba12517d2513667d2473befc380686e92ede7c595d168db4ac0ada94f4e2b0e79775ac70053262ca7b814d671faa8942f62ddad17e56d902f7fe28f6f34445527be376d8b05660b", 0x6b}, {&(0x7f0000000300)="84e38bb8492dd65adbc8dfcd0d37c7383125e62e5e7849c2ed8ad4eb83183fe7a317f2c7862c26b01378747a11158306568bd15bea7a8511e5c79280ed323daf4a8295d5f75cde29c4918058bf373e41b7a68684a9fd588ae9550cf26fd7582d1ffd8e3158640563ceedf2e2270c95c8ac335d7005056894500716ea2782bf3bd9f38f", 0x83}, {&(0x7f0000000000)="d9d05dce0c5d7b41a08627b2f0389902f145f0200db0d7647e98762b94ac2a960621c7348587f3d6575872a56581ef0385bd594572f965be9b74eb06bfa9", 0x3e}, {&(0x7f00000003c0)="41d96d4972eac8c920866b9df3c34ff3bfe43d94dc700bfd73693c599701a049fec04ee7e959d03233b7cef052a7baff29635c113bf0b232a82220eea1433d7ec0a8120a12681b4ab29281351fab916b81370142b92b9dc7aae88fb5282bd893d615039e93e43cf9292f5ee80deda6203dc87cf22885618d9ad2992072cc2f7fdb7dd616bd177eb392af6192ff014c878d4eb62b400be307b3562f38d6260d49b054ef94d49658333c3c14399546c5c5a9c6cc7e25b376ce87c2d90345d673f23451009f1482fb8c14ff61646810f6a09bfa1e9c2100bb373c52bc392e2ac1ebc4bcc2", 0xe3}, {&(0x7f00000004c0)="70149d4e9e148403beb3813346723ecdc1eca242ef044680dd7eb425b0084bc8b87954027b29d4162b179b0466fc0544bee3b6a3780ba875080549196e038a650535a4de5b6587b66c641c5a382e7f1ddee013079b382c5e3964539f79a3ab806bfbe4f9a8975dbde4639593f94971e5b056397513eaa4b19878311608691d04eb4b70f936bac4a2a2335ad6682acb3a9d50cf9b2a067c3d5083cd55adea835804431c0a07de76998b67ec67823c22dab00237753b1adc2cd7a762552e833878d21b38d83c5e964f6fcf363b28db17ecd53fd6532edcbfc16c75d8213a468f3b377c25139335edc05c84d7fbe3808c47c0aad79794375cc5ef20642c7b775c593efdefe3d841e22c824bd51ac8b4dd8f369d339addd06ce90822826e26299a4b638a98d5a0600a4ce872cfbb3c9a30ce88f3524792f8e612effc746911c47846e5450a6994b0a4aa664df569271fdbeee49eacd073088f1dbc8d2c51dfbf2256753752b96d1d2830e3f7be98117209691ce0e6eab951ce85a0263d03dc6c3439aed0dda51306adf3a5575d6eaae5d928025eb5ad52cebc65eca1f4a9be51839b6dd0089d8b7cad373c7ae62a67e8db368aad653df8a921b3184b0fff7194a53e256295b8ab5ac56e9858de6397e8afd5407c04c78e65896fe245e43ad9bbbf54e5ff6e353c3bc965e1aa3d551362ccf0c9d14fbf3305011c3f3701ae11a1980bfa525a392a9338a94c7c6e1b57bb823f60f1531e1caf68ef75339fc4af9c4b36c273d948d3721731aeb1e84fec4cdd1019ea4c71d8e6367d3f1cc4cf5a511d2b5a9cf2b4acfb08ddb28af6930633c4337e2297c7a2c3db65962b09b8d7defc4b0381ed4be4f70b4ed13dc172c31e8ce442177942bdb49d06af981c6ea15d3bc1e270e262148d67f99c3c2ba400e1b0f21c647356b0bb7bb5f9ee71cb72354adf5ea73d1012da8428ca08fb2cd83d6f627b81d7a4d6b8dbe79c8f1a60cd126946316ea60ed456660617addf0949e37a55955fd8a9a24f0c5de6c96fe7ccb5ec9a21b1763a8153072ba23d1c4d64a5f65da5b59b993cb97819e8af00eb3f96bad033e5db579da99f8d842b9f84ea347b480e31c8955306c00f50aed29d9f9034555a99c9907cb2fed7beac6ec89fc689217599c60724933484a686d323957b87148c3ffedfa6c6a693021718a850e798ded6323487eb08c0f8fd17b7710a628d02316d056f0884ef5db06b46d26db56e33e8361cca1b51e0147054ace89c5d69f06edaed1aa3c80086787e535809d12bc3b535b8755afba057f511a63c687828953726ce07075466e203ef5898ea4e242f7e0a77b019a1f741b5f65adbebfb93e49ace3a45c2ffe8bfde5a282cd2d77b852718595f5fa2db072d55b1bb757d1c29257304ebaf4f43b1b5443819cca6deeef9d65ec9093db9f3cc96e7da9fe840642dae532716e9f0b594cfd967d41bcc457d9923d400bf5db7d8932b11198f72a1aba3ea74f0187558682f116a854e6675d25e6058f50521e11da3e648845f1b6e20e4cf0343edf8162fe4dce685616c50e6dcff32e5a8e2e6ca04c52a49e9f29231306b5e1b23b10c756c330f2d8da1edf3848b211f71746491502ff56fb8eb30a7c27ef03c32838ec559a39834796d83dbba4bc501d9453fa33c4eadaa26fd865fa8e9647063d852e2eba4ac6f2caca6b7ceee70cae2bafc0e0da72f77e79927b16b555ba824f0c97f76681dfa78dfd5fc1310f8f960059757fbc9ca890d985ef6097a6dedc79c784458f9b19d2670398e99c9b5a72b053ca02610aa4f17863d9537e770a38e6583fcc8c2bf180e4bbce5045229dff1d18d45ae2fa77a3d62feb424a7f72a67c67565b79c74f493e50700844d8cc4fc765c21d716de1f72e987264899e2abfd31c41e3af04bed7abcc024bc7d0bbcbc07e1c52fcf1c7d40329f36c1339ddb853566126a88af5ec53201c4f9c6bf65db3302ba4709d29f61e3fc87bd1508d41e4933100018cfbbf8d961ca6dcaa28371b62a15987c3914bc8dfac3d99af28ca86c4856bbe49f954204d3b8942fd56c305cd56a995caf0efc2edd14bd3ef7f5b9406a6754df15e5e51b825dcd3571ad8938601d2b5f057b64684eb0e92eb3c0f9e67e15ab54d29bb4d04d94ae7fd5688d1f9289ea94622ac5bba7605ca1d1090d0e082bf8bffaf9734604480de800129bcf1b7956a4aebbacf3e58a20491529c7b1b0e76dda027ef5c289160d84079a066ff3ca177311f111bc0a7a056ffcdc07ae2ba05af1e385fe61e35d8511a32064f1fd5a051590342edfe96e77e393f5ad719cb19f97a4374a86b0395995345d393c0efa3d7ba23ed166dda4af6eb6d8da349b31ccb18f2005d7b55be8160b0df6ff66d6f7489c2ed767fa4599710d907c87e60ef27f029b800c73d6c20b809b6e8e374c1ce62e8887d5350324f24bf81e3dd1419da88a3db0ea22629fdf5e68691ed1ba96494ecdd116c245dcbe72a43017feb9c0c4937ee9e74308fcaf2f8d06398abb6359fef9983a30f67d13ef3841e0017d2e96048ed66c73764ecc6cb3c3091c15d32836e2939af86f9e68902502644f92e2749e269a82eff99b1843752f5e09abb037630f1754b993917b71cf377fb34bc4c91138614a4aa444ba1728e1444e52b00440fb0b3bf71a44f6b43185e7edc61cc52e9e80ebc4eec1a1c285c63ab64ae04711e199483ad4e151c09c24aea2c696b2703524d86761f23c32b34e36567348abd1010a8cfefdf5cac1083eba1ea1c7433617eb978bb6c3a42ec9985e4d15de0efc43cd2043350a60e705d0d5a0a2d5cb44f3ba889a2fcae458272c20f7194a7048ec20ac72e077a8b47cb19c2ed2d3660547a733e0300f7f42e35a5a2d9736f9d84f0ce3ab1da3ef3bd7fa4f9046a002ee40fe6cf3c42552802095164b9bdadda501bdb48031b545c226f42e7170f4e80d1bfd16f8c6a40f15195d63817bf1e7ef028fe832d9284fd93d5cad74b4ff83d318e065e8671266e4ffefc9099de026f3d7f309aaa64515c32436ea6f4711abfeb3421084040344084f01a161446aca80db916675e538d7ca893776222424e3c607a4225e4858e8ecc70b1779b939a8a381f22f536cd1ee183a627ad7b0642b30d062edea830f98ea26f93c1524b7577765f6d40603995799db3b340fedad824546c97d599dcb3ebd2042ded0de1e780a165a982d499e81bc335bc851c4cbd9914ec3d5075af682b6ab7c1873261a6f94dcaea1787aa11c10be6a416920163894595c80ba6e28248aaa66329bac2cce8b7616347018b7714b9e5d6658e844651a55ece016201013ad2b44c6e908ba43b5df32c05bd48417b346315c1d423f8466d9ead2f12e8857dde077e769d80dfd7c6c53115b667a029f25e0f1473734e4b5ca436780f873b2c9872e52ff426f478d914e3a7f226d94690bb4503343b908f11b5d816011fd7b4cfae84022d25b88f2dd5b5db5f0c3cab82346bf633d824ae005cb3dd39726e817fa7eb1cd87b5a5263c0b59072e79c4c9700ee70232eae5f6f850bbc3c8a55bdc6016f17ef034be64df8f04513aef8bdae2cfe4a566908eae2eeec1f92085d0340a6ab23b9a6f9ddb9bdbc1d3fc24b88bf5659bba3b6951877f743a573c1ed0e6a81cb856472e137c6279a0b5c4ce0f295a8006d4717871c145ffb0643afc109877bf5580a2598d513b015ec18ec8c5905fc87398bc6ec08a5d1212f06a54c7fa0ea05ff3533c18d472bc95ef951dc42fd82f082d09dafc3e7ad847d581b9fb22343c2b8c2215d9e5737ec499363e35d8beb69fc3f42b7d638ba74600243282aec76f35cc252aa90b8003905a8861d7b9a9a75cf521552fa0d34343c5c856a8c9a7ec4f5d44647522d40f75e319adea0d4de4eef8de33b359684c905d0b738213cb116f2b6cfd6bc1875ec6a0fc9f6fe514d73815a3d3fac50802ee4caa23db53e6fa489dde0f340fa05d422dcb0e9e0b96854162a0c5a06d3e88c545e3940fdf84317bbf7192e0b67d547a3df193b8ab21dd2ca503ca745a45dfd33d80028c306c3950e5f2e982881cdd2df902bbb843f44010194b7ceadb141109b8b8117e700c773c99b32c029c39fe8b8d928764866550097f0a8cd17131f2760318b9a86f950acbb45ad7657255ae485f8df204997f9b9414d187302ed15394e5a949ec611d849fa77e38e05d954b021b853ce6c9e0238c780ca99182f653f5bfe3e03eb730901134031fd19cf3e49faa40caf5cea998348791281a3f653c906e57cb76713ba0e4306826c045a7a2ccb3ca9fdd8ec71b45b2e575ee861e09bed79e78ec69ce54f90b712bc6d82065b7de1075dcff99a55d862029f039dadd30d953b32698894852c91745ecdc789790f3bfa75e7fed6b34adaa5788d907391843e24d7019c2135c1cd9c22e53e949310e2d0cdd6eff50dfb7758098b176ddd74d7fd2f0c3ada67baa89e85885b6d6e405dd709c74d6a731770205b482107356c7ac626e0da31da651ae1d0833ebd1a73ad228e303ef9cdf3c2dcc99ab710512835b9e8b7c58d51b376d5ed86b30301523ae6fda4b2a901d5c163ec33e6fa83c6d704c36f5693f17e0b4247e033e8b438adca80f17e638be1a0fff5e4c743aba20633bec2a0ad525569c6b0e8dbd2ad5c6ac8ca43528db64d95be58a4ceceea3f1e54d4da4fdfde86add8e816e8aae634739753196112b491b60a0cc991c642b7f34b83e84ebe902a1eb954cc54950c14a873dc1737d774031fccb9f552809f59b6641ba29915d97a1aa15181037cdd914e3523384f0fa2800f0d4873756d796dc32085fc36848eebdc6a990380eb90aa25c1dde8748ee081c702955960d7b1bc79aec5021a55167a309e3bc32d78bb1475b640e8febcfc2aa1b22774e13be0f283d5e584f3c3f81d226af54b6899fff143e14e17fbc69ee67b3573aed7c39e8cd342ddfe6c2662ad18919dafd3cfb35cff5d5d29c4573bf216d8696aff5b58f5b448517a521b1ed19f27571b3fbbd9a481367d46cc59ee9f7ddcc9ae0e1520f7f1098edc1bac883e2113c432098ef0a282dcc172dc88a76f4146e1177c2806e4727782c612622604c3a323cc07ebb0e6b4a2a86e81c1f7094ca05d5b101d9bf1816feaffd1462a8a957bd1047f8f5bcc03b44d08245d6107d16989c3719f6a5778ccfbc01d8e906992cb6ada89d0db6a6510e08f969c6ce0ee7b7e36a163f935e5682b567cf9bb820615d05ce2e9e6fda6ef96b3e8dd9fe11fa92bdc36befcf9495cb7dd0a247eb9c6d4a76609845cc3c351acd589f1cf6f753be60cb9360ec7ee72fd88f26381477500cdcf1c3613fc53ed1a1b58ef4dd2dd63e9beb7192c3e13163e275baecc46d3e75b981809df061842788064101ee1ae58c21e3b80d41f6e69fe42d41e1d55656b538ca10f675bdeeeae41752d7259921d57bb3c8d45c7b7564c1806de06a2b1992725003050b4bef378f1399e53d704c987fb1fb38dc72a6365491bd42760dffd99393dcd69f6ba5ba33d8d8783b048ee109fc359be6a10e88e8cd802e40ee0b980727e57d3edeedbe65ce2c2205673af850c90dc88dea5f9092f4e26c68b9a4337c2cbbd8891a9c17f533df10ccb4eb00b22ed8233ad61c2923fc9b257ba82712a2f5914504b2e7c84f6ecbcb47db71f482cc382e21fe4595de35a08ed9bda0e3f76f849e03489bc5b6217e2f5485a0a6a2ea6cdf29d9b18ef24606f597e7119270727722da1e4640f3cd457d97e090b6c4cd3f8fc62ebfdd76c546c3d315ca3a42aa83b82280", 0x1000}], 0x5, 0x3, 0x0, {0x3}}, 0x89) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) fcntl$setlease(r3, 0x400, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x80, 0x6, 0x6, 0x3, 0x0, 0x80, 0x20400, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x8, 0x279}, 0x2010, 0x40, 0x9c7, 0x4, 0x5, 0x3, 0x400, 0x0, 0xffff06bf, 0x0, 0xfffffffffffffffe}, r4, 0x6, r0, 0xb) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:18:16 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xc) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:18:16 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfffffffffffffdfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x2000, @fd=r0, 0x10000, 0x1000, 0x80, 0x0, 0x1, {0x1}}, 0x2e3de8f6) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r4, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:18:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff8c) 17:18:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 17:18:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfeffffff) 17:18:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfbffffff) [ 1341.828685] FAULT_INJECTION: forcing a failure. [ 1341.828685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1341.831713] CPU: 0 PID: 8805 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1341.833209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1341.835102] Call Trace: [ 1341.835740] dump_stack+0x107/0x167 [ 1341.836523] should_fail.cold+0x5/0xa [ 1341.837386] __alloc_pages_nodemask+0x182/0x600 [ 1341.838392] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1341.839690] ? find_held_lock+0x2c/0x110 [ 1341.840560] ? __pmd_alloc+0x31d/0x630 [ 1341.841436] ? lock_downgrade+0x6d0/0x6d0 [ 1341.842333] ? do_raw_spin_lock+0x121/0x260 [ 1341.843356] alloc_pages_current+0x187/0x280 [ 1341.844434] pte_alloc_one+0x16/0x1a0 [ 1341.845259] __pte_alloc+0x1d/0x330 [ 1341.846112] handle_mm_fault+0x287f/0x3500 [ 1341.847127] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1341.848278] ? __pmd_alloc+0x630/0x630 [ 1341.849137] __get_user_pages+0x6ec/0x1620 [ 1341.850048] ? follow_page_mask+0x1900/0x1900 [ 1341.851012] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1341.852037] __get_user_pages_remote+0x1d5/0x870 [ 1341.853103] ? lock_downgrade+0x6d0/0x6d0 [ 1341.854058] get_user_pages_remote+0x63/0x90 [ 1341.855140] get_arg_page+0xba/0x200 [ 1341.855965] ? acct_arg_size+0xe0/0xe0 [ 1341.856983] ? downgrade_write+0x3a0/0x3a0 [ 1341.857908] ? count.constprop.0+0x1b3/0x290 [ 1341.858864] copy_string_kernel+0x1b4/0x450 [ 1341.859874] do_execveat_common+0x525/0x8d0 [ 1341.860813] ? bprm_execve+0x1960/0x1960 [ 1341.861729] __x64_sys_execveat+0xed/0x140 [ 1341.862737] do_syscall_64+0x33/0x40 [ 1341.863568] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1341.864657] RIP: 0033:0x7f008031cb19 [ 1341.865634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.869893] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1341.871760] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1341.873355] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1341.874883] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1341.876471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1341.877999] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:18:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 17:18:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff7f) 17:18:28 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xd) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:18:28 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3, 0x4000010, r2, 0x8000000) r4 = syz_io_uring_setup(0x12a8, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r8 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r8, 0x0, 0x0, 0x0, {0x440c}, 0x0, {0x0, r7}}, 0x5) syz_io_uring_submit(r3, 0x0, &(0x7f00000000c0)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x1, 0x4000, @fd_index=0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, {0x3, r7}}, 0x2) 17:18:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffff6) 17:18:28 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = getpgrp(0x0) prlimit64(r1, 0x6, &(0x7f0000000100)={0x1}, &(0x7f0000000200)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x81403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4, 0x3, 0xfffffffc, 0x2, 0x3, 0x400, 0xfffe, 0x0, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(r1, 0xb, &(0x7f0000000000)={0x8001, 0x6}, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x1, 0x4, 0x81, 0x8, 0x0, 0x0, 0x9001, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x59c}, 0x400b2, 0x7fff, 0xfc4, 0x7, 0x100000000, 0x8, 0x2, 0x0, 0x800, 0x0, 0x100000000}, r1, 0x0, 0xffffffffffffffff, 0x8) 17:18:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfeffffff) 17:18:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xff0f0000) [ 1353.775586] FAULT_INJECTION: forcing a failure. [ 1353.775586] name failslab, interval 1, probability 0, space 0, times 0 [ 1353.777499] CPU: 1 PID: 8824 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1353.778675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1353.780119] Call Trace: [ 1353.780586] dump_stack+0x107/0x167 [ 1353.781217] should_fail.cold+0x5/0xa [ 1353.781880] ? ptlock_alloc+0x1d/0x70 [ 1353.782549] should_failslab+0x5/0x20 [ 1353.783202] kmem_cache_alloc+0x5b/0x310 [ 1353.783921] ptlock_alloc+0x1d/0x70 [ 1353.784564] pte_alloc_one+0x68/0x1a0 [ 1353.785226] __pte_alloc+0x1d/0x330 [ 1353.785867] handle_mm_fault+0x287f/0x3500 [ 1353.786605] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1353.787535] ? __pmd_alloc+0x630/0x630 [ 1353.788239] __get_user_pages+0x6ec/0x1620 [ 1353.788978] ? follow_page_mask+0x1900/0x1900 [ 1353.789752] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1353.790565] __get_user_pages_remote+0x1d5/0x870 [ 1353.791403] ? lock_downgrade+0x6d0/0x6d0 [ 1353.792126] get_user_pages_remote+0x63/0x90 [ 1353.792887] get_arg_page+0xba/0x200 [ 1353.793531] ? acct_arg_size+0xe0/0xe0 [ 1353.794205] ? downgrade_write+0x3a0/0x3a0 [ 1353.794928] ? count.constprop.0+0x1b3/0x290 [ 1353.795708] copy_string_kernel+0x1b4/0x450 [ 1353.796456] do_execveat_common+0x525/0x8d0 [ 1353.797201] ? bprm_execve+0x1960/0x1960 [ 1353.797911] __x64_sys_execveat+0xed/0x140 [ 1353.798629] do_syscall_64+0x33/0x40 [ 1353.799284] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1353.800173] RIP: 0033:0x7f008031cb19 [ 1353.800819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1353.804016] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1353.805322] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1353.806548] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1353.807777] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1353.809007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1353.810239] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:18:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff7f) 17:18:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff8c) 17:18:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) 17:18:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffff6) 17:18:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xff0f0000) 17:18:42 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000940)="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", 0x1000, 0x6}], 0x4, &(0x7f0000000380)={[{@nombcache}, {@nodelalloc}], [{@smackfsdef}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x3, 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x180, 0x10) 17:18:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffb) 17:18:42 executing program 7: restart_syscall() unshare(0x80) unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x4002) dup2(r2, r3) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x2, 0x2, 0x2, 0xd14}}) 17:18:42 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:18:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff8c) [ 1368.235851] FAULT_INJECTION: forcing a failure. [ 1368.235851] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.238568] CPU: 1 PID: 8847 Comm: syz-executor.2 Not tainted 5.10.239 #1 17:18:42 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xf) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 1368.240013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1368.241889] Call Trace: [ 1368.242508] dump_stack+0x107/0x167 [ 1368.243262] should_fail.cold+0x5/0xa [ 1368.244068] ? create_object.isra.0+0x3a/0xa20 [ 1368.245018] should_failslab+0x5/0x20 [ 1368.245813] kmem_cache_alloc+0x5b/0x310 [ 1368.246649] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1368.247901] create_object.isra.0+0x3a/0xa20 [ 1368.248800] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1368.249858] kmem_cache_alloc+0x159/0x310 [ 1368.250718] ptlock_alloc+0x1d/0x70 [ 1368.251478] pte_alloc_one+0x68/0x1a0 17:18:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff7f) [ 1368.252266] __pte_alloc+0x1d/0x330 [ 1368.253136] handle_mm_fault+0x287f/0x3500 [ 1368.254008] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1368.255076] ? __pmd_alloc+0x630/0x630 [ 1368.255909] __get_user_pages+0x6ec/0x1620 [ 1368.256781] ? follow_page_mask+0x1900/0x1900 [ 1368.257698] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1368.258665] __get_user_pages_remote+0x1d5/0x870 [ 1368.259653] ? lock_downgrade+0x6d0/0x6d0 [ 1368.260517] get_user_pages_remote+0x63/0x90 [ 1368.261428] get_arg_page+0xba/0x200 [ 1368.262220] ? acct_arg_size+0xe0/0xe0 [ 1368.263018] ? downgrade_write+0x3a0/0x3a0 [ 1368.263892] ? count.constprop.0+0x1b3/0x290 [ 1368.264792] copy_string_kernel+0x1b4/0x450 [ 1368.265678] do_execveat_common+0x525/0x8d0 [ 1368.266571] ? bprm_execve+0x1960/0x1960 [ 1368.267431] __x64_sys_execveat+0xed/0x140 [ 1368.268296] do_syscall_64+0x33/0x40 [ 1368.269063] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1368.270113] RIP: 0033:0x7f008031cb19 [ 1368.270874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1368.274778] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1368.276350] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1368.277801] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1368.279266] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1368.280728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1368.282203] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:18:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffe) 17:18:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffff8c) 17:18:43 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x11) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:18:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffff6) 17:18:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffb) 17:18:43 executing program 1: restart_syscall() semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000380)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x77359400}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) unshare(0x880) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(r1, 0x0, r2) openat(r0, &(0x7f0000000040)='./file0\x00', 0x2000, 0x8) 17:18:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 17:18:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 17:18:55 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3f, 0xa, &(0x7f0000001b00)=[{&(0x7f0000000380)="11beb26b1f3b6e18e20bdcf66ea71e50804fe747a2653e9903b2702d25d560efa220a292fabc5baa8c2f1d0ac21d1b39940fce81950d06662431f4de04394f28c11ba0d2e99a181c7e96b22feac0145737d1420f6f6de7c0d0d625629d22bffaa40a9068b3a0d011860f32b12b315b4449b60fbfa50f5c385b591f6348e51173f7aed79f25fa7c9c11d3ea447e74afac3d15e5ad93c900e715d3d8fbb4cee3e0184b6412097791bcbe5eead4667bd8369fe99ec4081d57962bf6d45c", 0xbc, 0x1}, {&(0x7f00000000c0)="12f7f629f38068e9d5da41ee214b190db232724136b3eb0891370a06db3db9c90cdf4e8e3ea866c33c31f0d96a0ffb9f4a5edf0d5eed13", 0x37, 0x7f}, {&(0x7f0000000200)="c3aa5dac7c96572681", 0x9, 0x9}, {&(0x7f0000000680)="a62f376ebdbd58a1da2b32ff022fa3a1497c0e92e8c9832b11fb53dde0f90499bed276f2ee5ec382a49ba0d405f4182719fab5660c8affeeb277c8fca6ebb5b80c84218155248617865d73c1c3e6ea799adec526b6897a1198bb8d5fd204f473d048dad72f7a980c290422e41c6c2f3d98349be2073ffa04b951be42281b12fb1ae6cc6ec5a91116fc9a3889d3f309fdec83d42fe2d8a5ca296498ce6cc746ea6f25764f40cb0225062bba912c7fe666db36ddb5c0fa6bad61662dbae1982578726f6db5e1139ae1d13eb0982bcbceb4204b9911de98c7eafce1adb659ba09eab29e432907f546834ca7494337", 0xed, 0x600000000}, {&(0x7f0000000780)="8eb9b3a4c433c86b27db524853218f410a914f440ef1d600f8e3dc9e8bdf3a9d1e6a592ceda30adeb39aa059ac7f72e1370216148f155ea77a2a446a29e6beb10fecdfc581c57d747296025b5f469ff78a1a4b6f88", 0x55, 0x3}, {&(0x7f0000000240)="662c5d4b932e35d6dec2a90a894fb733e17796e3ae4f72875dad0164feb1cf7ad409f53a", 0x24, 0x3}, {&(0x7f0000000940)="9e023c44ff59ccd7e5443454e112d9e3fb05ac1437656221f594d12a53d20acce26277e5ad53aa554575c88a2408a25fd57ae7ba80ab8582f2f633804a7470a1eb25f6c2149237d4244351bfd55edb9280bd20f40e81409f25910e917d7bc67ed85f97b507606ceada4d95ceddf9f81b6cc3807b6e5ca213dc5bc15c824733e2fc48c067ac4f5696f15e9e88536939b48fa23ad2497147a2f72be06b90332f3cf00eab154ee0c19326a5b0a16433c9e0c3a7", 0xb2, 0xfbc}, {&(0x7f0000000440)="06eef9255947c589237887d3d153001e86867aeff87e36415f07dbddf71d0c9652121d42a4ffb1205e9324eab5ed6d5a67d6e0", 0x33, 0x4}, {&(0x7f0000000a00)="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", 0x1000, 0x100000001}, {&(0x7f0000001a00)="3acac1cc45f49fba3b3015b60ace299f9fc0c260683e9c5192cc15c0c015c6117718573c1d9c81816a83c9b90b3f60d014b69aae3db53d7deaf26de36db0c2c83d69f234d806a666c43d8b6ed44f32c3efe5fcd2dd650148f4aec70130ddd15215645d6d8beaa880a964d8cd9229f5408458ab54ae03423b1c6ec3714df97eb42f81fb87a15dd30c2b9270fbe24b2803c0261bafc4d21b343c6fbf40a4c0722fa5c14838b54e1de8d932f67ad4de533de4f06c21fa355b232959e144062ee04a9f0aaba2bfa468eb988f0af7d53b1c3ed5bd69ebb87fb8bcf3", 0xd9, 0xe5}], 0x128002, &(0x7f0000001c00)={[{'!%'}], [{@subj_role={'subj_role', 0x3d, ',][*'}}, {@uid_lt={'uid<', 0xee01}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x37, 0x3, 0x32, 0x35, 0x35, 0x62, 0x34], 0x2d, [0x66, 0x35, 0x65, 0x39], 0x2d, [0x39, 0x35, 0x33, 0x62], 0x2d, [0x30, 0x61, 0x64, 0x31], 0x2d, [0x35, 0x39, 0x61, 0x31, 0x0, 0x36, 0x33, 0x31]}}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@smackfsroot}, {@smackfshat={'smackfshat', 0x3d, 'N'}}, {@measure}]}) r1 = openat(r0, &(0x7f0000000800)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = semget$private(0x0, 0x6, 0x0) semop(r3, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}, {0x2, 0x8, 0x800}, {0x4}], 0x4) semctl$SEM_INFO(r3, 0x5, 0x13, &(0x7f0000000080)=""/101) semtimedop(r3, &(0x7f00000008c0)=[{0x0, 0xffff, 0x1000}, {0x2, 0x2}], 0x2, &(0x7f0000001d40)={0x77359400}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000840)={'veth0_to_batadv\x00', &(0x7f0000001cc0)=@ethtool_coalesce={0xe, 0x1ff, 0x1, 0xc49, 0x9184, 0x3, 0x101, 0x7, 0x5, 0xc85, 0x5, 0xfff, 0x21d3, 0x3, 0x100, 0x0, 0x8, 0x2, 0xffff0000, 0x1, 0x7f, 0x10001, 0x2}}) 17:18:55 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x12) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:18:55 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:18:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffff6) 17:18:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffb) 17:18:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffe) [ 1380.380362] FAULT_INJECTION: forcing a failure. [ 1380.380362] name failslab, interval 1, probability 0, space 0, times 0 [ 1380.383443] CPU: 0 PID: 8906 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1380.385214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1380.387336] Call Trace: [ 1380.388027] dump_stack+0x107/0x167 [ 1380.388963] should_fail.cold+0x5/0xa [ 1380.389947] ? __anon_vma_prepare+0x62/0x500 [ 1380.391074] should_failslab+0x5/0x20 [ 1380.392062] kmem_cache_alloc+0x5b/0x310 [ 1380.393110] __anon_vma_prepare+0x62/0x500 [ 1380.394187] ? __pte_alloc+0x194/0x330 [ 1380.395195] handle_mm_fault+0x2b2d/0x3500 [ 1380.396272] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1380.397462] ? __pmd_alloc+0x630/0x630 [ 1380.398358] __get_user_pages+0x6ec/0x1620 [ 1380.399322] ? follow_page_mask+0x1900/0x1900 [ 1380.400347] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1380.401407] __get_user_pages_remote+0x1d5/0x870 [ 1380.402474] ? lock_downgrade+0x6d0/0x6d0 [ 1380.403408] get_user_pages_remote+0x63/0x90 [ 1380.404413] get_arg_page+0xba/0x200 [ 1380.405253] ? acct_arg_size+0xe0/0xe0 [ 1380.406128] ? downgrade_write+0x3a0/0x3a0 [ 1380.407082] ? count.constprop.0+0x1b3/0x290 [ 1380.408085] copy_string_kernel+0x1b4/0x450 [ 1380.409062] do_execveat_common+0x525/0x8d0 [ 1380.410046] ? bprm_execve+0x1960/0x1960 [ 1380.410974] __x64_sys_execveat+0xed/0x140 [ 1380.411939] do_syscall_64+0x33/0x40 [ 1380.412776] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1380.413938] RIP: 0033:0x7f008031cb19 [ 1380.414774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1380.418925] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1380.420651] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1380.422257] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1380.423882] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1380.425484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1380.427091] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:18:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffffff000) 17:18:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffb) 17:18:55 executing program 7: restart_syscall() unshare(0x8000000) unshare(0x40000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x30080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x4, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:18:55 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x13) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:18:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 17:18:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 17:18:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffe) 17:19:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffffff000) 17:19:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) 17:19:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfffffffe) 17:19:09 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = getpgrp(0x0) prlimit64(r1, 0x6, &(0x7f0000000100)={0x1}, &(0x7f0000000200)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x81403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4, 0x3, 0xfffffffc, 0x2, 0x3, 0x400, 0xfffe, 0x0, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(r1, 0xb, &(0x7f0000000000)={0x8001, 0x6}, &(0x7f0000000400)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x3, 0x1, 0xc1, 0x3b, 0x0, 0xff, 0x800a, 0xb, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xad2, 0x1, @perf_config_ext={0x6, 0x81}, 0x4, 0x5, 0x3, 0x5, 0x3, 0x7, 0x4, 0x0, 0x7f, 0x0, 0x20}, r1, 0x8, r2, 0x8) 17:19:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 17:19:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 17:19:09 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x14) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:19:09 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendto(r0, &(0x7f0000000940)="cbadee7764919145b1631519211f2a6c8a183aa7811444cd189ba13f46c7231c3cfb36b3d82f880530694c2c0c379615e5ee823c11f49d50ce34aec7677b0ba473f7722ec65c85a68ffbcb80810b73a3391d3e74c53a81cc6ec336b9b7ba453a84bd20a2c3a2d61fa5cd9e8221f41180c235818bd7c77e3384", 0x79, 0x4000004, 0x0, 0x0) dup3(r0, r0, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x6, 0x3, &(0x7f0000000580)=[{&(0x7f0000000380)="5e76629daced04d929beb1b15e6f38e2b4bfef0e679e048a21362de8a64033f308afcd6fe0968186f24bd5201ac37b2b88b62b25899a73ec87313c9a7f01f86b128a4c48105a51ed6692a33fe365eefa192f04dbce581e671adcefa1ba898e75d3206c7151acdbf61c2e4cd0559c5abdc86b39d60427efd698bbe8bbb48d98cbee1f4b400c98ccacadda6f5ab953900b99b00727901531fd06c0", 0x9a, 0x6}, {&(0x7f0000000500)="b27129c5ca7b6d4639f5076572c6bd1c3752ec7efef77b3d268eafd107deec474ffbac278cf473d865895191155b8d7acdb916eb71ab4d31a586e3d5d0b9222e4e5ab64d34b801219c09a4e803b3e93ba1", 0x51, 0x6}, {&(0x7f0000000680)="0759731f7abba1a91e6cfd3880994857df8930375de293fc5840c9a13d6c40d2a71381fb0480c1217c4ba81697e18cf57ca0f60bbe25a775d57dee0773f222be987871b9382841af1cc250d49e92cb7d5a676ce0e95ea93f25f5e91acca4dfd16f95a147df80c19cc85fe02efaeb7c26ab60a933a86cba2a10c6f67af78ee737c8dcd50b7e368c2226a4f8f9df7e4d9e6b6db5de", 0x94, 0x1}], 0x1200400, &(0x7f00000009c0)=ANY=[@ANYBLOB="6e6f646f75732c6e6f646f74732c646f74732c6e6f646f7473396e6f646f74732c646f74732c6e6f646f74732c61756469742c66756e633d43524544535f434845434b4bed9c021bb8532c7375626a5f747970653d3a2e2c646f6e745f686173682c66736d616769633d30783030303030303030303030303136363846666ff76e65723e067fda05ecb7d70000000000", @ANYRESDEC=0x0, @ANYBLOB=',uid=', @ANYRESDEC=0xee00, @ANYBLOB=',defcontext=staff_u,\x00']) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sysvipc/msg\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000740)={0x0, 0x80, 0xe4, 0x1, 0x99, 0x7, 0x0, 0x8001, 0x11084, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0x3, 0x5}, 0x40004, 0x1, 0x1, 0x1, 0x400, 0x22ea, 0x4, 0x0, 0x7, 0x0, 0x3}, r2, 0xe, 0xffffffffffffffff, 0xf) unlinkat(r1, &(0x7f0000000000)='./file1\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x80, 0x0) [ 1394.940540] FAT-fs (loop7): Unrecognized mount option "nodous" or missing value [ 1394.960313] FAULT_INJECTION: forcing a failure. [ 1394.960313] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.963069] CPU: 1 PID: 8965 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1394.964533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1394.966296] Call Trace: [ 1394.966858] dump_stack+0x107/0x167 [ 1394.967632] should_fail.cold+0x5/0xa [ 1394.968447] ? create_object.isra.0+0x3a/0xa20 [ 1394.969416] should_failslab+0x5/0x20 [ 1394.970220] kmem_cache_alloc+0x5b/0x310 [ 1394.971083] create_object.isra.0+0x3a/0xa20 [ 1394.972016] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1394.973092] kmem_cache_alloc+0x159/0x310 [ 1394.973972] __anon_vma_prepare+0x62/0x500 [ 1394.974864] ? __pte_alloc+0x194/0x330 [ 1394.975697] handle_mm_fault+0x2b2d/0x3500 [ 1394.975708] FAT-fs (loop7): Unrecognized mount option "nodous" or missing value [ 1394.976607] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1394.976631] ? __pmd_alloc+0x630/0x630 [ 1394.979477] __get_user_pages+0x6ec/0x1620 [ 1394.980386] ? follow_page_mask+0x1900/0x1900 [ 1394.981334] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1394.982331] __get_user_pages_remote+0x1d5/0x870 [ 1394.983334] ? lock_downgrade+0x6d0/0x6d0 [ 1394.984224] get_user_pages_remote+0x63/0x90 [ 1394.985159] get_arg_page+0xba/0x200 [ 1394.985948] ? acct_arg_size+0xe0/0xe0 [ 1394.986767] ? downgrade_write+0x3a0/0x3a0 [ 1394.987672] ? count.constprop.0+0x1b3/0x290 [ 1394.988606] copy_string_kernel+0x1b4/0x450 [ 1394.989528] do_execveat_common+0x525/0x8d0 [ 1394.990440] ? bprm_execve+0x1960/0x1960 [ 1394.991314] __x64_sys_execveat+0xed/0x140 [ 1394.992221] do_syscall_64+0x33/0x40 [ 1394.993007] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1394.994088] RIP: 0033:0x7f008031cb19 [ 1394.994864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1394.998758] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1395.000371] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1395.001880] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1395.003389] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1395.004900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1395.006409] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:19:09 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8042, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 17:19:09 executing program 1: restart_syscall() unshare(0x8000000) unshare(0x1a020880) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 17:19:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 17:19:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffffff000) 17:19:09 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x4000) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:19:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xffffffff000) 17:19:09 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r4, &(0x7f0000000200)="11c3c916cc73c00b8d4b04428d33d660adffe005af03931344eb92477dc0f1a6a30fd83f11a9e9fe737607f2b38eace3c6532455bb9ca37b29087ba342876f7f2b7318d59b42e25a0952e95d6c9466", 0x4f, 0x1, &(0x7f0000000380)=@nl=@kern={0x10, 0x0, 0x0, 0x80}, 0x80) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE={0x17, 0x2, 0x2000, @fd_index=0x9, 0x4af3, &(0x7f0000000940)="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", 0x1000, 0x5, 0x1}, 0xc6) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r5, &(0x7f0000000000)='./file0\x00', 0x0) unlinkat(r5, &(0x7f0000000040)='./file0\x00', 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 17:19:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 17:19:24 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendto(r0, &(0x7f0000000380)="f38b4e6c87c9819fdc8da3696334e4aeec5f73292e5a9ad2ce3b269b76a350ed366d659fb7a32b00c3defdd0b296af0a3eecd0210dbd0fe332b601b458caeec4b4f53e2ca264a4d943444c78a46377c9ef85905ee19fdbc9da65c12179484becdbffcdc34d833751aac9bab216e6ff2731e67d6bd2bcba8fe48c0e3b96aed52e623314c60ec92aa3b6a1d76d9cf3337332d2345df2553a8bc3374cfdbcb21a5a257ad4d072866387df21e9a3f55d51fc48a5aed19fc232447984dd0c81ea01f8f7", 0xc1, 0x20028010, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x2, 0x0, 0x3, {0xa, 0x4e22, 0x0, @local}}}, 0x80) unshare(0x2060000) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = accept4$unix(r0, &(0x7f0000000200), &(0x7f00000000c0)=0x6e, 0x800) clock_gettime(0x0, &(0x7f0000008c40)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000008a80)=[{{&(0x7f0000000500)=@qipcrtr, 0x80, &(0x7f0000000800)=[{&(0x7f0000000580)=""/120, 0x78}, {&(0x7f0000008d40)=""/4096, 0x1000}, {&(0x7f0000000680)=""/140, 0x8c}, {&(0x7f0000000740)=""/166, 0xa6}], 0x4, &(0x7f0000001940)=""/97, 0x61}, 0xfffffff9}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000019c0)=""/177, 0xb1}, {&(0x7f0000001a80)=""/234, 0xea}], 0x2, &(0x7f0000001b80)=""/166, 0xa6}, 0x401}, {{&(0x7f0000001c40)=@in6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x80, &(0x7f0000003240)=[{&(0x7f0000001cc0)=""/142, 0x8e}, {&(0x7f0000001e00)=""/222, 0xde}, {&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f00000009c0)=""/11, 0xb}, {&(0x7f0000002f00)=""/121, 0x79}, {&(0x7f0000002f80)=""/97, 0x61}, {&(0x7f0000003000)=""/10, 0xa}, {&(0x7f0000000940)=""/126, 0x7e}, {&(0x7f00000030c0)=""/229, 0xe5}, {&(0x7f00000031c0)=""/70, 0x46}], 0xa, &(0x7f0000003300)=""/252, 0xfc}, 0x9}, {{&(0x7f0000008cc0)=@caif=@rfm, 0x80, &(0x7f0000003480), 0x0, &(0x7f00000034c0)=""/4096, 0x1000}, 0x4}, {{&(0x7f00000044c0)=@can, 0x80, &(0x7f0000005540)=[{&(0x7f0000004540)=""/4096, 0x1000}], 0x1, &(0x7f0000005580)=""/4096, 0x1000}, 0x363}, {{&(0x7f0000006580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000006880)=[{&(0x7f0000006600)=""/248, 0xf8}, {&(0x7f0000006700)=""/110, 0x6e}, {&(0x7f0000006780)=""/98, 0x62}, {&(0x7f0000006800)=""/99, 0x63}], 0x4}, 0x2}, {{&(0x7f00000068c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000007a40), 0x0, &(0x7f0000007a80)=""/4096, 0x1000}, 0x401}], 0x7, 0x40000003, &(0x7f0000008c80)={r3, r4+10000000}) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20c00) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 17:19:24 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 17:19:24 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) unshare(0x20800) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x65) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80800) getdents64(r2, &(0x7f0000000680)=""/226, 0xe2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r3 = creat(&(0x7f0000000400)='./file0\x00', 0x68) recvmmsg(r3, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000780)=""/178, 0xb2}, {&(0x7f0000000200)=""/70, 0x46}, {&(0x7f0000000b40)=""/254, 0xfe}, {&(0x7f0000000c40)=""/210, 0xd2}, {&(0x7f0000000d40)=""/4096, 0x1000}], 0x5}, 0x8001}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000001e00)=""/253, 