, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) (fail_nth: 2) 13:06:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000880), &(0x7f00000008c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="736d61636bd2987e65b2cd727221823e532d686673726f6f290a2b2c00"]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)={0x77359400}}, 0x6) [ 707.953403] FAULT_INJECTION: forcing a failure. [ 707.953403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 707.954733] CPU: 0 PID: 6010 Comm: syz-executor.5 Not tainted 6.2.0-rc1-next-20221226 #1 [ 707.955547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 707.956368] Call Trace: [ 707.956642] [ 707.956892] dump_stack_lvl+0x8f/0xb7 [ 707.957318] should_fail_ex.cold+0x5/0xa [ 707.957770] _copy_to_user+0x2e/0x150 [ 707.958175] simple_read_from_buffer+0xd0/0x170 [ 707.958696] proc_fail_nth_read+0x19c/0x230 [ 707.959151] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 707.959661] ? security_file_permission+0xb5/0xe0 [ 707.960179] vfs_read+0x257/0x940 [ 707.960576] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 707.961099] ? __pfx_vfs_read+0x10/0x10 [ 707.961543] ? __fget_files+0x270/0x450 [ 707.962014] ksys_read+0x12b/0x260 [ 707.962417] ? __pfx_ksys_read+0x10/0x10 [ 707.962845] ? syscall_enter_from_user_mode+0x21/0x50 [ 707.963371] ? syscall_enter_from_user_mode+0x21/0x50 [ 707.963915] do_syscall_64+0x3f/0x90 [ 707.964327] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 707.964857] RIP: 0033:0x7f629f0b769c [ 707.965252] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 707.966976] RSP: 002b:00007f629c67a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 707.967727] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f629f0b769c [ 707.968421] RDX: 000000000000000f RSI: 00007f629c67a1e0 RDI: 0000000000000004 [ 707.969134] RBP: 00007f629c67a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.969851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 707.970553] R13: 00007ffe3cb201ff R14: 00007f629c67a300 R15: 0000000000022000 [ 707.971309] 13:06:12 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:06:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xc000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:06:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:06:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000b80)={0x8f0, r1, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_CSA_IES={0x58, 0xb9, 0x0, 0x1, [@beacon_params=[@NL80211_ATTR_IE_ASSOC_RESP={0x20, 0x80, [@ht={0x2d, 0x1a, {0x2, 0x0, 0x0, 0x0, {0x2, 0x50, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x6, 0x3, 0x5}}]}], @NL80211_ATTR_CSA_C_OFF_PRESP={0x8, 0xbb, [0x20, 0x20]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0xe, 0xba, [0x60, 0x9, 0x3, 0x40, 0x6]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0x8, 0xba, [0x1, 0x3]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x12, 0xbb, [0xffff, 0x3, 0x80, 0x3, 0x4, 0xa2dd, 0x2]}]}, @NL80211_ATTR_CSA_IES={0x80c, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x14, 0xbb, [0xffff, 0x3250, 0x45de, 0x100, 0x3a34, 0x4, 0xa5c0, 0x6]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x8, 0xbb, [0x4, 0x3]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0xa, 0xba, [0x0, 0x6, 0x28ab]}, @beacon_params=[@NL80211_ATTR_IE={0x1f9, 0x2a, [@peer_mgmt={0x75, 0x16, {0x0, 0x6c3, @val=0x200, @void, @val="9f00400f36a669e87fcbc8477280986c"}}, @perr={0x84, 0xc8, {0x8, 0xc, [@not_ext={{}, @broadcast, 0x34, "", 0x29}, @ext={{}, @device_b, 0x36d3, @device_b, 0x22}, @ext={{}, @device_b, 0xb9, @device_a, 0x1}, @not_ext={{}, @broadcast, 0x0, "", 0x38}, @not_ext={{}, @device_a, 0x7f, "", 0x3b}, @not_ext={{}, @device_b, 0x7, "", 0xc}, @not_ext={{}, @broadcast, 0x4, "", 0x28}, @ext={{}, @device_a, 0x7fffffff, @device_a, 0xb}, @ext={{}, @device_a, 0x8fb1, @device_b, 0xd}, @ext={{}, @device_b, 0x9, @broadcast, 0x29}, @ext={{}, @device_b, 0x1, @device_a, 0x20}, @ext={{}, @device_a, 0x7, @device_a, 0x1e}]}}, @challenge={0x10, 0x1, 0xb2}, @ht={0x2d, 0x1a, {0x4000, 0x0, 0x3, 0x0, {0x4, 0xff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, 0x6, 0x20, 0x3}}, @ht={0x2d, 0x1a, {0x2, 0x3, 0x4, 0x0, {0x5, 0x1f, 0x0, 0x3, 0x0, 0x1, 0x1, 0x3, 0x1}, 0x1, 0x5, 0x7f}}, @measure_req={0x26, 0x50, {0x20, 0x13, 0x2, "e1a7d9afc5104529f4f75c65854ef95f3b5ba9ba337232ea9d6365d91ccd0ef8658dd6f53b9ef94d31387a6b349e6a8b7d46de8ad4af3633284776b02c0ae19a3d7b3022af36d0ea2931e1f9b0"}}, @preq={0x82, 0x62, @ext={{}, 0x8, 0xbf, 0x81, @broadcast, 0x7, @device_a, 0x9, 0x20, 0x6, [{{}, @broadcast, 0x5}, {{}, @device_a, 0x7fff}, {{}, @device_a, 0x7ff}, {{}, @broadcast, 0x7f}, {{}, @broadcast, 0x7}, {{0x1, 0x0, 0x1}, @device_b, 0x6}]}}, @ht={0x2d, 0x1a, {0x1, 0x0, 0x4, 0x0, {0x6, 0x9, 0x0, 0x9, 0x0, 0x1, 0x1}, 0x300, 0x1, 0x1}}, @peer_mgmt={0x75, 0x4, {0x1, 0xff80, @void, @void, @void}}]}, @NL80211_ATTR_IE_PROBE_RESP={0xc, 0x7f, [@mesh_id={0x72, 0x6}]}, @NL80211_ATTR_IE={0x1d, 0x2a, [@mesh_id={0x72, 0x6}, @supported_rates, @ibss={0x6, 0x2, 0x5}, @sec_chan_ofs={0x3e, 0x1, 0x1}, @channel_switch={0x25, 0x3, {0x1, 0x80, 0x1}}, @challenge={0x10, 0x1, 0x6e}]}, @NL80211_ATTR_BEACON_TAIL={0xf4, 0xf, [@mesh_config={0x71, 0x7, {0xffffffffffffffff, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x5, 0x9}}, @erp={0x2a, 0x1, {0x1, 0x1, 0x1}}, @tim={0x5, 0xbc, {0x0, 0xdb, 0x7, "85d083ecdef039b4616b0f2ddb4f620d5c20e75b9bff462c3f2ef7dfde457322b7f2547a089b45890115cd426561b129a44ebe8106a6f56e202b851419407f2fe05cfa1e833a4600668e3dae4f29b587ccc594b8b462059d310e38d2df22e5c3a622e2337829eb3d5749bdfd4c87a481647d3259421967e8db7f4be46ae01bc52f7879ace6ca312f343be8bc4b000c2f4d967c0f642651753044568a0cf22d0d8c90b9e8bd74e54f60b593c555fb4ff85e9de4dcb69e804be0"}}, @link_id={0x65, 0x12, {@random="7ae074587f95", @device_b}}, @mic={0x8c, 0x10, {0xa89, "6136a255e73f", @short="db0fea7cea911b46"}}]}], @beacon_params=[@NL80211_ATTR_IE={0x42, 0x2a, [@sec_chan_ofs={0x3e, 0x1}, @erp={0x2a, 0x1, {0x0, 0x0, 0x1}}, @prep={0x83, 0x1f, @not_ext={{}, 0xdc, 0x5, @broadcast, 0xffffffff, "", 0x8, 0x668000, @broadcast, 0x8a}}, @rann={0x7e, 0x15, {{0x1, 0x31}, 0x80, 0x6, @device_b, 0x7, 0x8e0, 0x8001}}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x175, 