0xfd}, {&(0x7f0000001f00)=""/112, 0x70}], 0x2, &(0x7f0000001f80)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000002f80)=@phonet, 0x80, &(0x7f0000004440)=[{&(0x7f0000003000)=""/66, 0x42}, {&(0x7f0000000840)=""/57, 0x39}, {&(0x7f0000003080)=""/179, 0xb3}, {&(0x7f0000003140)=""/92, 0x5c}, {&(0x7f00000031c0)=""/198, 0xc6}, {&(0x7f00000032c0)=""/126, 0x7e}, {&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000004340)=""/105, 0x69}, {&(0x7f00000043c0)=""/106, 0x6a}], 0x9}, 0xf1d}, {{&(0x7f0000004500)=@tipc=@name, 0x80, &(0x7f00000008c0)=[{&(0x7f0000004580)=""/101, 0x65}, {&(0x7f0000004600)=""/216, 0xd8}, {&(0x7f0000004700)=""/213, 0xd5}], 0x3, &(0x7f0000004800)=""/169, 0xa9}, 0x4bd}], 0x4, 0x40000041, &(0x7f0000001d40)={0x0, 0x3938700}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_elf64(r4, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0xa9, 0x40, 0x0, 0x573, 0x3, 0x3, 0x9, 0x156, 0x40, 0x12f, 0x6ffc, 0x525, 0x38, 0x2, 0x5, 0x5, 0x1}, [{0x60000000, 0x100, 0x80, 0x7f, 0x6, 0x5, 0x3, 0xb8}], "7089794ff4864336ef23dd0ebb8c9d2fda887512e8463533831c7f47ebc0aaf50368b46a1313e166df46827b6077d366b859dc83ae93caf0f845faafa5757f83862f40a448d9d6912573fb185db4ed64ac11e2cffbedc9edb5df998f84476132815f25379e215df215405ddbacde270a3a8e7c5857759a2d43ca81b25f1499c6c87a9f670676", ['\x00']}, 0x1fe) 17:19:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7f8000000000) [ 1410.190411] FAULT_INJECTION: forcing a failure. [ 1410.190411] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.193111] CPU: 1 PID: 9035 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1410.194582] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.196353] Call Trace: [ 1410.196938] dump_stack+0x107/0x167 [ 1410.197718] should_fail.cold+0x5/0xa [ 1410.198530] ? __anon_vma_prepare+0x270/0x500 [ 1410.199481] should_failslab+0x5/0x20 [ 1410.200304] kmem_cache_alloc+0x5b/0x310 [ 1410.201183] __anon_vma_prepare+0x270/0x500 [ 1410.202103] ? __pte_alloc+0x194/0x330 [ 1410.202941] handle_mm_fault+0x2b2d/0x3500 [ 1410.203862] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1410.204991] ? __pmd_alloc+0x630/0x630 [ 1410.205843] __get_user_pages+0x6ec/0x1620 [ 1410.206751] ? follow_page_mask+0x1900/0x1900 [ 1410.207712] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1410.208749] __get_user_pages_remote+0x1d5/0x870 [ 1410.209756] ? lock_downgrade+0x6d0/0x6d0 [ 1410.210639] get_user_pages_remote+0x63/0x90 [ 1410.211579] get_arg_page+0xba/0x200 [ 1410.212378] ? acct_arg_size+0xe0/0xe0 [ 1410.213190] ? downgrade_write+0x3a0/0x3a0 [ 1410.214087] ? count.constprop.0+0x1b3/0x290 [ 1410.215027] copy_string_kernel+0x1b4/0x450 [ 1410.215961] do_execveat_common+0x525/0x8d0 [ 1410.216884] ? bprm_execve+0x1960/0x1960 [ 1410.217765] __x64_sys_execveat+0xed/0x140 [ 1410.218670] do_syscall_64+0x33/0x40 [ 1410.219445] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1410.220777] RIP: 0033:0x7f008031cb19 [ 1410.221590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.225544] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1410.227162] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1410.228709] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1410.230210] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1410.231727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1410.233248] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:19:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 17:19:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 17:19:25 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000dd00000000a9830000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x59, 0x9, 0x2, 0x7, 0x0, 0x0, 0x8000, 0x1c, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000380), 0x4}, 0x11600, 0x611, 0x9, 0x0, 0x0, 0x8bc9, 0x8, 0x0, 0x7, 0x0, 0x3}, r1, 0x0, r1, 0x4) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r4, &(0x7f0000000000)='./file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_FILES_UPDATE={0x14, 0x3, 0x0, 0x0, 0x6, &(0x7f0000000200)=[r3, r4], 0x2, 0x0, 0x1}, 0x200) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x50080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x6}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = semget$private(0x0, 0x0, 0x52) semctl$IPC_RMID(r5, 0x0, 0x10) 17:19:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 17:19:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000000000000) 17:19:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 17:19:25 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) unshare(0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) 17:19:25 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x16000900) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:19:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 17:19:25 executing program 1: restart_syscall() unshare(0x8000000) semget$private(0x0, 0x0, 0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x109200, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x4010}}, 0x6) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) [ 1410.538796] FAULT_INJECTION: forcing a failure. [ 1410.538796] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.541637] CPU: 0 PID: 9078 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1410.543148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.544983] Call Trace: [ 1410.545570] dump_stack+0x107/0x167 [ 1410.546379] should_fail.cold+0x5/0xa [ 1410.547228] ? create_object.isra.0+0x3a/0xa20 [ 1410.548249] should_failslab+0x5/0x20 [ 1410.549092] kmem_cache_alloc+0x5b/0x310 [ 1410.549997] create_object.isra.0+0x3a/0xa20 [ 1410.550969] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1410.552098] kmem_cache_alloc+0x159/0x310 [ 1410.553011] __anon_vma_prepare+0x270/0x500 [ 1410.553949] ? __pte_alloc+0x194/0x330 [ 1410.554807] handle_mm_fault+0x2b2d/0x3500 [ 1410.555743] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1410.556898] ? __pmd_alloc+0x630/0x630 [ 1410.557768] __get_user_pages+0x6ec/0x1620 [ 1410.558703] ? follow_page_mask+0x1900/0x1900 [ 1410.559686] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1410.560729] __get_user_pages_remote+0x1d5/0x870 [ 1410.561773] ? lock_downgrade+0x6d0/0x6d0 [ 1410.562685] get_user_pages_remote+0x63/0x90 [ 1410.563650] get_arg_page+0xba/0x200 [ 1410.564476] ? acct_arg_size+0xe0/0xe0 [ 1410.565329] ? downgrade_write+0x3a0/0x3a0 [ 1410.566255] ? count.constprop.0+0x1b3/0x290 [ 1410.567218] copy_string_kernel+0x1b4/0x450 [ 1410.568183] do_execveat_common+0x525/0x8d0 [ 1410.569130] ? bprm_execve+0x1960/0x1960 [ 1410.570023] __x64_sys_execveat+0xed/0x140 [ 1410.570940] do_syscall_64+0x33/0x40 [ 1410.571747] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1410.572865] RIP: 0033:0x7f008031cb19 [ 1410.573670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.577656] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1410.579300] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1410.580846] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1410.582389] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1410.583939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:19:25 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1410.585483] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:19:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 17:19:25 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) unshare(0x2020000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:19:25 executing program 1: restart_syscall() unshare(0x4018080) unshare(0x8000000) unshare(0x10000800) unshare(0x50200) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 17:19:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8000000000000) 17:19:38 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x5e, 0x10104, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8, 0x20010, r0, 0x8000000) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r0, 0x3, 0x0, 0x7, 0x3, 0x1}, 0x5) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 17:19:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 17:19:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 17:19:38 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80400, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:38 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x64010280) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 1423.871345] FAULT_INJECTION: forcing a failure. [ 1423.871345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1423.874522] CPU: 0 PID: 9119 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1423.876369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1423.878578] Call Trace: [ 1423.879271] dump_stack+0x107/0x167 [ 1423.880244] should_fail.cold+0x5/0xa [ 1423.881251] __alloc_pages_nodemask+0x182/0x600 [ 1423.882482] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1423.884083] ? up_write+0x191/0x550 [ 1423.885048] ? rwlock_bug.part.0+0x90/0x90 [ 1423.886162] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1423.887589] alloc_pages_vma+0xbb/0x410 [ 1423.888666] handle_mm_fault+0x152f/0x3500 [ 1423.889784] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1423.891166] ? __pmd_alloc+0x630/0x630 [ 1423.892227] __get_user_pages+0x6ec/0x1620 [ 1423.893366] ? follow_page_mask+0x1900/0x1900 [ 1423.894548] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1423.895796] __get_user_pages_remote+0x1d5/0x870 [ 1423.897059] ? lock_downgrade+0x6d0/0x6d0 [ 1423.898155] get_user_pages_remote+0x63/0x90 [ 1423.899311] get_arg_page+0xba/0x200 [ 1423.900301] ? acct_arg_size+0xe0/0xe0 [ 1423.901315] ? downgrade_write+0x3a0/0x3a0 [ 1423.902442] ? count.constprop.0+0x1b3/0x290 [ 1423.903604] copy_string_kernel+0x1b4/0x450 [ 1423.904693] do_execveat_common+0x525/0x8d0 [ 1423.905698] ? bprm_execve+0x1960/0x1960 [ 1423.906667] __x64_sys_execveat+0xed/0x140 [ 1423.907670] do_syscall_64+0x33/0x40 [ 1423.908552] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1423.909761] RIP: 0033:0x7f008031cb19 [ 1423.910633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1423.914977] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1423.916767] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1423.918444] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1423.920114] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1423.921779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1423.923452] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:19:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 17:19:38 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000680)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@common=@version_9p2000}, {@rq={'rq', 0x3d, 0x8}}], [{@obj_type={'obj_type', 0x3d, '$('}}, {@uid_gt}, {@uid_eq={'uid', 0x3d, r2}}]}}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) dup(r3) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:19:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000000000) 17:19:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8000000000000) [ 1424.041794] 9pnet: Could not find request transport: rdma 17:19:38 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x4, 0x1f, 0x4, 0xfb, 0x0, 0x5eab, 0x0, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x2, 0xffff, 0x81, 0x7, 0x100000001, 0x10001, 0x0, 0x0, 0x7, 0x0, 0x6f6}, 0x0, 0x6, r1, 0x2) creat(&(0x7f0000000040)='./file0\x00', 0x1) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) [ 1424.162857] FAULT_INJECTION: forcing a failure. [ 1424.162857] name failslab, interval 1, probability 0, space 0, times 0 [ 1424.165518] CPU: 0 PID: 9165 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1424.167066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1424.168955] Call Trace: [ 1424.169560] dump_stack+0x107/0x167 [ 1424.170389] should_fail.cold+0x5/0xa [ 1424.171254] ? prepare_creds+0x25/0x5e0 [ 1424.172169] should_failslab+0x5/0x20 [ 1424.173032] kmem_cache_alloc+0x5b/0x310 [ 1424.173962] prepare_creds+0x25/0x5e0 [ 1424.174826] prepare_exec_creds+0xd/0x260 [ 1424.175779] bprm_execve+0x118/0x1960 [ 1424.176659] ? count.constprop.0+0x1b3/0x290 [ 1424.177664] ? open_exec+0x70/0x70 [ 1424.178471] ? copy_string_kernel+0x3b6/0x450 [ 1424.179501] do_execveat_common+0x772/0x8d0 [ 1424.180498] ? bprm_execve+0x1960/0x1960 [ 1424.181443] __x64_sys_execveat+0xed/0x140 [ 1424.182410] do_syscall_64+0x33/0x40 [ 1424.183252] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1424.184464] RIP: 0033:0x7f008031cb19 [ 1424.185306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1424.189476] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1424.191202] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1424.192836] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1424.194456] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1424.196084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1424.197704] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:19:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 17:19:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000000000) 17:19:51 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x3}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = creat(&(0x7f0000000400)='./file0\x00', 0x68) r3 = getpgrp(0x0) open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x2) prlimit64(r3, 0x6, &(0x7f0000000100)={0x1}, &(0x7f0000000200)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x81403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4, 0x3, 0xfffffffc, 0x2, 0x3, 0x400, 0xfffe, 0x0, 0x0, 0x0, 0x8}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(r3, 0xb, &(0x7f0000000000)={0x8001, 0x6}, &(0x7f0000000400)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYRES64, @ANYRES32=r2, @ANYBLOB="01000000000000002e2f66696c653000"]) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1f, 0x4, 0xf8, 0x4, 0x0, 0x1bd, 0x8180, 0xe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x2c8240000000}, 0x10091, 0x3, 0xfffffeff, 0x8, 0x3, 0x1, 0x3, 0x0, 0x0, 0x0, 0x2}, r3, 0x3, r4, 0x8) umount2(&(0x7f0000000240)='./file0\x00', 0x2) 17:19:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 17:19:51 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x48480) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) unshare(0x28020a00) semget$private(0x0, 0x4000, 0x632) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0x32}, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x2d}}, 0xc) 17:19:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x20000000000000) 17:19:51 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x5, 0x3f, 0x9, 0x0, 0x1, 0x1000, 0xe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x8001, 0x1}, 0x3000, 0x0, 0x8, 0xa, 0x20, 0x6, 0x200, 0x0, 0xffff, 0x0, 0x31}, 0xffffffffffffffff, 0x6, r0, 0x9) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:19:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8000000000000) [ 1437.117850] FAULT_INJECTION: forcing a failure. [ 1437.117850] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.119452] CPU: 1 PID: 9182 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1437.120406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1437.121561] Call Trace: [ 1437.121933] dump_stack+0x107/0x167 [ 1437.122446] should_fail.cold+0x5/0xa [ 1437.122978] ? create_object.isra.0+0x3a/0xa20 [ 1437.123611] should_failslab+0x5/0x20 [ 1437.124153] kmem_cache_alloc+0x5b/0x310 [ 1437.124728] create_object.isra.0+0x3a/0xa20 [ 1437.125339] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1437.126046] kmem_cache_alloc+0x159/0x310 [ 1437.126626] prepare_creds+0x25/0x5e0 [ 1437.127158] prepare_exec_creds+0xd/0x260 [ 1437.127732] bprm_execve+0x118/0x1960 [ 1437.128270] ? count.constprop.0+0x1b3/0x290 [ 1437.128882] ? open_exec+0x70/0x70 [ 1437.129376] ? copy_string_kernel+0x3b6/0x450 [ 1437.130003] do_execveat_common+0x772/0x8d0 [ 1437.130623] ? bprm_execve+0x1960/0x1960 [ 1437.131209] __x64_sys_execveat+0xed/0x140 [ 1437.131804] do_syscall_64+0x33/0x40 [ 1437.132331] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1437.133041] RIP: 0033:0x7f008031cb19 [ 1437.133560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1437.136136] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1437.137211] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1437.138210] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1437.139202] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1437.140233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1437.141238] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:19:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8000000000000) 17:20:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000000000) 17:20:06 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) unshare(0x3c040c80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x1, 0x0) unshare(0x20000000) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:20:06 executing program 3: restart_syscall() restart_syscall() unshare(0x8000000) r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x0, 0x103, &(0x7f0000000900)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:20:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x20000000000000) 17:20:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x10000000000000) 17:20:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 17:20:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 17:20:06 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r4, &(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_io_uring_setup(0x12a8, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) r8 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_io_uring_submit(0x0, r6, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r8, 0x0, 0x0, 0x0, {0x440c}, 0x0, {0x0, r7}}, 0x5) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x7f, &(0x7f0000000040)=[r2, r0, r3, r1, r4], 0x5, 0x0, 0x0, {0x0, r7}}, 0x2) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1452.128155] FAULT_INJECTION: forcing a failure. [ 1452.128155] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.130707] CPU: 0 PID: 9219 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1452.132197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1452.133993] Call Trace: [ 1452.134566] dump_stack+0x107/0x167 [ 1452.135356] should_fail.cold+0x5/0xa [ 1452.136199] ? prepare_creds+0x25/0x5e0 [ 1452.137065] should_failslab+0x5/0x20 [ 1452.137890] kmem_cache_alloc+0x5b/0x310 [ 1452.138774] prepare_creds+0x25/0x5e0 [ 1452.139597] prepare_exec_creds+0xd/0x260 [ 1452.140504] bprm_execve+0x118/0x1960 [ 1452.141324] ? count.constprop.0+0x1b3/0x290 [ 1452.142281] ? open_exec+0x70/0x70 [ 1452.143053] ? copy_string_kernel+0x3b6/0x450 [ 1452.144041] do_execveat_common+0x772/0x8d0 [ 1452.144968] ? bprm_execve+0x1960/0x1960 [ 1452.145859] __x64_sys_execveat+0xed/0x140 [ 1452.146759] do_syscall_64+0x33/0x40 [ 1452.147569] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1452.148689] RIP: 0033:0x7f008031cb19 [ 1452.149492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1452.153511] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1452.155158] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1452.156701] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1452.158225] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1452.159750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1452.161285] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:20:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 17:20:06 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000040)=@sr0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x840000, &(0x7f0000000200)='/\x00') unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:20:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x20000000000000) 17:20:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 17:20:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000000000000) 17:20:07 executing program 3: restart_syscall() unshare(0x8000000) r0 = accept4$unix(0xffffffffffffffff, &(0x7f00000017c0)=@abs, &(0x7f0000001840)=0x6e, 0x80000) recvmmsg(r0, &(0x7f0000003ac0)=[{{&(0x7f0000000100)=@alg, 0x80, &(0x7f0000001740)=[{&(0x7f0000000180)=""/56, 0x38}, {&(0x7f0000000240)=""/207, 0xcf}, {&(0x7f0000000340)=""/178, 0xfd27}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000440)=""/94, 0x5e}, {&(0x7f00000004c0)=""/198, 0xc6}, {&(0x7f00000005c0)=""/137, 0x89}], 0x7, &(0x7f0000003b40)=""/4096, 0x1000}}, {{&(0x7f00000027c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002840)=""/113, 0x71}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f00000038c0)=""/48, 0x30}, {&(0x7f0000003900)=""/116, 0x74}, {&(0x7f0000003980)}], 0x6, &(0x7f0000003a40)=""/112, 0x70}, 0x100}], 0x2, 0x21, &(0x7f0000000040)={0x0, 0x3938700}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="73650900726974792e2c2f2e272d2f7b9c7b00fdf0544705fd0245c3529158c384c8a1c3b618b8a69f47b1fb3f31d0aff0690f9cf3e8e53bb4ffb0a6b22f00000000000000c652a526000000000000ebee9694febb9cbe32000541703294e99b36ef0470356cd69a91fbff7054bec63e3b68cadee0d1a0d950329c620e56b233b54bbb5943173594a05529fbdc7bae95605f3fe19adaa2ef018be42bd03ecf671d036e2b8a95600382e6144f76fbc21c9f0a14c77fb5edcb13c2"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x0) fallocate(r2, 0xb, 0x0, 0x43) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f00000000c0)=',\x00', &(0x7f0000000200)='./file0/file0\x00', 0xffffffffffffff9c) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:20:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 17:20:07 executing program 7: restart_syscall() unshare(0x8000000) unshare(0x1a020200) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000009, 0x4000010, 0xffffffffffffffff, 0x10000000) r4 = syz_io_uring_setup(0x12a8, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_io_uring_submit(r0, r3, &(0x7f0000000800)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000040)=""/124, 0x7c}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000380)=""/231, 0xe7}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000500)=""/101, 0x65}, {&(0x7f0000000580)=""/121, 0x79}, {&(0x7f0000000680)=""/237, 0xed}], 0x7}, 0x0, 0x40000020, 0x0, {0x3, r5}}, 0xfffffffb) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r7, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1452.374648] FAULT_INJECTION: forcing a failure. [ 1452.374648] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.376679] CPU: 1 PID: 9253 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1452.377732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1452.378996] Call Trace: [ 1452.379402] dump_stack+0x107/0x167 [ 1452.379965] should_fail.cold+0x5/0xa [ 1452.380557] ? create_object.isra.0+0x3a/0xa20 [ 1452.381259] should_failslab+0x5/0x20 [ 1452.381840] kmem_cache_alloc+0x5b/0x310 [ 1452.382458] create_object.isra.0+0x3a/0xa20 [ 1452.383125] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1452.383899] __kmalloc+0x16e/0x390 [ 1452.384459] security_prepare_creds+0x112/0x190 [ 1452.385168] prepare_creds+0x452/0x5e0 [ 1452.385763] prepare_exec_creds+0xd/0x260 [ 1452.386399] bprm_execve+0x118/0x1960 [ 1452.386977] ? count.constprop.0+0x1b3/0x290 [ 1452.387644] ? open_exec+0x70/0x70 [ 1452.388194] ? copy_string_kernel+0x3b6/0x450 [ 1452.388882] do_execveat_common+0x772/0x8d0 [ 1452.389536] ? bprm_execve+0x1960/0x1960 [ 1452.390164] __x64_sys_execveat+0xed/0x140 [ 1452.390807] do_syscall_64+0x33/0x40 [ 1452.391372] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1452.392148] RIP: 0033:0x7f008031cb19 [ 1452.392720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1452.395510] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1452.396667] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1452.397751] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1452.398842] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1452.399929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1452.401028] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:20:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x20000000000000) 17:20:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 17:20:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 17:20:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 17:20:21 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x20002, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x90042, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x200) semget$private(0x0, 0x4000, 0x0) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) syz_io_uring_setup(0x7e14, &(0x7f0000000040)={0x0, 0xad47, 0x2, 0x3, 0x3f}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)=0x0) r6 = syz_io_uring_setup(0x12a8, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) r10 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r10, 0x0, 0x0, 0x0, {0x440c}, 0x0, {0x0, r9}}, 0x5) syz_io_uring_submit(r2, r5, &(0x7f0000000240)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x2007, @fd_index=0x4, 0x1, 0xffff, 0xca, 0x4, 0x1, {0x0, r9}}, 0x6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:20:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 17:20:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 17:20:21 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = semget$private(0x0, 0x1, 0x0) semctl$IPC_RMID(r2, 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) faccessat2(r1, &(0x7f0000000040)='./file1\x00', 0x12, 0x100) 17:20:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000000000000) 17:20:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000000000000) 17:20:21 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x4, 0x424) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x0) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000180)=0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$unix(0x1, 0x2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c46073f4b06050000000000000002000600010000004e02000000000000400000000000000082000000000000000100000042c143ae0200070005000600050000000100000005000000000000000080000000000000f7ffffffffffffff07000000000000000900000000000000080000000000000015f1f7623b52ed045971127b07683520e4e466a93023ea79b9a58367e4530554b57ed728d0ab3242b2716bf4e622b7b39a341bc5cbd28653ef796a91f8dba4a498be1c3b353a89e4a40311923dcaf0658bdcf17b7e0159de0e46b6eac943213f38976c17cc755c9b4d746c096baf5c0b60c6"], 0xea) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r1, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x12160}, 0x8b83) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x4, &(0x7f0000000040)={0x77359400}, 0x1, 0x0, 0x1}, 0xfffffffe) [ 1466.562756] FAULT_INJECTION: forcing a failure. [ 1466.562756] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.565536] CPU: 1 PID: 9295 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1466.566996] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1466.568764] Call Trace: [ 1466.569325] dump_stack+0x107/0x167 [ 1466.570107] should_fail.cold+0x5/0xa [ 1466.570924] ? __alloc_file+0x21/0x320 [ 1466.571758] should_failslab+0x5/0x20 [ 1466.572585] kmem_cache_alloc+0x5b/0x310 [ 1466.573462] __alloc_file+0x21/0x320 [ 1466.574262] alloc_empty_file+0x6d/0x170 [ 1466.575134] path_openat+0xe6/0x2770 [ 1466.575941] ? lock_chain_count+0x20/0x20 [ 1466.576851] ? stack_trace_consume_entry+0x160/0x160 [ 1466.577941] ? path_lookupat+0x860/0x860 [ 1466.578819] ? kasan_save_stack+0x32/0x40 [ 1466.579708] ? kasan_save_stack+0x1b/0x40 [ 1466.580609] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1466.581694] ? security_prepare_creds+0x112/0x190 [ 1466.582729] ? prepare_creds+0x452/0x5e0 [ 1466.583596] ? prepare_exec_creds+0xd/0x260 [ 1466.584540] do_filp_open+0x190/0x3e0 [ 1466.585353] ? may_open_dev+0xf0/0xf0 [ 1466.586187] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1466.587318] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1466.588523] ? find_held_lock+0x2c/0x110 [ 1466.589402] do_open_execat+0x116/0x740 [ 1466.590250] ? bprm_execve+0x49d/0x1960 [ 1466.591108] ? __do_sys_uselib+0x6a0/0x6a0 [ 1466.592014] ? do_raw_spin_lock+0x121/0x260 [ 1466.592946] ? rwlock_bug.part.0+0x90/0x90 [ 1466.593866] bprm_execve+0x4dc/0x1960 [ 1466.594686] ? count.constprop.0+0x1b3/0x290 [ 1466.595637] ? open_exec+0x70/0x70 [ 1466.596407] ? copy_string_kernel+0x3b6/0x450 [ 1466.597385] do_execveat_common+0x772/0x8d0 [ 1466.598318] ? bprm_execve+0x1960/0x1960 [ 1466.599210] __x64_sys_execveat+0xed/0x140 [ 1466.600124] do_syscall_64+0x33/0x40 [ 1466.600934] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1466.602034] RIP: 0033:0x7f008031cb19 [ 1466.602836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1466.606818] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1466.608479] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1466.610040] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1466.611592] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1466.613158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1466.614719] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:20:21 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000040)=""/121, 0x79}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x149) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:20:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 17:20:21 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:20:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 17:20:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300000000000000) 17:20:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000000000000) 17:20:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000000000000) [ 1466.729601] FAULT_INJECTION: forcing a failure. [ 1466.729601] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.730968] CPU: 0 PID: 9327 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1466.731743] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1466.732697] Call Trace: [ 1466.733007] dump_stack+0x107/0x167 [ 1466.733422] should_fail.cold+0x5/0xa [ 1466.733861] ? __alloc_file+0x21/0x320 [ 1466.734312] should_failslab+0x5/0x20 [ 1466.734753] kmem_cache_alloc+0x5b/0x310 [ 1466.735234] __alloc_file+0x21/0x320 [ 1466.735663] alloc_empty_file+0x6d/0x170 [ 1466.736137] path_openat+0xe6/0x2770 [ 1466.736597] ? lock_chain_count+0x20/0x20 [ 1466.737091] ? stack_trace_consume_entry+0x160/0x160 [ 1466.737680] ? path_lookupat+0x860/0x860 [ 1466.738165] ? kasan_save_stack+0x32/0x40 [ 1466.738645] ? kasan_save_stack+0x1b/0x40 [ 1466.739132] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1466.739712] ? security_prepare_creds+0x112/0x190 [ 1466.740262] ? prepare_creds+0x452/0x5e0 [ 1466.740737] ? prepare_exec_creds+0xd/0x260 [ 1466.741238] do_filp_open+0x190/0x3e0 [ 1466.741669] ? may_open_dev+0xf0/0xf0 [ 1466.742123] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1466.742736] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1466.743390] ? find_held_lock+0x2c/0x110 [ 1466.743871] do_open_execat+0x116/0x740 [ 1466.744345] ? bprm_execve+0x49d/0x1960 [ 1466.744809] ? __do_sys_uselib+0x6a0/0x6a0 [ 1466.745303] ? do_raw_spin_lock+0x121/0x260 [ 1466.745810] ? rwlock_bug.part.0+0x90/0x90 [ 1466.746304] bprm_execve+0x4dc/0x1960 [ 1466.746756] ? count.constprop.0+0x1b3/0x290 [ 1466.747263] ? open_exec+0x70/0x70 [ 1466.747685] ? copy_string_kernel+0x3b6/0x450 [ 1466.748208] do_execveat_common+0x772/0x8d0 [ 1466.748704] ? bprm_execve+0x1960/0x1960 [ 1466.749186] __x64_sys_execveat+0xed/0x140 [ 1466.749696] do_syscall_64+0x33/0x40 [ 1466.750127] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1466.750731] RIP: 0033:0x7f008031cb19 [ 1466.751170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1466.753357] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1466.754257] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1466.755096] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1466.755928] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1466.756759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1466.757568] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:20:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x100000000000000) 17:20:21 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) unshare(0x800) setxattr$incfs_id(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={'0000000000000000000000000000000', 0x33}, 0x20, 0x1) 17:20:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000000000000) 17:20:36 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0xf7, 0x0, 0x0, 0x0, 0x5e, 0x144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x40000}, 0x0, 0xd, 0xffffffffffffffff, 0x8) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:20:36 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xd, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:20:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300000000000000) 17:20:36 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x850000, 0xcc) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:20:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x400000000000000) 17:20:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x200000000000000) 17:20:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) [ 1482.099261] FAULT_INJECTION: forcing a failure. [ 1482.099261] name failslab, interval 1, probability 0, space 0, times 0 [ 1482.101472] CPU: 0 PID: 9374 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1482.102622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1482.104019] Call Trace: [ 1482.104482] dump_stack+0x107/0x167 [ 1482.105107] should_fail.cold+0x5/0xa [ 1482.105752] ? security_file_alloc+0x34/0x170 [ 1482.106509] should_failslab+0x5/0x20 [ 1482.107148] kmem_cache_alloc+0x5b/0x310 [ 1482.107835] security_file_alloc+0x34/0x170 [ 1482.108569] __alloc_file+0xb7/0x320 [ 1482.109191] alloc_empty_file+0x6d/0x170 [ 1482.109882] path_openat+0xe6/0x2770 [ 1482.110523] ? lock_chain_count+0x20/0x20 [ 1482.111226] ? stack_trace_consume_entry+0x160/0x160 [ 1482.112082] ? path_lookupat+0x860/0x860 [ 1482.112778] ? kasan_save_stack+0x32/0x40 [ 1482.113466] ? kasan_save_stack+0x1b/0x40 [ 1482.114170] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1482.115027] ? security_prepare_creds+0x112/0x190 [ 1482.115832] ? prepare_creds+0x452/0x5e0 [ 1482.116530] ? prepare_exec_creds+0xd/0x260 [ 1482.117258] do_filp_open+0x190/0x3e0 [ 1482.117887] ? may_open_dev+0xf0/0xf0 [ 1482.118535] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1482.119406] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1482.120335] ? find_held_lock+0x2c/0x110 [ 1482.121029] do_open_execat+0x116/0x740 [ 1482.121684] ? bprm_execve+0x49d/0x1960 [ 1482.122349] ? __do_sys_uselib+0x6a0/0x6a0 [ 1482.123042] ? do_raw_spin_lock+0x121/0x260 [ 1482.123744] ? rwlock_bug.part.0+0x90/0x90 [ 1482.124461] bprm_execve+0x4dc/0x1960 [ 1482.125099] ? count.constprop.0+0x1b3/0x290 [ 1482.125826] ? open_exec+0x70/0x70 [ 1482.126430] ? copy_string_kernel+0x3b6/0x450 [ 1482.127189] do_execveat_common+0x772/0x8d0 [ 1482.127910] ? bprm_execve+0x1960/0x1960 [ 1482.128597] __x64_sys_execveat+0xed/0x140 [ 1482.129299] do_syscall_64+0x33/0x40 [ 1482.129918] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1482.130759] RIP: 0033:0x7f008031cb19 [ 1482.131374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1482.134421] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1482.135671] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1482.136859] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1482.138034] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1482.139187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1482.140342] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:20:36 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000040)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:20:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300000000000000) 17:20:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x300000000000000) 17:20:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x400000000000000) 17:20:36 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000001180)='./file0\x00', 0x3) recvmmsg(r0, &(0x7f0000001380)=[{{&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000000c0)=""/37, 0x25}, {&(0x7f0000000380)=""/251, 0xfb}, {&(0x7f0000000680)=""/203, 0xcb}, {&(0x7f0000000200)=""/78, 0x4e}, {&(0x7f0000000780)=""/191, 0xbf}, {&(0x7f0000000940)=""/152, 0x98}, {&(0x7f0000000a00)=""/160, 0xa0}, {&(0x7f0000000ac0)=""/126, 0x7e}, {&(0x7f0000000840)=""/1, 0x1}, {&(0x7f0000000b40)=""/243, 0xf3}], 0xa, &(0x7f00000008c0)=""/6, 0x6}, 0x3d80}, {{&(0x7f0000000d00)=@isdn, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d80)=""/6, 0x6}, {&(0x7f0000000dc0)=""/34, 0x22}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000e00)=""/106, 0x6a}], 0x4}}, {{&(0x7f0000000ec0)=@tipc=@id, 0x80, &(0x7f0000001080)=[{&(0x7f0000000f40)=""/176, 0xb0}, {&(0x7f0000001000)=""/123, 0x7b}], 0x2, &(0x7f00000010c0)=""/139, 0x8b}, 0x80}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000001180)}, {&(0x7f00000011c0)=""/54, 0x36}, {&(0x7f0000001200)=""/60, 0x3c}], 0x3, &(0x7f0000001280)=""/220, 0xdc}, 0x7f}], 0x4, 0x100, &(0x7f0000001480)) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:20:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500000000000000) 17:20:36 executing program 7: restart_syscall() unshare(0x8000000) unshare(0xc000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) pwritev2(0xffffffffffffffff, &(0x7f0000000a00)=[{&(0x7f0000000040)="ea16ec1b4b", 0x5}, {&(0x7f0000000380)="a77189a3b529276dfde7745974ee92a4e8e25ccbae7021a02b3e7159fabe0e7a1cba70adc1172afcc949e2f048be3caf9a078c15dad9933ab2d08080fb50b021f4bed68af51072a3ecabe18aac3b4aecf266fad930dac07ae949ce593ed8427bb84cec5bde7a30476b5db0356acf078a2d51734a925403fcd968d14b36582b999a59f8ba024eaccda367", 0x8a}, {&(0x7f0000000500)="035f4c99d0ace5405359d472a5eadc08964449d404d772d8b84c223ae54733b60d6a52f4fb0f48f7521d357454704ca049e0320f5952c26a572164fea9505f5c50620db68f3b1e2dbca02d4bd8f788c1901db1ac39d6d0868d14dc75a2ee9f5513f037db0d57982e82ffae145e0bcd203c4a9db473a80bd1bbed95ae0df89f7406e271b48cc3f743137355b5d9a404e4", 0x90}, {&(0x7f0000000680)="e4db6813039ceb084290efad122b1f7acdf6809d3b4684e9633c9d5a17713661fc9d25f9067d6757a668212c4f28e87b4e19d046ff9eb0a74cd2598c43483fa18c61470dc477ee1943334eab8b0f0f7bfb7615f49145521785ae1f6b92ed3e38dd3aa1631e8bddfa2fcce9853073338c9a54ad1b5f0bcfdc3e94b4d7af63fd41a9cc59da56a812ae560d0121b624b4dcf037f2995a9a042d3548e821dedced9473f18448c9bb02fc4bcdde3252ba6f4559d4d6e7d6b6ba16ea11de24426d76c44ef46c5c268e10e9e86938d0cd", 0xcd}, {&(0x7f0000000780)="13ac32013d3aa2399b939c9b88ab341579e1f9e872d0dc6866c5e9fd6d7e0cb9bd51b68e503a3b4413500749ea520ac98daed28f1b6f85dde734ad0f8c34da087b2d49685d53596c103c3ec8a108d45c5c927100277efb61c0ab5d407ce36b1c76340cd2da0c82516e92846dc9adb28fedd8bd856f260bae8ec12bce7bd6ed2784e82cf67ee6181957b48c4869998a2c356b24d70bbc411c61679f6729ce9dd8406a4f7c3db1c690cab04ce5d6e195284b70dfa22bd2aebc87201f6113f950f0a7a4a68ab51723fbf825663ffaf99f6c29dc92d0148ae26f8be67d53f1", 0xdd}, {&(0x7f0000000080)="e6e73c169dcdb7dc651c18158a7d53099f528fd93682835e7d1d06", 0x1b}, {&(0x7f0000000940)="b91095fadaacaf8062838ed345416612ce68e1ea1f0bba8a5ddc1ee3c753a8f2fd2811892af03b900651bcd7128a474db11b130f1420e5719e39ed63af63994d60c158c8cc004cbc9dd0b5dfbd6fa0a9e6864151fecff5712fcf0effdb94db9240b06ab42aa082262d0fc0cb797e7cc681208f1e3fdd8dc7a1305e6632f874ab1e671bb0cf0199e37bc08733c51039b9a3d103ecfc2f9269ef5aaa47629e74881357", 0xa2}, {&(0x7f00000000c0)="601d8fa5a458ffc2b6", 0x9}, {&(0x7f0000000200)="9976656355f9a4096cf8ecdc9b0dbe5de4421bb6de40dc79fa8ee1ad62aa529bdd52efb16a02a330662e46d0f24e0a75", 0x30}], 0x9, 0x40, 0x7fffffff, 0x0) 17:20:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 17:20:37 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) lseek(r2, 0x5, 0x2) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(r1, 0x82307202, &(0x7f0000000940)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:20:37 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:20:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500000000000000) [ 1482.438191] FAULT_INJECTION: forcing a failure. [ 1482.438191] name failslab, interval 1, probability 0, space 0, times 0 [ 1482.441178] CPU: 1 PID: 9414 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1482.442624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1482.444376] Call Trace: [ 1482.444950] dump_stack+0x107/0x167 [ 1482.445719] should_fail.cold+0x5/0xa [ 1482.446525] ? create_object.isra.0+0x3a/0xa20 [ 1482.447491] should_failslab+0x5/0x20 [ 1482.448289] kmem_cache_alloc+0x5b/0x310 [ 1482.449154] create_object.isra.0+0x3a/0xa20 [ 1482.450084] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1482.451152] kmem_cache_alloc+0x159/0x310 [ 1482.452027] __alloc_file+0x21/0x320 [ 1482.452814] alloc_empty_file+0x6d/0x170 [ 1482.453669] path_openat+0xe6/0x2770 [ 1482.454456] ? mark_lock+0xf5/0x2df0 [ 1482.455240] ? mark_lock+0xf5/0x2df0 [ 1482.456026] ? path_lookupat+0x860/0x860 [ 1482.456909] ? lock_chain_count+0x20/0x20 [ 1482.457778] ? lock_chain_count+0x20/0x20 [ 1482.458650] ? kasan_save_stack+0x32/0x40 [ 1482.459518] ? kasan_save_stack+0x1b/0x40 [ 1482.460387] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1482.461458] ? security_prepare_creds+0x112/0x190 [ 1482.462474] do_filp_open+0x190/0x3e0 [ 1482.463273] ? may_open_dev+0xf0/0xf0 [ 1482.464076] ? lock_chain_count+0x20/0x20 [ 1482.464963] ? mark_held_locks+0x9e/0xe0 [ 1482.465822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1482.466928] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1482.468062] ? trace_hardirqs_on+0x5b/0x180 [ 1482.468977] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1482.470129] ? do_open_execat+0xd3/0x740 [ 1482.470986] do_open_execat+0x116/0x740 [ 1482.471826] ? bprm_execve+0x49d/0x1960 [ 1482.472676] ? __do_sys_uselib+0x6a0/0x6a0 [ 1482.473573] ? bprm_execve+0x286/0x1960 [ 1482.474407] ? bprm_execve+0x23a/0x1960 [ 1482.475250] bprm_execve+0x4dc/0x1960 [ 1482.476061] ? count.constprop.0+0x1b3/0x290 [ 1482.476994] ? open_exec+0x70/0x70 [ 1482.477747] ? copy_string_kernel+0x3b6/0x450 [ 1482.478701] do_execveat_common+0x772/0x8d0 [ 1482.479613] ? bprm_execve+0x1960/0x1960 [ 1482.480491] __x64_sys_execveat+0xed/0x140 [ 1482.481388] do_syscall_64+0x33/0x40 [ 1482.482197] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1482.483269] RIP: 0033:0x7f008031cb19 [ 1482.484052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1482.487924] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1482.489554] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1482.491056] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1482.492567] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1482.494077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1482.495578] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:20:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x400000000000000) 17:20:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 17:20:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x400000000000000) 17:20:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600000000000000) 17:20:51 executing program 7: r0 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "186c9996f10f46c195dd6395867c0be3e66bc5036789967bf10f0e00740ee36ebf98ce3fb87a4120bd9923e3669dae74f31a587440a8d01f34f6d4dca4a2e27d"}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffa, 0x0) restart_syscall() unshare(0x8000000) unshare(0x10400) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) semget$private(0x0, 0x4, 0x22) 17:20:51 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x20502, 0x0) r1 = semget$private(0x0, 0x4000, 0x0) unshare(0x6000100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT_ANY(r1, 0x2, 0x14, &(0x7f0000000040)=""/144) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:20:51 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) restart_syscall() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:20:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600000000000000) 17:20:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500000000000000) [ 1497.007813] FAULT_INJECTION: forcing a failure. [ 1497.007813] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.011233] CPU: 0 PID: 9454 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1497.012999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1497.015122] Call Trace: [ 1497.015802] dump_stack+0x107/0x167 [ 1497.016746] should_fail.cold+0x5/0xa [ 1497.017720] ? security_file_alloc+0x34/0x170 [ 1497.018867] should_failslab+0x5/0x20 [ 1497.019834] kmem_cache_alloc+0x5b/0x310 [ 1497.020890] security_file_alloc+0x34/0x170 [ 1497.021870] __alloc_file+0xb7/0x320 [ 1497.022730] alloc_empty_file+0x6d/0x170 [ 1497.023644] path_openat+0xe6/0x2770 [ 1497.024506] ? lock_chain_count+0x20/0x20 [ 1497.025456] ? stack_trace_consume_entry+0x160/0x160 [ 1497.026630] ? path_lookupat+0x860/0x860 [ 1497.027552] ? kasan_save_stack+0x32/0x40 [ 1497.028501] ? kasan_save_stack+0x1b/0x40 [ 1497.029447] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1497.030619] ? security_prepare_creds+0x112/0x190 [ 1497.031705] ? prepare_creds+0x452/0x5e0 [ 1497.032654] ? prepare_exec_creds+0xd/0x260 [ 1497.033657] do_filp_open+0x190/0x3e0 [ 1497.034539] ? may_open_dev+0xf0/0xf0 [ 1497.035442] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1497.036676] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1497.037962] ? find_held_lock+0x2c/0x110 [ 1497.038910] do_open_execat+0x116/0x740 [ 1497.039830] ? bprm_execve+0x49d/0x1960 [ 1497.040757] ? __do_sys_uselib+0x6a0/0x6a0 [ 1497.041731] ? do_raw_spin_lock+0x121/0x260 [ 1497.042725] ? rwlock_bug.part.0+0x90/0x90 [ 1497.043714] bprm_execve+0x4dc/0x1960 [ 1497.044613] ? count.constprop.0+0x1b3/0x290 [ 1497.045638] ? open_exec+0x70/0x70 [ 1497.046463] ? copy_string_kernel+0x3b6/0x450 [ 1497.047508] do_execveat_common+0x772/0x8d0 [ 1497.048509] ? bprm_execve+0x1960/0x1960 [ 1497.049474] __x64_sys_execveat+0xed/0x140 [ 1497.050463] do_syscall_64+0x33/0x40 [ 1497.051327] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1497.052510] RIP: 0033:0x7f008031cb19 [ 1497.053377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1497.057641] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1497.059397] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1497.061062] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1497.062708] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1497.064353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1497.066016] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 [ 1509.865533] FAULT_INJECTION: forcing a failure. [ 1509.865533] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1509.869230] CPU: 0 PID: 9479 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1509.870959] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1509.873073] Call Trace: [ 1509.873738] dump_stack+0x107/0x167 [ 1509.874669] should_fail.cold+0x5/0xa [ 1509.875635] __alloc_pages_nodemask+0x182/0x600 [ 1509.876822] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1509.878346] ? lock_downgrade+0x6d0/0x6d0 [ 1509.879402] alloc_pages_current+0x187/0x280 [ 1509.880536] __page_cache_alloc+0x2d2/0x360 [ 1509.881638] generic_file_buffered_read+0xcd7/0x2920 [ 1509.882919] ? lock_chain_count+0x20/0x20 [ 1509.883989] ? pagecache_get_page+0xc80/0xc80 [ 1509.885137] ? __lock_acquire+0xbb1/0x5b00 [ 1509.886216] generic_file_read_iter+0x33f/0x490 [ 1509.887396] ext4_file_read_iter+0x184/0x4c0 [ 1509.888513] __kernel_read+0x593/0xb30 [ 1509.889525] ? do_sendfile+0x11e0/0x11e0 [ 1509.890566] ? fsnotify_perm.part.0+0x22d/0x620 [ 1509.891748] ? security_file_permission+0xb1/0xe0 [ 1509.892996] kernel_read+0x52/0x70 [ 1509.893905] bprm_execve+0x767/0x1960 [ 1509.894884] ? open_exec+0x70/0x70 [ 1509.895785] ? copy_string_kernel+0x3b6/0x450 [ 1509.896939] do_execveat_common+0x772/0x8d0 [ 1509.898029] ? bprm_execve+0x1960/0x1960 [ 1509.899087] __x64_sys_execveat+0xed/0x140 [ 1509.900176] do_syscall_64+0x33/0x40 [ 1509.901130] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1509.902436] RIP: 0033:0x7f008031cb19 [ 1509.903375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1509.908049] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1509.910133] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1509.911642] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1509.913165] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1509.914681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1509.916173] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:21:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 17:21:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600000000000000) 17:21:04 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000940)={0x0, 0x380, 0x1, 0x1}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000d40)={r2, 0x5, 0x4, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000001140)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0x9, 0x6, 0x7, 0xd011, 0x3, 0x3, 0x80000001, 0x6a, 0x40, 0x32b, 0x9, 0x4, 0x38, 0x1, 0x1, 0x8}, [{0x3, 0xffff, 0x800, 0x9, 0x8, 0x2, 0x6, 0x2}], "05ea0e4e941c796e3a085f5eab154bab86381430bdd0a3aad67155218721bc0602ecb18e0072d8da06038b8fb5550bfb6c4e7103a12825c779dffb1c0c3327f259173d9a51dbe07ab6", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9c1) 17:21:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700000000000000) 17:21:04 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x22) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=@migrate={0x50, 0x21, 0x100, 0x70bd2d, 0x25dfdbff, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4e22, 0x8, 0x4e20, 0xfffe, 0x0, 0xa0, 0x20, 0x2b, 0x0, r0}, 0x6e6bba, 0x3}}, 0x50}, 0x1, 0x0, 0x0, 0x90}, 0x4000814) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:04 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0/file0\x00', 0x8000, 0xa, &(0x7f0000001940)=[{&(0x7f0000000200)="385c59f67f7dcc2943eb1bc7a2aaee8de23fd1f771f88537443f99cc544c6d8f5047048b58d562fb45f3ef94168193690d4d7332cf8708c06f5b9c9bb3a9a06203d17cf7a36949b24d25aaf4bbc82553", 0x50, 0x8001}, {&(0x7f00000000c0)="f5e3a646b904396cb1f687d0095378d1431fd90a27097395e92ba6af43a554179fe2", 0x22, 0xc37}, {&(0x7f0000000380)="9a823408cc83ec022df740042159c508f6868da585a4a934eba7541f4a82a2978da6757993649d36ee44ec87fc4d32bf274d8f5296501a0375c6f7ba42b3e298fa05619d983421e57182663e90fc5fdbe4c59f6ca537be17e6dc5d3e9ff6e24d3d1d5ae679c4932bb296ba739813b6c77a826a5495ae4f658ec134f7ffbb9b5aafb610b1660b033e13d7b3843a3ef77248569873161c67e37a8d2bedd10b036394cca8fdb476ceb1f6f60bf737cddab176b85f0198df2a86ca734fc0b2564b2742da9b44dafc5888f277a2c2f07a8bb10dc80ce8c9b0f235038a8b7f29f19601e731f03ac082ae9275591c7cfc", 0xed, 0x16bb}, {&(0x7f0000000500)="c6eb57986cdf6036c4e7b3706fd5564471f99916bfed5fcdb7f37c8c0bd21da55f3fb5784450f80a9993ff9ea96e6215bff89413e00ec82c12bcd83cbfef51cd916aa49a68e6bd7ebd25948090974052702cb511c9b68d16c41158fefd482a16ed4b045f598d18c38f7a6154bc7eeff51181f6b84a6f60", 0x77, 0x7ff}, {&(0x7f0000000940)="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", 0x1000, 0x401}, {&(0x7f0000000680)="8e6bfa517d079736af431ea1360b466173d0c2de443f512ac2db298ace26899a0a0c493900b579876f6e73a6e802952b6bf20d79df6ac550adbbf1f934c9a2e597f230bd2850e87b41087077e22d882248b5837a641fb0bcddc62aacfebb6431514d6e21ab08ea597596329fdfddfca59f8c59ed735fefc9f847af3659c854d3d3b008fde6bbbf04a70526c3e0c3ecac46a729132671c611fc695db5f55e1e9c1ae16468844438afde180957180e487a7b486da32c1bb01df6683169", 0xbc, 0x3}, {&(0x7f0000000580)="dd566d8ed827cd1b1fac002cb3d7e84022b86c195fad081142c7eb9d3581e51e3357656f", 0x24, 0x200}, {&(0x7f00000005c0)="9568d1a9e94cd822ce2cf5693246451b53", 0x11}, {&(0x7f0000000740)="fa28e31d7fd2a67791dbb8089e8ea163a72bd01e6cb561b534212d73fe6fa37850ae2211da24f7d176cdb1b4628ba6e530802e3b8e721bc12de46b8cd1a8aa36f3f73ac805dabe0bf28afd782ab638f5e55c43fee926bdda9954db1999fd", 0x5e, 0x5}, {&(0x7f0000001e00)="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", 0x1000, 0x7}], 0x2000, &(0x7f00000007c0)=ANY=[@ANYBLOB="6e6f646f74732c74696d655f6f66667365743d303030303030303262642c7063723d30301030303030303030303030303030303034322c6f626a5f726f6c513d432e2c666f776e65723d", @ANYRESDEC=0xee00, @ANYBLOB=',mask=^MAY_EXEC,\x00']) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x12a8, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) r7 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r7, 0x0, 0x0, 0x0, {0x440c}, 0x0, {0x0, r6}}, 0x5) syz_io_uring_submit(0x0, 0x0, &(0x7f00000008c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840), 0x1, 0x0, 0x0, {0x0, r6}}, 0x5d14) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4007, 0x400) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x500000000000000) 17:21:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700000000000000) [ 1509.941487] loop7: detected capacity change from 0 to 65536 17:21:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000000000000) [ 1510.038771] loop7: detected capacity change from 0 to 65536 17:21:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 17:21:04 executing program 1: restart_syscall() unshare(0x8000000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}, {{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000380)=""/106, 0x6a}, {&(0x7f0000000600)=""/183, 0xb7}, {&(0x7f00000006c0)=""/230, 0xe6}, {&(0x7f0000000880)=""/124, 0x7c}], 0x4, &(0x7f0000000940)=""/146, 0x92}, 0x4}], 0x2, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:04 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x16a) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = semget$private(0x0, 0x4000, 0x0) r3 = semget$private(0x0, 0x1, 0x600) semctl$IPC_RMID(r3, 0x0, 0x0) semtimedop(r2, &(0x7f0000000000)=[{0x3, 0x0, 0x1000}, {0x1, 0x7fff, 0x1000}, {0x6, 0x2, 0x800}, {0x3, 0xff00}, {0x4, 0x6468}, {0x0, 0x5, 0x1000}, {0x3, 0x4, 0x1800}, {0x3, 0x9, 0x1800}], 0x8, &(0x7f0000000040)) semctl$SEM_STAT_ANY(r2, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$IPC_RMID(r2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x12e) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:21:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x600000000000000) 17:21:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700000000000000) 17:21:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 17:21:04 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0xffe8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r4, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setpipe(r4, 0x407, 0x5e) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000000c0)={0x0, r3, 0x1200000000000, 0x1, 0x3, 0x7fff}) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1510.343530] FAULT_INJECTION: forcing a failure. [ 1510.343530] name failslab, interval 1, probability 0, space 0, times 0 [ 1510.346421] CPU: 1 PID: 9538 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1510.347894] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1510.349710] Call Trace: [ 1510.350294] dump_stack+0x107/0x167 [ 1510.351081] should_fail.cold+0x5/0xa [ 1510.351908] ? create_object.isra.0+0x3a/0xa20 [ 1510.352905] should_failslab+0x5/0x20 [ 1510.353733] kmem_cache_alloc+0x5b/0x310 [ 1510.354610] ? jbd2__journal_start+0x190/0x7e0 [ 1510.355605] create_object.isra.0+0x3a/0xa20 [ 1510.356543] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1510.357670] kmem_cache_alloc+0x159/0x310 [ 1510.358586] jbd2__journal_start+0x190/0x7e0 [ 1510.359556] __ext4_journal_start_sb+0x214/0x390 [ 1510.360587] ext4_dirty_inode+0xbc/0x130 [ 1510.361480] ? ext4_setattr+0x20f0/0x20f0 [ 1510.362384] __mark_inode_dirty+0x492/0xd40 [ 1510.363331] touch_atime+0x5ea/0x6e0 [ 1510.364121] ? atime_needs_update+0x600/0x600 [ 1510.365089] ? add_to_page_cache_locked+0x40/0x40 [ 1510.366164] generic_file_buffered_read+0x191a/0x2920 [ 1510.367310] ? pagecache_get_page+0xc80/0xc80 [ 1510.368279] ? __lock_acquire+0xbb1/0x5b00 [ 1510.369204] generic_file_read_iter+0x33f/0x490 [ 1510.370239] ext4_file_read_iter+0x184/0x4c0 [ 1510.371191] __kernel_read+0x593/0xb30 [ 1510.372033] ? do_sendfile+0x11e0/0x11e0 [ 1510.372933] ? fsnotify_perm.part.0+0x22d/0x620 [ 1510.373957] ? security_file_permission+0xb1/0xe0 [ 1510.375011] kernel_read+0x52/0x70 [ 1510.375796] bprm_execve+0x767/0x1960 [ 1510.376627] ? open_exec+0x70/0x70 [ 1510.377433] ? copy_string_kernel+0x3b6/0x450 [ 1510.378424] do_execveat_common+0x772/0x8d0 [ 1510.379357] ? bprm_execve+0x1960/0x1960 [ 1510.380264] __x64_sys_execveat+0xed/0x140 [ 1510.381188] do_syscall_64+0x33/0x40 [ 1510.382011] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1510.383119] RIP: 0033:0x7f008031cb19 [ 1510.383911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1510.387930] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1510.389585] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1510.391107] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1510.392639] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1510.394179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1510.395729] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:21:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 17:21:20 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x8000000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1f, 0x3f, 0x20, 0xb0, 0x0, 0x0, 0x80200, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x10, 0x100000000, 0x0, 0x1, 0x5, 0xfffffffa, 0x6a, 0x0, 0xffffffcf, 0x0, 0x40}, r1, 0xd, 0xffffffffffffffff, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:20 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000700)=0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x3, &(0x7f0000000680)=[{&(0x7f0000000200)="19d47ca1e0541c5ccce459702f9b0fba02956368a9c282faac0efa8288dd8a4f57905616ee1702046082558e93a380228a308ed1a6d4209bd37927856784df6b12991ed7c4bd09c1c80e00bd8fd679b48f95a89a2b8f259ac6d7bbb32ece5a6618212da8550d04d66ea481c09e", 0x6d, 0x6}, {&(0x7f00000000c0)="7ac6579593a86fe0733942c91b8eeadadcdcfe8d928fb27ed9cc3c", 0x1b, 0x100000000}, {&(0x7f0000000380)="f6e23bf07242a4ad0b96760747959c20744b0679b29b114fc797f2a7ac9d15327442754808bd4d1d5ea90ae3fa30d9eb778ccafd5f71be79e20ce603f4c661eaceed82388fa7f2636ba3bf5efa9b50b44bb1e7b2f71bd18326b6b78550fca0ff3c1e6c825c16ea0656307b7651a1697f24abfbd3904718269f3227e161436355860d301a57153ece00157942d46dd7453e1fb38d9a3a5919f357f88eaf949a0ef6e4d87edf6698d4ea639ea4a91701955bca834dbd3bc5a902396252a1578a75d03c48d5e25a10d40ba6d05096f4af7037b892473c495985bb578657e80224ac95aeb363244bb6", 0xe7, 0x3}], 0x100410, &(0x7f0000000740)={[{@data_ordered}], [{@uid_gt}, {@subj_user={'subj_user', 0x3d, '@+'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@uid_gt={'uid>', r1}}]}) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2000000000000000) 17:21:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 17:21:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 17:21:20 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x2) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:21:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x700000000000000) [ 1525.457530] FAULT_INJECTION: forcing a failure. [ 1525.457530] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.460116] CPU: 0 PID: 9557 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1525.461577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1525.463320] Call Trace: [ 1525.463884] dump_stack+0x107/0x167 [ 1525.464651] should_fail.cold+0x5/0xa [ 1525.465467] ? __request_module+0x2e0/0x920 [ 1525.466388] ? bprm_execve+0x9a0/0x1960 [ 1525.467233] should_failslab+0x5/0x20 [ 1525.468040] kmem_cache_alloc_trace+0x55/0x320 [ 1525.469024] ? bprm_execve+0x9a0/0x1960 [ 1525.469855] __request_module+0x2e0/0x920 [ 1525.470730] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1525.471832] ? free_modprobe_argv+0x90/0x90 [ 1525.472736] ? find_held_lock+0x2c/0x110 [ 1525.473605] ? find_held_lock+0x2c/0x110 [ 1525.474489] ? bprm_execve+0x8f8/0x1960 [ 1525.475337] ? lock_downgrade+0x6d0/0x6d0 [ 1525.476210] ? elf_core_dump+0x3c50/0x3c50 [ 1525.477106] ? do_raw_read_unlock+0x3b/0x70 [ 1525.478016] ? _raw_read_unlock+0x1a/0x30 [ 1525.478893] ? load_misc_binary+0x813/0xb50 [ 1525.479798] bprm_execve+0x9a0/0x1960 [ 1525.480611] ? open_exec+0x70/0x70 [ 1525.481370] ? copy_string_kernel+0x3b6/0x450 [ 1525.482303] do_execveat_common+0x772/0x8d0 [ 1525.483221] ? bprm_execve+0x1960/0x1960 [ 1525.484068] __x64_sys_execveat+0xed/0x140 [ 1525.484982] do_syscall_64+0x33/0x40 [ 1525.485748] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1525.486859] RIP: 0033:0x7f008031cb19 [ 1525.487664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1525.491501] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1525.493103] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1525.494601] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1525.496106] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.497626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1525.499115] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:21:20 executing program 7: r0 = syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r6, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r7, &(0x7f0000000000)='./file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x7, 0x0, r7, 0x0, r0, 0x2, 0x0, 0x1}, 0x8) syz_io_uring_submit(r1, r5, &(0x7f0000000180)=@IORING_OP_STATX={0x15, 0x2, 0x0, r7, &(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x100, 0x400, 0x1}, 0x5) restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r8, &(0x7f0000000000)='./file0\x00', 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r9, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xdf, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 17:21:20 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:20 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0, 0xfffffffffffffdf2}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/112, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x3, 0x0, @fd=r1, 0x9, 0x0, 0x5, 0xa, 0x1}, 0x0) r5 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r6, 0x1) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r7, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x7533, 0x0, 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) fallocate(r5, 0x5e, 0x40, 0x101) 17:21:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 17:21:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 17:21:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2321000000000000) 17:21:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) [ 1525.787503] FAULT_INJECTION: forcing a failure. [ 1525.787503] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.790089] CPU: 1 PID: 9600 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1525.791534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1525.793307] Call Trace: [ 1525.793870] dump_stack+0x107/0x167 [ 1525.794649] should_fail.cold+0x5/0xa [ 1525.795455] ? create_object.isra.0+0x3a/0xa20 [ 1525.796423] should_failslab+0x5/0x20 [ 1525.797233] kmem_cache_alloc+0x5b/0x310 [ 1525.798111] create_object.isra.0+0x3a/0xa20 [ 1525.799032] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1525.800107] kmem_cache_alloc+0x159/0x310 [ 1525.800997] jbd2__journal_start+0x190/0x7e0 [ 1525.801967] __ext4_journal_start_sb+0x214/0x390 [ 1525.802987] ext4_dirty_inode+0xbc/0x130 [ 1525.803853] ? ext4_setattr+0x20f0/0x20f0 [ 1525.804718] __mark_inode_dirty+0x492/0xd40 [ 1525.805652] touch_atime+0x5ea/0x6e0 [ 1525.806441] ? atime_needs_update+0x600/0x600 [ 1525.807383] ? add_to_page_cache_locked+0x40/0x40 [ 1525.808421] generic_file_buffered_read+0x191a/0x2920 [ 1525.809531] ? pagecache_get_page+0xc80/0xc80 [ 1525.810488] ? __lock_acquire+0xbb1/0x5b00 [ 1525.811393] generic_file_read_iter+0x33f/0x490 [ 1525.812386] ext4_file_read_iter+0x184/0x4c0 [ 1525.813336] __kernel_read+0x593/0xb30 [ 1525.814164] ? do_sendfile+0x11e0/0x11e0 [ 1525.815029] ? fsnotify_perm.part.0+0x22d/0x620 [ 1525.816025] ? security_file_permission+0xb1/0xe0 [ 1525.817074] kernel_read+0x52/0x70 [ 1525.817846] bprm_execve+0x767/0x1960 [ 1525.818663] ? open_exec+0x70/0x70 [ 1525.819422] ? copy_string_kernel+0x3b6/0x450 [ 1525.820392] do_execveat_common+0x772/0x8d0 [ 1525.821330] ? bprm_execve+0x1960/0x1960 [ 1525.822217] __x64_sys_execveat+0xed/0x140 [ 1525.823132] do_syscall_64+0x33/0x40 [ 1525.823926] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1525.825028] RIP: 0033:0x7f008031cb19 [ 1525.825813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1525.829701] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1525.831309] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1525.832827] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1525.834352] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.835869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1525.837392] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:21:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2321000000000000) 17:21:20 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) unshare(0x180) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 17:21:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000240)={r1}) unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000200)='./file0/file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x4) unlinkat(r4, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0xc0) syz_mount_image$nfs(&(0x7f0000000380), &(0x7f00000003c0)='./file0/file0\x00', 0x4, 0x1, &(0x7f0000000500)=[{&(0x7f0000000400)="6e9b485ee5dc9651312f1605846ad9223d63ed9a3c2e919734ada20d628214bc69d1a3f19ac9787a452c41feff814172714e306d5f604f3f70dd4a2d0455a7567a5e391259df636ae5f5d164fe402e001edd7ac66c7bc02085b24d4d9ddd3f81ba7a", 0x62, 0xe60}], 0x80000, &(0x7f0000000680)=ANY=[@ANYBLOB="2e5b5d26255c2c21252d245b232cd12c7423212c726f6f74636f6e746578743d756e636f6e66696e6564083b2fda7569643db191eca13f541aade83b62d7e65c6e9cc8ee18095bc714ab243ef91afb206c67eac6461e", @ANYRESDEC=0xee00, @ANYBLOB=',dont_appraise,permit_directio,\x00']) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20012}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) r5 = semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(r5, 0x0, 0x10) [ 1526.056660] loop7: detected capacity change from 0 to 7168 17:21:33 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x8, 0x56, 0x1, 0x0, 0x2, 0x8000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x100000001}, 0x2020, 0xda, 0x2, 0x2, 0x6, 0x7, 0x3, 0x0, 0x3f, 0x0, 0x2e}, r2, 0x5, 0xffffffffffffffff, 0x1) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2321000000000000) 17:21:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x2321000000000000) 17:21:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 17:21:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 17:21:33 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:21:33 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) [ 1538.518405] FAULT_INJECTION: forcing a failure. [ 1538.518405] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.521614] CPU: 1 PID: 9650 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1538.523310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1538.525380] Call Trace: [ 1538.526037] dump_stack+0x107/0x167 [ 1538.526941] should_fail.cold+0x5/0xa [ 1538.527890] ? bprm_execve+0x9a0/0x1960 [ 1538.528872] should_failslab+0x5/0x20 [ 1538.529830] __kmalloc_track_caller+0x79/0x370 [ 1538.530958] ? __request_module+0x2fe/0x920 [ 1538.532027] ? bprm_execve+0x9a0/0x1960 [ 1538.533018] kstrdup+0x36/0x70 [ 1538.533814] __request_module+0x2fe/0x920 [ 1538.534849] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1538.536146] ? free_modprobe_argv+0x90/0x90 [ 1538.537227] ? find_held_lock+0x2c/0x110 [ 1538.538240] ? find_held_lock+0x2c/0x110 [ 1538.539245] ? bprm_execve+0x8f8/0x1960 [ 1538.540233] ? lock_downgrade+0x6d0/0x6d0 [ 1538.541250] ? elf_core_dump+0x3c50/0x3c50 [ 1538.542284] ? do_raw_read_unlock+0x3b/0x70 [ 1538.543346] ? _raw_read_unlock+0x1a/0x30 [ 1538.544354] ? load_misc_binary+0x813/0xb50 [ 1538.545435] bprm_execve+0x9a0/0x1960 [ 1538.546380] ? open_exec+0x70/0x70 [ 1538.547254] ? copy_string_kernel+0x3b6/0x450 [ 1538.548357] do_execveat_common+0x772/0x8d0 [ 1538.549419] ? bprm_execve+0x1960/0x1960 [ 1538.550437] __x64_sys_execveat+0xed/0x140 [ 1538.551470] do_syscall_64+0x33/0x40 [ 1538.552382] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1538.553647] RIP: 0033:0x7f008031cb19 [ 1538.554551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1538.559044] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1538.560909] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1538.562647] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1538.564396] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1538.566150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1538.567888] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:21:33 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) fcntl$setlease(r0, 0x400, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 17:21:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 17:21:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 17:21:33 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000040)=0x2, r0, &(0x7f0000000080)=0x800000000, 0xd27, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 17:21:33 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x109000, 0x120) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2c2140, 0x0) semget$private(0x0, 0x4000, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r1, 0x6, 0x40, 0x2}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="0100eeb182efcf00", @ANYRES32=0xffffffffffffffff, @ANYBLOB="390e0000000000002e2f66696c653000"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) setresuid(0xffffffffffffffff, 0x0, 0x0) acct(&(0x7f0000000200)='./file0\x00') mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x10a4002, &(0x7f0000000940)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_9p2000}, {@cachetag}, {@cachetag={'cachetag', 0x3d, '-]}}'}}, {@cache_none}, {@debug={'debug', 0x3d, 0x44a}}, {@version_L}, {@access_any}, {@version_9p2000}], [{@obj_user={'obj_user', 0x3d, '{#!+![&'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@hash}, {@euid_gt}, {@smackfstransmute}]}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r4, &(0x7f0000000000)='./file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_STATX={0x15, 0x5, 0x0, r4, &(0x7f0000000680), &(0x7f0000000040)='./file0\x00', 0x100, 0x400}, 0x4000000) creat(&(0x7f0000000400)='./file0\x00', 0x68) [ 1538.817678] Process accounting resumed 17:21:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 17:21:48 executing program 3: restart_syscall() openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x40000, 0x0) unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x181000, 0x10) openat2(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x32400, 0x7a9ed4fe7b04bf6c, 0xe}, 0x18) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:21:48 executing program 1: restart_syscall() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(r0, &(0x7f0000005240)=[{{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000380)=""/139, 0x8b}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f0000000680)=""/207, 0xcf}, {&(0x7f00000000c0)=""/40, 0x28}, {&(0x7f0000000780)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/156, 0x9c}], 0x7, &(0x7f0000001a80)=""/92, 0x5c}, 0x8}, {{&(0x7f0000001b00)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001b80)=""/100, 0x64}, {&(0x7f0000001c00)=""/197, 0xc5}], 0x2, &(0x7f0000001e00)=""/176, 0xb0}, 0x1}, {{&(0x7f0000001d00)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000840)=[{&(0x7f0000001ec0)=""/188, 0xbc}, {&(0x7f0000001f80)=""/156, 0x9c}], 0x2, &(0x7f0000002040)=""/4096, 0x1000}, 0x7}, {{&(0x7f0000003040)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000005100)=[{&(0x7f00000008c0)=""/3, 0x3}, {&(0x7f00000030c0)=""/50, 0x32}, {&(0x7f0000003100)=""/4096, 0x1000}, {&(0x7f0000004100)=""/4096, 0x1000}], 0x4, &(0x7f0000005140)=""/224, 0xe0}, 0xffff5e43}], 0x4, 0x40000001, &(0x7f0000005340)={0x0, 0x3938700}) unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:48 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x81, 0x5, 0x5, 0x0, 0x4, 0x20206, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb8e4, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x190, 0x2, 0x3, 0x5, 0x100000000, 0x259a, 0x6, 0x0, 0xcc, 0x0, 0x100000000}, 0xffffffffffffffff, 0x7, r0, 0x2) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 17:21:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 17:21:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 17:21:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4800000000000000) [ 1553.945366] FAULT_INJECTION: forcing a failure. [ 1553.945366] name failslab, interval 1, probability 0, space 0, times 0 [ 1553.948119] CPU: 1 PID: 9721 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1553.949573] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1553.951348] Call Trace: [ 1553.951908] dump_stack+0x107/0x167 [ 1553.952676] should_fail.cold+0x5/0xa [ 1553.953483] ? create_object.isra.0+0x3a/0xa20 [ 1553.954452] should_failslab+0x5/0x20 [ 1553.955261] kmem_cache_alloc+0x5b/0x310 [ 1553.956123] create_object.isra.0+0x3a/0xa20 [ 1553.957038] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1553.958119] __kmalloc_track_caller+0x177/0x370 [ 1553.959099] ? __request_module+0x2fe/0x920 [ 1553.960011] ? bprm_execve+0x9a0/0x1960 [ 1553.960839] kstrdup+0x36/0x70 [ 1553.961522] __request_module+0x2fe/0x920 [ 1553.962398] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1553.963498] ? free_modprobe_argv+0x90/0x90 [ 1553.964407] ? find_held_lock+0x2c/0x110 [ 1553.965271] ? find_held_lock+0x2c/0x110 [ 1553.966127] ? bprm_execve+0x8f8/0x1960 [ 1553.966954] ? lock_downgrade+0x6d0/0x6d0 [ 1553.967820] ? elf_core_dump+0x3c50/0x3c50 [ 1553.968708] ? do_raw_read_unlock+0x3b/0x70 [ 1553.969624] ? _raw_read_unlock+0x1a/0x30 [ 1553.970490] ? load_misc_binary+0x813/0xb50 [ 1553.971405] bprm_execve+0x9a0/0x1960 [ 1553.972213] ? open_exec+0x70/0x70 [ 1553.972964] ? copy_string_kernel+0x3b6/0x450 [ 1553.973945] do_execveat_common+0x772/0x8d0 [ 1553.974872] ? bprm_execve+0x1960/0x1960 [ 1553.975742] __x64_sys_execveat+0xed/0x140 [ 1553.976637] do_syscall_64+0x33/0x40 [ 1553.977439] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1553.978516] RIP: 0033:0x7f008031cb19 [ 1553.979290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1553.983163] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1553.984770] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1553.986277] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1553.987781] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1553.989291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1553.990798] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:21:48 executing program 1: restart_syscall() unshare(0x8000000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x21, &(0x7f0000000900)={r0, r1+10000000}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 17:21:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 17:21:48 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)=""/230, 0xe6}], 0x1, &(0x7f0000000080)=""/34, 0x22}, 0x5}, {{&(0x7f0000000600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, &(0x7f0000000680)=""/62, 0x3e}}, {{&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000740)=""/14, 0xe}, {&(0x7f0000000780)=""/93, 0x5d}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/4096, 0x1000}], 0x4, &(0x7f0000003e00)=""/4096, 0x1000}}, {{&(0x7f0000001940)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000840)=[{&(0x7f00000019c0)=""/87, 0x57}], 0x1, &(0x7f0000001a40)=""/175, 0xaf}, 0x9}], 0x4, 0x2, &(0x7f0000001c00)={r1, r2+10000000}) semget$private(0x0, 0x4000, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000001c40)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000001c80)={{0x1, 0x1, 0x18, r3, {r3}}, './file0\x00'}) getpeername$unix(r4, &(0x7f0000001cc0), &(0x7f0000001d40)=0x6e) 17:21:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 17:21:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 17:21:48 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000040)=""/118, 0x76}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:21:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 17:21:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6800000000000000) [ 1554.196492] FAULT_INJECTION: forcing a failure. [ 1554.196492] name failslab, interval 1, probability 0, space 0, times 0 [ 1554.199177] CPU: 1 PID: 9759 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1554.200649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1554.202445] Call Trace: [ 1554.203017] dump_stack+0x107/0x167 [ 1554.203799] should_fail.cold+0x5/0xa [ 1554.204623] ? call_usermodehelper_setup+0xa2/0x2f0 [ 1554.205704] should_failslab+0x5/0x20 [ 1554.206527] kmem_cache_alloc_trace+0x55/0x320 [ 1554.207516] call_usermodehelper_setup+0xa2/0x2f0 [ 1554.208549] ? copy_regset_to_user+0x170/0x170 [ 1554.209543] ? bprm_execve+0x9a0/0x1960 [ 1554.210397] __request_module+0x3f9/0x920 [ 1554.211288] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1554.212416] ? free_modprobe_argv+0x90/0x90 [ 1554.213352] ? find_held_lock+0x2c/0x110 [ 1554.214229] ? find_held_lock+0x2c/0x110 [ 1554.215106] ? bprm_execve+0x8f8/0x1960 [ 1554.215961] ? lock_downgrade+0x6d0/0x6d0 [ 1554.216844] ? elf_core_dump+0x3c50/0x3c50 [ 1554.217751] ? do_raw_read_unlock+0x3b/0x70 [ 1554.218673] ? _raw_read_unlock+0x1a/0x30 [ 1554.219564] ? load_misc_binary+0x813/0xb50 [ 1554.220497] bprm_execve+0x9a0/0x1960 [ 1554.221328] ? open_exec+0x70/0x70 [ 1554.222091] ? copy_string_kernel+0x3b6/0x450 [ 1554.223062] do_execveat_common+0x772/0x8d0 [ 1554.223989] ? bprm_execve+0x1960/0x1960 [ 1554.224873] __x64_sys_execveat+0xed/0x140 [ 1554.225795] do_syscall_64+0x33/0x40 [ 1554.226593] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1554.227694] RIP: 0033:0x7f008031cb19 [ 1554.228490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1554.232454] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1554.234097] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1554.235628] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1554.237166] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1554.238688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1554.240214] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:21:48 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./file0\x00', 0x7, 0x8, &(0x7f00000007c0)=[{&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000000380)="49e17a92acb85edf250b4f38f23d7a781b739b1892873ad1907e8736df19cd1dd2baf56bc6de588aaa7d4e1a0b85b81a69d575cb978b2dd4b39568b828935202b7b7b4e544ad3a7c976f91859f4fde9f57dea9b24ccbeaa073e31a59fd74f6a7bc568a4a2d077c0d0acdef7fafe4925f2c84c58d8e2b4644f7318d8c6b8394e7c0bee3ed451f6295391849b47e93390ab9002db7dc56e0cb77837f3ef89a57e31f5974437bc912df150b13e92a24eb687e34645630", 0xb5, 0x3}, {&(0x7f0000000500)="16bd0ce98dccf4fe75a7ea9f9ac93de6b55117183aa8f7bf3eff9c844f32df33e16739f9bb15bf25b071fbd5aefb0d25fbb29827f45d6a51ad06157e68cdbeb8b7e70fd844545939fd253a53e478a2f9e3dbe6d81b4d9797140ff9fa63a91619349930c550f3855a086fe3942eb4e5d7091afdf50501c16edbfdbf00000000000000", 0x82, 0x4}, {&(0x7f0000000240)="3bbfce", 0x3, 0x4}, {&(0x7f0000000680)="05fcd763bc1fedf1f8b23fbd0b1d85b63f9fcf62327d393583134298edeaa0111976bfd8a843a81c48e13d61e1b5009d1c887bca1a5799eaf3208eccb4db2c822a61e7081b1b9bd7f4698f78929453c9d7e08ebd", 0x54, 0x5cfa}, {&(0x7f0000001e00)="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", 0x1000, 0x6}, {&(0x7f0000000700)="d41fb91f370bd63a1cd03ac46b104cff74bfbdb8f24cbdba886bb92b2122b8d7f48a8535ab35fbfc527ab79a61cd73958053ae906457466bbd5a47b9659215356bf5bbd2b302303483a8113b4da054729e9fd73d93fb3048a517a87e8f3de9ec55b3518e7588053c09c3752391d29c4c50448075f167a1ecec2f66ba81c084c77731ac880453d4ffb4ed536c86ce1d0b55348a739d9ecc754c07508edd2882f7d0cbc1ff1d5c5eb3f5437d3194011b827e90e03639f8be", 0xb7, 0x6}, {&(0x7f0000001ac0)="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", 0x19b, 0x6}], 0x2000000, &(0x7f0000001a40)=ANY=[@ANYBLOB='nocase,shortname=winnt,uni_xlate=1,shortname=mixed,obj_type=,smackfsfloor=!,fowner=', @ANYRESDEC, @ANYBLOB="2c736df1686b7c6266090000003d2f5d3a28ad"]) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x6302, 0x80) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 17:21:49 executing program 1: restart_syscall() semget$private(0x0, 0x4, 0x88) r0 = semget$private(0x0, 0x1, 0x80) semctl$IPC_RMID(r0, 0x0, 0x0) unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(r2, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000380)=@ceph_nfs_snapfh={0x1c, 0x4e, {0x2, 0x1, 0x2, 0x43}}, &(0x7f00000003c0), 0x1400) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:21:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) [ 1554.353744] loop7: detected capacity change from 0 to 47104 [ 1554.380829] FAT-fs (loop7): Unrecognized mount option "obj_type=" or missing value [ 1554.447106] loop7: detected capacity change from 0 to 47104 [ 1554.449490] FAT-fs (loop7): Unrecognized mount option "obj_type=" or missing value 17:22:01 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x3, 0xff, 0x4, 0x0, 0x4, 0x2, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x4, @perf_config_ext={0x77b, 0x100000000}, 0x10409, 0x6c, 0x7f, 0x0, 0x1, 0x4, 0x6, 0x0, 0xdf1, 0x0, 0x7}, r0, 0xffffffffffffffff, r1, 0x1) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) unshare(0x200) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:22:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 17:22:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 17:22:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 17:22:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 17:22:01 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) pidfd_getfd(r3, r2, 0x0) 17:22:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 17:22:01 executing program 1: restart_syscall() recvmmsg(0xffffffffffffffff, &(0x7f00000018c0), 0x0, 0x40000160, &(0x7f0000001a40)={0x0, 0x989680}) unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x4, 0x74, 0x7f, 0x9, 0x0, 0x32f2, 0x1008, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x9, 0x7fff}, 0x100, 0x1f, 0x3ff, 0x1, 0xffff, 0xfffffff8, 0xd91b, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xb, r1, 0x3) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffea}, 0x0, 0x2160}, 0x0) r4 = creat(&(0x7f0000001a80)='./file0\x00', 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001ac0)=@IORING_OP_CLOSE={0x13, 0x7, 0x0, r4}, 0xab) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x0, 0xee01, r5, 0xffffffffffffffff, 0x0, 0x4, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f}) r6 = getuid() getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x2, 0xee01, r5, r6, r7, 0x100, 0x3}, 0x0, 0x0, 0x7, 0x5, 0x7f, 0x1, 0xff, 0x4, 0x8, 0x3, 0x0, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001b00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="3006e43c1cb7edbec143622bd5f04797285953ea66c82af39d51ff5c87c23ba43b07677084d2c9c90e02aa3bebce70ce40fbbfa325dde1cf369a7de776a37611f078d91a7b5010fbe77f455d39fca112f0e3f750661570fca2b4038ba7934ada4a0704996763c4bfb187b805364e00e41c667f3cb604fea4f07b2d16785cb3156b4ce3bad0325a381774e3e9525dbabe742c96dc3e1ab28fccd22bba95f9086089f7895f2dc95585b61ca5049debe37c1bbcb8"]) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1567.053675] FAULT_INJECTION: forcing a failure. [ 1567.053675] name failslab, interval 1, probability 0, space 0, times 0 [ 1567.055214] CPU: 1 PID: 9811 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1567.056001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1567.056959] Call Trace: [ 1567.057284] dump_stack+0x107/0x167 [ 1567.057710] should_fail.cold+0x5/0xa [ 1567.058149] ? create_object.isra.0+0x3a/0xa20 [ 1567.058675] should_failslab+0x5/0x20 [ 1567.059113] kmem_cache_alloc+0x5b/0x310 [ 1567.059582] create_object.isra.0+0x3a/0xa20 [ 1567.060084] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1567.060672] kmem_cache_alloc_trace+0x151/0x320 [ 1567.061213] call_usermodehelper_setup+0xa2/0x2f0 [ 1567.061778] ? copy_regset_to_user+0x170/0x170 [ 1567.062305] ? bprm_execve+0x9a0/0x1960 [ 1567.062764] __request_module+0x3f9/0x920 [ 1567.063252] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1567.063856] ? free_modprobe_argv+0x90/0x90 [ 1567.064350] ? find_held_lock+0x2c/0x110 [ 1567.064819] ? find_held_lock+0x2c/0x110 [ 1567.065300] ? bprm_execve+0x8f8/0x1960 [ 1567.065754] ? lock_downgrade+0x6d0/0x6d0 [ 1567.066227] ? elf_core_dump+0x3c50/0x3c50 [ 1567.066712] ? do_raw_read_unlock+0x3b/0x70 [ 1567.067207] ? _raw_read_unlock+0x1a/0x30 [ 1567.067681] ? load_misc_binary+0x813/0xb50 [ 1567.068179] bprm_execve+0x9a0/0x1960 [ 1567.068624] ? open_exec+0x70/0x70 [ 1567.069033] ? copy_string_kernel+0x3b6/0x450 [ 1567.069562] do_execveat_common+0x772/0x8d0 [ 1567.070057] ? bprm_execve+0x1960/0x1960 [ 1567.070535] __x64_sys_execveat+0xed/0x140 [ 1567.071024] do_syscall_64+0x33/0x40 [ 1567.071453] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1567.072050] RIP: 0033:0x7f008031cb19 [ 1567.072476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1567.074597] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1567.075475] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1567.076293] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1567.077111] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1567.077940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1567.078763] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:22:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 17:22:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 17:22:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 17:22:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 17:22:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 17:22:15 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x331602, 0x10b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:22:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000a00)=ANY=[@ANYBLOB="aff8a687850163dadc73ff85cc1aaaa7570ed18ea0eff7eadffc682eb91feafac32c68845768aa5dc00d949ae99730455be1bf7e7c96ef7c0e43cc1d03d48ced2b0559", @ANYRES16=0x0, @ANYBLOB="04032cbd7000ffdbdf25050000000800020000000000248948f9a69302ee5b1e1b00146d480632f0fb756b1297fa836156788644301848c7cbb6e2284c756bfe9db7d55de16ae58b85e4a403ad9a6b5809d4b31724a88818f432100867514c254e0f28fa"], 0x1c}, 0x1, 0x0, 0x0, 0x20000081}, 0x20000001) restart_syscall() r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000007c0), r1) unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) unshare(0x46020100) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ_FIXED={0x4, 0x5, 0x0, @fd=r3, 0x3, 0x200, 0x6, 0x10, 0x0, {0x1}}, 0x1) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x4, 0x400, 0x1000}, {0x3, 0xffff, 0x800}, {0x4, 0x9, 0x800}, {0x4, 0x8, 0x1000}, {0x4, 0x4}, {0x2, 0x4, 0x800}, {0x4, 0x2, 0x1000}, {0x3, 0xff, 0x1800}], 0x8, &(0x7f0000000080)={0x0, 0x989680}) semctl$IPC_RMID(0x0, 0x0, 0x10) setxattr$incfs_metadata(&(0x7f0000000240)='./file0\x00', &(0x7f0000000680), &(0x7f00000006c0)="9622dd0bb3fe5ae4ddf35fa636c0ebd1d68d5e2e1119b18e40cf651b984b8a5542d60b7919dff020a52cb730354b21ce0b83c7be8a96e348b3238011e548ac3d019c0d254c75b8d3c4802e84a2a2ac97c4ee8c18f5aa3d1731406c3990a7904017b261266322ab83b4439b6693c0a1154bd9240b7f4acacaff2d0f25bedc09cedde40a8e33c7d3e0531931eea0616e6b17711b34b0679b2bffe11a43872f1c8b2c", 0xa1, 0x2) 17:22:15 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) setxattr$incfs_id(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={'0000000000000000000000000000000', 0x33}, 0x20, 0x2) [ 1580.523706] FAULT_INJECTION: forcing a failure. [ 1580.523706] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1580.526541] CPU: 1 PID: 9839 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1580.527949] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.529691] Call Trace: [ 1580.530251] dump_stack+0x107/0x167 [ 1580.531026] should_fail.cold+0x5/0xa [ 1580.531929] __alloc_pages_nodemask+0x182/0x600 [ 1580.532888] ? mark_held_locks+0x9e/0xe0 [ 1580.533728] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1580.534982] ? kmem_cache_free+0xa7/0x2d0 [ 1580.535829] alloc_pages_current+0x187/0x280 [ 1580.536745] __get_free_pages+0xc/0xa0 [ 1580.537616] ? kmem_cache_free+0x249/0x2d0 [ 1580.538494] tlb_remove_table+0x3ca/0xcb0 [ 1580.539340] ___pte_free_tlb+0x86/0xb0 [ 1580.540146] free_pgd_range+0x747/0x1380 [ 1580.540997] free_pgtables+0x230/0x2f0 [ 1580.541796] exit_mmap+0x28e/0x4f0 [ 1580.542527] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1580.543621] mmput+0xca/0x340 [ 1580.544271] free_bprm+0x65/0x2e0 [ 1580.544985] do_execveat_common+0x2e1/0x8d0 [ 1580.545878] ? bprm_execve+0x1960/0x1960 [ 1580.546727] __x64_sys_execveat+0xed/0x140 [ 1580.547696] do_syscall_64+0x33/0x40 [ 1580.548470] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1580.549528] RIP: 0033:0x7f008031cb19 [ 1580.550290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.554091] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1580.555665] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1580.557156] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1580.558635] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1580.560088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1580.561573] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:22:15 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x22841, 0xd6) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:22:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 17:22:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 17:22:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 17:22:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 17:22:15 executing program 3: restart_syscall() unshare(0x8000000) restart_syscall() recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x1, 0x20) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:22:15 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0, 0xfffffffffffffe17}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000040)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:22:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 17:22:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 17:22:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 17:22:15 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x14) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) r2 = semget$private(0x0, 0x4000, 0x0) semtimedop(r2, &(0x7f0000000000)=[{0x3, 0x0, 0x1000}, {0x1, 0x7fff, 0x1000}, {0x6, 0x2, 0x800}, {0x3, 0xff00}, {0x4, 0x6468}, {0x0, 0x5, 0x1000}, {0x3, 0x4, 0x1800}, {0x3, 0x9, 0x1800}], 0x8, &(0x7f0000000040)) semctl$SEM_STAT_ANY(r2, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$IPC_RMID(r2, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1580.901495] FAULT_INJECTION: forcing a failure. [ 1580.901495] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.904697] CPU: 1 PID: 9905 Comm: syz-executor.2 Not tainted 5.10.239 #1 [ 1580.906463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.908587] Call Trace: [ 1580.909211] dump_stack+0x107/0x167 [ 1580.910156] should_fail.cold+0x5/0xa [ 1580.910946] ? create_object.isra.0+0x3a/0xa20 [ 1580.911903] should_failslab+0x5/0x20 [ 1580.912695] kmem_cache_alloc+0x5b/0x310 [ 1580.913583] create_object.isra.0+0x3a/0xa20 [ 1580.914499] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1580.915553] kmem_cache_alloc_trace+0x151/0x320 [ 1580.916543] call_usermodehelper_setup+0xa2/0x2f0 [ 1580.917553] ? copy_regset_to_user+0x170/0x170 [ 1580.918510] ? bprm_execve+0x9a0/0x1960 [ 1580.919526] __request_module+0x3f9/0x920 [ 1580.920404] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1580.921509] ? free_modprobe_argv+0x90/0x90 [ 1580.922396] ? find_held_lock+0x2c/0x110 [ 1580.923258] ? find_held_lock+0x2c/0x110 [ 1580.924114] ? bprm_execve+0x8f8/0x1960 [ 1580.924952] ? lock_downgrade+0x6d0/0x6d0 [ 1580.925819] ? elf_core_dump+0x3c50/0x3c50 [ 1580.926696] ? do_raw_read_unlock+0x3b/0x70 [ 1580.927599] ? _raw_read_unlock+0x1a/0x30 [ 1580.928464] ? load_misc_binary+0x813/0xb50 [ 1580.929407] bprm_execve+0x9a0/0x1960 [ 1580.930235] ? open_exec+0x70/0x70 [ 1580.930971] ? copy_string_kernel+0x3b6/0x450 [ 1580.931923] do_execveat_common+0x772/0x8d0 [ 1580.932827] ? bprm_execve+0x1960/0x1960 [ 1580.933722] __x64_sys_execveat+0xed/0x140 [ 1580.934618] do_syscall_64+0x33/0x40 [ 1580.935394] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1580.936467] RIP: 0033:0x7f008031cb19 [ 1580.937245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.941063] RSP: 002b:00007f007d892188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1580.942670] RAX: ffffffffffffffda RBX: 00007f008042ff60 RCX: 00007f008031cb19 [ 1580.944141] RDX: 0000000000000000 RSI: 0000000020000280 RDI: ffffffffffffff9c [ 1580.945625] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1580.947086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1580.948578] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:22:29 executing program 7: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {0x0}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) uname(&(0x7f0000000000)=""/4) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) io_getevents(0x0, 0xfffffffffffffffd, 0x0, &(0x7f0000000080), 0x0) io_submit(0x0, 0x1, &(0x7f00000008c0)=[&(0x7f0000000180)={0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) eventfd(0x20) signalfd4(r1, &(0x7f0000000380)={[0x7ff]}, 0x8, 0x80000) r2 = fsopen(&(0x7f00000000c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) fsmount(r2, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x3, &(0x7f00000001c0)) r3 = fsopen(&(0x7f00000000c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) dup2(r1, 0xffffffffffffffff) syslog(0x2, &(0x7f00000002c0)=""/129, 0x81) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 17:22:29 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) unshare(0xc000080) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:22:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) 17:22:29 executing program 1: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/219, 0xdb}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prlimit64(r0, 0x6, &(0x7f0000000100)={0x1}, &(0x7f0000000200)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x81403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4, 0x3, 0xfffffffc, 0x2, 0x3, 0x400, 0xfffe, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(r0, 0xb, &(0x7f0000000000)={0x8001, 0x6}, &(0x7f0000000400)) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0x4, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0xd2, 0x3, 0xee, 0x0, 0xd6e, 0x20, 0xa, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040)}, 0x400, 0x2, 0xfffffffc, 0x1, 0x3, 0x3ff, 0x101, 0x0, 0x5, 0x0, 0x3}, r0, 0x0, r1, 0x11) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x5e033, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x2132, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 17:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 17:22:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 17:22:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 17:22:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 17:22:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) [ 1595.191551] ------------[ cut here ]------------ [ 1595.192502] WARNING: CPU: 0 PID: 9939 at include/linux/fs.h:525 hugetlb_split+0x320/0xc50 [ 1595.193674] Modules linked in: [ 1595.194132] CPU: 0 PID: 9939 Comm: syz-executor.1 Not tainted 5.10.239 #1 [ 1595.194989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.196044] RIP: 0010:hugetlb_split+0x320/0xc50 [ 1595.196635] Code: 00 00 31 f6 48 81 c7 e0 00 00 00 e8 4a cb 7c 02 31 ff 41 89 c6 89 c6 e8 3e d9 d5 ff 45 85 f6 0f 85 5e fe ff ff e8 e0 df d5 ff <0f> 0b e9 52 fe ff ff e8 d4 df d5 ff 48 8d 43 50 48 89 c2 48 89 44 [ 1595.198838] RSP: 0018:ffff88800c8af9a8 EFLAGS: 00010212 [ 1595.199506] RAX: 00000000000001bd RBX: ffff888009b6b000 RCX: ffffc90001bfd000 [ 1595.200416] RDX: 0000000000040000 RSI: ffffffff816af0e0 RDI: 0000000000000005 [ 1595.201316] RBP: 0000000020400000 R08: 0000000000000000 R09: ffff88800d5a95bf [ 1595.202225] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11001915f3e [ 1595.203275] R13: ffffffff856799bc R14: 0000000000000000 R15: 0000000000000001 [ 1595.205103] FS: 00007feb90213700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1595.207592] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1595.209671] CR2: 00007fec1f5028e0 CR3: 0000000019f98000 CR4: 0000000000350ef0 [ 1595.212076] Call Trace: [ 1595.212861] ? follow_hugetlb_page+0x10c0/0x10c0 [ 1595.214021] ? vm_area_alloc+0x110/0x110 [ 1595.214638] __vma_adjust+0xbe8/0x2510 [ 1595.215347] ? anon_vma_clone+0x3d0/0x590 [ 1595.215829] __split_vma+0x41a/0x4e0 [ 1595.216371] __do_munmap+0xfae/0x1260 [ 1595.216843] ? mmap_region+0x1d6/0x1500 [ 1595.217401] mmap_region+0x7c8/0x1500 [ 1595.218008] do_mmap+0xcdb/0x11e0 [ 1595.218418] vm_mmap_pgoff+0x198/0x1f0 [ 1595.218970] ? randomize_page+0xb0/0xb0 [ 1595.219471] ? setup_APIC_eilvt+0x2f0/0x2f0 [ 1595.220018] ? clockevents_program_event+0x131/0x360 [ 1595.220692] ? tick_program_event+0xa8/0x140 [ 1595.221282] ksys_mmap_pgoff+0xde/0x560 [ 1595.221802] ? find_mergeable_anon_vma+0x250/0x250 [ 1595.222441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.223142] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.223795] do_syscall_64+0x33/0x40 [ 1595.224305] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.224983] RIP: 0033:0x7feb92c9db19 [ 1595.225434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.227611] RSP: 002b:00007feb90213188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1595.228562] RAX: ffffffffffffffda RBX: 00007feb92db0f60 RCX: 00007feb92c9db19 [ 1595.229451] RDX: 0000000000000000 RSI: 0000000000400000 RDI: 0000000020000000 [ 1595.230321] RBP: 00007feb92cf7f6d R08: ffffffffffffffff R09: 0000000000000000 [ 1595.231199] R10: 0000000000002132 R11: 0000000000000246 R12: 0000000000000000 [ 1595.232110] R13: 00007ffdf739472f R14: 00007feb90213300 R15: 0000000000022000 [ 1595.233070] irq event stamp: 2307 [ 1595.233477] hardirqs last enabled at (2315): [] console_unlock+0x92d/0xb40 [ 1595.234497] hardirqs last disabled at (2328): [] sysvec_apic_timer_interrupt+0xb/0xa0 [ 1595.235667] softirqs last enabled at (1392): [] asm_call_irq_on_stack+0x12/0x20 [ 1595.236787] softirqs last disabled at (1309): [] asm_call_irq_on_stack+0x12/0x20 [ 1595.237900] ---[ end trace 8fb07234c8bc0e0d ]--- [ 1595.238558] ------------[ cut here ]------------ [ 1595.239151] WARNING: CPU: 0 PID: 9939 at include/linux/fs.h:525 hugetlb_split+0x320/0xc50 [ 1595.240151] Modules linked in: [ 1595.240610] CPU: 0 PID: 9939 Comm: syz-executor.1 Tainted: G W 5.10.239 #1 [ 1595.241598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.242653] RIP: 0010:hugetlb_split+0x320/0xc50 [ 1595.243254] Code: 00 00 31 f6 48 81 c7 e0 00 00 00 e8 4a cb 7c 02 31 ff 41 89 c6 89 c6 e8 3e d9 d5 ff 45 85 f6 0f 85 5e fe ff ff e8 e0 df d5 ff <0f> 0b e9 52 fe ff ff e8 d4 df d5 ff 48 8d 43 50 48 89 c2 48 89 44 [ 1595.245412] RSP: 0018:ffff88800c8af9a8 EFLAGS: 00010212 [ 1595.246110] RAX: 000000000001d1f8 RBX: ffff888009b6b000 RCX: ffffc90001bfd000 [ 1595.246960] RDX: 0000000000040000 RSI: ffffffff816af0e0 RDI: 0000000000000005 [ 1595.247831] RBP: 0000000020800000 R08: 0000000000000000 R09: ffff88800d5a95bf [ 1595.248690] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11001915f3e [ 1595.249559] R13: ffffffff856799bc R14: 0000000000000000 R15: 0000000000000001 [ 1595.250461] FS: 00007feb90213700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1595.251442] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1595.252159] CR2: 00007fec1f5028e0 CR3: 0000000019f98000 CR4: 0000000000350ef0 [ 1595.253086] Call Trace: [ 1595.253420] ? follow_hugetlb_page+0x10c0/0x10c0 [ 1595.254087] ? vm_area_alloc+0x110/0x110 [ 1595.254575] __vma_adjust+0xbf3/0x2510 [ 1595.255128] ? anon_vma_clone+0x3d0/0x590 [ 1595.255632] __split_vma+0x41a/0x4e0 [ 1595.256130] __do_munmap+0xfae/0x1260 [ 1595.256643] ? mmap_region+0x1d6/0x1500 [ 1595.257151] mmap_region+0x7c8/0x1500 [ 1595.257680] do_mmap+0xcdb/0x11e0 [ 1595.258171] vm_mmap_pgoff+0x198/0x1f0 [ 1595.258663] ? randomize_page+0xb0/0xb0 [ 1595.259176] ? setup_APIC_eilvt+0x2f0/0x2f0 [ 1595.259726] ? clockevents_program_event+0x131/0x360 [ 1595.260393] ? tick_program_event+0xa8/0x140 [ 1595.260994] ksys_mmap_pgoff+0xde/0x560 [ 1595.261496] ? find_mergeable_anon_vma+0x250/0x250 [ 1595.262140] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.262807] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.263472] do_syscall_64+0x33/0x40 [ 1595.263977] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.264600] RIP: 0033:0x7feb92c9db19 [ 1595.265056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.267181] RSP: 002b:00007feb90213188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1595.268151] RAX: ffffffffffffffda RBX: 00007feb92db0f60 RCX: 00007feb92c9db19 [ 1595.269041] RDX: 0000000000000000 RSI: 0000000000400000 RDI: 0000000020000000 [ 1595.269942] RBP: 00007feb92cf7f6d R08: ffffffffffffffff R09: 0000000000000000 [ 1595.270794] R10: 0000000000002132 R11: 0000000000000246 R12: 0000000000000000 [ 1595.271641] R13: 00007ffdf739472f R14: 00007feb90213300 R15: 0000000000022000 [ 1595.272587] irq event stamp: 3329 [ 1595.273020] hardirqs last enabled at (3341): [] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1595.274219] hardirqs last disabled at (3362): [] sysvec_apic_timer_interrupt+0xb/0xa0 [ 1595.275358] softirqs last enabled at (1392): [] asm_call_irq_on_stack+0x12/0x20 [ 1595.276449] softirqs last disabled at (1309): [] asm_call_irq_on_stack+0x12/0x20 [ 1595.277545] ---[ end trace 8fb07234c8bc0e0e ]--- [ 1595.291390] FAULT_INJECTION: forcing a failure. [ 1595.291390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1595.294536] CPU: 1 PID: 9928 Comm: syz-executor.2 Tainted: G W 5.10.239 #1 [ 1595.296530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.298552] Call Trace: [ 1595.299202] dump_stack+0x107/0x167 [ 1595.300092] should_fail.cold+0x5/0xa [ 1595.301034] _copy_from_user+0x2e/0x1b0 [ 1595.302012] kstrtouint_from_user+0xbd/0x220 [ 1595.303087] ? kstrtou8_from_user+0x210/0x210 [ 1595.304192] ? lock_acquire+0x197/0x470 [ 1595.305155] ? ksys_write+0x12d/0x260 [ 1595.306111] proc_fail_nth_write+0x78/0x220 [ 1595.307147] ? proc_task_getattr+0x1f0/0x1f0 [ 1595.308218] ? proc_task_getattr+0x1f0/0x1f0 [ 1595.309274] vfs_write+0x29a/0xb10 [ 1595.310141] ksys_write+0x12d/0x260 [ 1595.311023] ? __ia32_sys_read+0xb0/0xb0 [ 1595.312011] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.313276] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.314519] do_syscall_64+0x33/0x40 [ 1595.315423] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.316660] RIP: 0033:0x7f00802cf5ff [ 1595.317560] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1595.322001] RSP: 002b:00007f007d892170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1595.323824] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f00802cf5ff [ 1595.325545] RDX: 0000000000000001 RSI: 00007f007d8921e0 RDI: 0000000000000006 [ 1595.327249] RBP: 00007f007d8921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1595.328942] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1595.330649] R13: 00007ffc545ab58f R14: 00007f007d892300 R15: 0000000000022000 17:22:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 17:22:30 executing program 3: restart_syscall() unshare(0x8000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/212, 0xd4}, {0x0}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000480)=""/117, 0x75}, {&(0x7f0000000500)=""/229, 0xe5}], 0x5}, 0xffffffff}], 0x1, 0x21, &(0x7f0000000900)={0x0, 0x3938700}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000040)='./file0\x00', 0x2, 0x103) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x68) 17:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1'}, 0xb) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug=0x0000000000000007,posixacl,cache=loose,uid<', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f6f7023002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c39b1911a4d17fd702e5f657c600c8f61432b2944f59f61cff8bb7a30bee9db5287fc863d5b33370669069bf4"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:22:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8004000000000000) [ 1595.455006] ------------[ cut here ]------------ [ 1595.455622] WARNING: CPU: 0 PID: 9939 at include/linux/fs.h:525 hugetlb_split+0x320/0xc50 [ 1595.456576] Modules linked in: [ 1595.456987] CPU: 0 PID: 9939 Comm: syz-executor.1 Tainted: G W 5.10.239 #1 [ 1595.457936] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.458897] RIP: 0010:hugetlb_split+0x320/0xc50 [ 1595.459431] Code: 00 00 31 f6 48 81 c7 e0 00 00 00 e8 4a cb 7c 02 31 ff 41 89 c6 89 c6 e8 3e d9 d5 ff 45 85 f6 0f 85 5e fe ff ff e8 e0 df d5 ff <0f> 0b e9 52 fe ff ff e8 d4 df d5 ff 48 8d 43 50 48 89 c2 48 89 44 [ 1595.461533] RSP: 0018:ffff88800c8af9a8 EFLAGS: 00010212 [ 1595.462157] RAX: 0000000000000176 RBX: ffff88800f9be500 RCX: ffffc90001bfd000 [ 1595.462985] RDX: 0000000000040000 RSI: ffffffff816af0e0 RDI: 0000000000000005 [ 1595.463797] RBP: 0000000020400000 R08: 0000000000000000 R09: ffff88800d5a95bf [ 1595.464627] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11001915f3e [ 1595.465453] R13: ffffffff856799bc R14: 0000000000000000 R15: 0000000000000001 [ 1595.466291] FS: 00007feb90213700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1595.467236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1595.467910] CR2: 00007efe878a3478 CR3: 0000000019f98000 CR4: 0000000000350ef0 [ 1595.468709] Call Trace: [ 1595.469036] ? follow_hugetlb_page+0x10c0/0x10c0 [ 1595.469593] ? vm_area_alloc+0x110/0x110 [ 1595.470074] __vma_adjust+0xbe8/0x2510 [ 1595.470522] ? anon_vma_clone+0x3d0/0x590 [ 1595.471015] __split_vma+0x41a/0x4e0 [ 1595.471440] __do_munmap+0xfae/0x1260 [ 1595.471889] ? arch_get_unmapped_area+0x450/0x450 [ 1595.472437] ? lock_release+0x680/0x680 [ 1595.472914] mmap_region+0x7c8/0x1500 [ 1595.473353] do_mmap+0xcdb/0x11e0 [ 1595.473757] vm_mmap_pgoff+0x198/0x1f0 [ 1595.474216] ? randomize_page+0xb0/0xb0 [ 1595.474668] ? trace_hardirqs_off+0x6e/0x160 [ 1595.475192] ksys_mmap_pgoff+0xde/0x560 [ 1595.475646] ? find_mergeable_anon_vma+0x250/0x250 [ 1595.476248] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.476845] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.477445] do_syscall_64+0x33/0x40 [ 1595.477897] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.478478] RIP: 0033:0x7feb92c9db19 [ 1595.478916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.481021] RSP: 002b:00007feb90213188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1595.481922] RAX: ffffffffffffffda RBX: 00007feb92db0f60 RCX: 00007feb92c9db19 [ 1595.482725] RDX: 0000000000000000 RSI: 0000000000400000 RDI: 0000000020000000 [ 1595.483546] RBP: 00007feb92cf7f6d R08: ffffffffffffffff R09: 0000000000000000 [ 1595.484368] R10: 0000000000002132 R11: 0000000000000246 R12: 0000000000000000 [ 1595.485197] R13: 00007ffdf739472f R14: 00007feb90213300 R15: 0000000000022000 [ 1595.486047] irq event stamp: 4719 [ 1595.486443] hardirqs last enabled at (4727): [] console_unlock+0x92d/0xb40 [ 1595.487428] hardirqs last disabled at (4736): [] console_unlock+0x839/0xb40 [ 1595.488409] softirqs last enabled at (4282): [] asm_call_irq_on_stack+0x12/0x20 [ 1595.489440] softirqs last disabled at (4167): [] asm_call_irq_on_stack+0x12/0x20 [ 1595.490481] ---[ end trace 8fb07234c8bc0e0f ]--- [ 1595.491068] ------------[ cut here ]------------ [ 1595.491611] WARNING: CPU: 0 PID: 9939 at include/linux/fs.h:525 hugetlb_split+0x320/0xc50 [ 1595.492545] Modules linked in: [ 1595.492934] CPU: 0 PID: 9939 Comm: syz-executor.1 Tainted: G W 5.10.239 #1 [ 1595.493878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.494833] RIP: 0010:hugetlb_split+0x320/0xc50 [ 1595.495375] Code: 00 00 31 f6 48 81 c7 e0 00 00 00 e8 4a cb 7c 02 31 ff 41 89 c6 89 c6 e8 3e d9 d5 ff 45 85 f6 0f 85 5e fe ff ff e8 e0 df d5 ff <0f> 0b e9 52 fe ff ff e8 d4 df d5 ff 48 8d 43 50 48 89 c2 48 89 44 [ 1595.497467] RSP: 0018:ffff88800c8af9a8 EFLAGS: 00010216 [ 1595.498100] RAX: 0000000000019915 RBX: ffff88800f9be500 RCX: ffffc90001bfd000 [ 1595.498935] RDX: 0000000000040000 RSI: ffffffff816af0e0 RDI: 0000000000000005 [ 1595.499739] RBP: 0000000020800000 R08: 0000000000000000 R09: ffff88800d5a95bf [ 1595.500560] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11001915f3e [ 1595.501383] R13: ffffffff856799bc R14: 0000000000000000 R15: 0000000000000001 [ 1595.502220] FS: 00007feb90213700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1595.503166] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1595.503830] CR2: 00007efe878a3478 CR3: 0000000019f98000 CR4: 0000000000350ef0 [ 1595.504653] Call Trace: [ 1595.504979] ? follow_hugetlb_page+0x10c0/0x10c0 [ 1595.505531] ? vm_area_alloc+0x110/0x110 [ 1595.506015] __vma_adjust+0xbf3/0x2510 [ 1595.506463] ? anon_vma_clone+0x3d0/0x590 [ 1595.506958] __split_vma+0x41a/0x4e0 [ 1595.507379] __do_munmap+0xfae/0x1260 [ 1595.507810] ? arch_get_unmapped_area+0x450/0x450 [ 1595.508374] ? lock_release+0x680/0x680 [ 1595.508823] mmap_region+0x7c8/0x1500 [ 1595.509279] do_mmap+0xcdb/0x11e0 [ 1595.509684] vm_mmap_pgoff+0x198/0x1f0 [ 1595.510148] ? randomize_page+0xb0/0xb0 [ 1595.510600] ? trace_hardirqs_off+0x6e/0x160 [ 1595.511124] ksys_mmap_pgoff+0xde/0x560 [ 1595.511578] ? find_mergeable_anon_vma+0x250/0x250 [ 1595.512151] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.512742] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.513342] do_syscall_64+0x33/0x40 [ 1595.513775] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.514371] RIP: 0033:0x7feb92c9db19 [ 1595.514794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.516882] RSP: 002b:00007feb90213188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1595.517745] RAX: ffffffffffffffda RBX: 00007feb92db0f60 RCX: 00007feb92c9db19 [ 1595.518572] RDX: 0000000000000000 RSI: 0000000000400000 RDI: 0000000020000000 [ 1595.519409] RBP: 00007feb92cf7f6d R08: ffffffffffffffff R09: 0000000000000000 [ 1595.520231] R10: 0000000000002132 R11: 0000000000000246 R12: 0000000000000000 [ 1595.521072] R13: 00007ffdf739472f R14: 00007feb90213300 R15: 0000000000022000 [ 1595.522597] irq event stamp: 5211 [ 1595.523547] hardirqs last enabled at (5221): [] console_unlock+0x92d/0xb40 [ 1595.525764] hardirqs last disabled at (5230): [] console_unlock+0x839/0xb40 [ 1595.527748] softirqs last enabled at (4282): [] asm_call_irq_on_stack+0x12/0x20 [ 1595.529666] softirqs last disabled at (4167): [] asm_call_irq_on_stack+0x12/0x20 [ 1595.531575] ---[ end trace 8fb07234c8bc0e10 ]--- 17:22:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 17:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 17:22:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) VM DIAGNOSIS: 17:22:30 Registers: info registers vcpu 0 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822e27c1 RDI=ffffffff879f5140 RBP=ffffffff879f5100 RSP=ffff88800c8af3b8 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000030 R13=0000000000000030 R14=ffffffff879f5100 R15=dffffc0000000000 RIP=ffffffff822e2818 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007feb90213700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fec1f5028e0 CR3=0000000019f98000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffff00000000000000000000 XMM01=23232323232323232323232323232323 XMM02=ffffffffffffffffffffffffffffffff XMM03=00000000000000000000000000000000 XMM04=ffffffffffff00000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffed1001e7fe58 RBX=0000000000000005 RCX=ffffffff829c9535 RDX=0000000000000005 RSI=00000000000001a0 RDI=ffff88800f3ff148 RBP=ffffed1001e7fe29 RSP=ffff88800f58f728 R8 =0000000000000001 R9 =ffff88800f3ff2e7 R10=ffffed1001e7fe5c R11=0000000000000000 R12=0000000000000007 R13=0000000000000000 R14=ffff88800f3ff110 R15=ffff88800f3ff220 RIP=ffffffff816cdd8b RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f58f192b010 CR3=0000000043d14000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000