0x80, [@measure_req={0x26, 0xf4, {0xe8, 0x2, 0x1, "f256ad9db188ad6496162861a5c12661080ae5079c6a42e7dfde304d85f526a29e9e316c7a390ab6a2f904da4cf39ac48ea0f43a8d03b8e291d04f3d25f40fbb05265be41db6b945693cf1b4b7634ae63c465e123ec5ce9f33a99195dde641c2519cb6f941d565a3afeacc5c7e5a517bb49d82793e64210f766b6991f0130986d691ada09edf6ebfe302ceef38bf42ccf29c937fa8dfe3616dfe38123c95f99cdca5c339c29497c59bf4a68ae40a7e2fc411435c0c68dc3a9e67f0eb704c2043b2d11c0ff7c41a51923ae9d8a4309b182dee7ffe72a81cd5489051219fe7da1f5b6e1906a9876f15165e633ee1bb98d5d3"}}, @fast_bss_trans={0x37, 0x79, {0x3, 0x2, "91a38d029976b3fbe88f728e080f2548", "b30cd37c13aa490117ba24f3ee972bf5a40b23d78bac58a489a2103855000ab6", "a6d17ffb2b8bfd7351b7098841899b1d504b5b6589f34266bd80c3de870f0417", [{0x2, 0x1f, "c186afb203ebee67a0c4906c81df35880e29dc7948c75c8880152fa5279f97"}, {0x3, 0x4, "88a28b73"}]}}]}, @NL80211_ATTR_IE={0x14, 0x2a, [@ssid={0x0, 0x6, @default_ibss_ssid}, @mesh_chsw={0x76, 0x6, {0x3, 0x72, 0x34, 0x7}}]}, @NL80211_ATTR_FTM_RESPONDER={0x138, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x47, 0x2, "ce2477958be101af9540b6ae292547e6b2f3a7638800f5ccfa5bc90bd4cd1761b435565ff14af3a20717bfe7f8095b2b96269fc4746630d2750c86598c46457acdb4be"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x41, 0x3, "4eef5da00cd5330cb6814756c5c8bb28b49d0e9e27253393539790a7cb7c90afbd4620266d093f35a3bfc0b86abdd62cc5118c46d3a837d3c6d5234f7c"}, @NL80211_FTM_RESP_ATTR_LCI={0x83, 0x2, "e7551d2e4a3b14a28835de4568da89a9bed78dd299d15d9e2bd3970d1518f6094b2c49fbc6c5fa76bbab222c70d865f3f84da860fbae69bf14b85cafd29fea66fbb9ed8f68afde4291d7bf71a8b38eeafe9f3cc10241851c43d4e4d5b42bb80c5cef473f1d43a1bc9000f86fc5fe74f7d82463793d2afeb00d3ee3bf358f79"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x1c, 0x3, "34c7267f583d800ae6bb6a4bab9f864ad4031ecef191e5e0"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_BEACON_TAIL={0x1a1, 0xf, [@random_vendor={0xdd, 0xc2, "848b89030a7a870dc3ac796c686ea962fe507f080f657a59e4959dfdedbc7db36ee469e19be8f01faf47b1390849f84fdfbb371df8ada429ca91a421c14ad5740fa56c7be8527807500a8c5dbe06e56cfb60da52bf42dcec82b3bbbcf2bd9dee4ff85ca9405825df342cc3e1dfdf8d85914d491cdaa8f6a615c71c4b19e99409b4942d61b5eab8e80de7a1c73793b0f19f51f132030be7bebf1f6fbe4e0946bce5f7e5788ddc00964c1919480dc503da4663292f0368fe05e0225cf4dacb2036b8a5"}, @sec_chan_ofs={0x3e, 0x1, 0x1}, @random={0x8, 0x7a, "9cb5d0fa1d6086bf361b5c08fcec01072563ee67b8cc9a0aa50d564a6644666c7faa2829d54788c57fb0ade2e7397602bee9f7129476047e1921edba1cdca903be03e56288de345ba5fbc7239de226b2fd934d2c86fa053be645323da46aa7d9b6cb1cd5434b781fa414ab94d255cc1cf71ceb534f0c9573bd34"}, @mesh_chsw={0x76, 0x6, {0x9c, 0x64, 0x18, 0x1ff}}, @cf={0x4, 0x6, {0x5, 0xc0, 0x1, 0x4}}, @supported_rates={0x1, 0x5, [{0xb, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x1b}, {0x24}]}, @preq={0x82, 0x41, @ext={{}, 0x6, 0x9, 0x9f, @broadcast, 0x5, @broadcast, 0x8001, 0xff, 0x3, [{{0x1, 0x0, 0x1}, @device_a, 0x3f}, {{0x1}, @device_b, 0x7f}, {{0x1, 0x0, 0x1}, @device_a, 0xf4}]}}]}], @NL80211_ATTR_CSA_C_OFF_PRESP={0x16, 0xbb, [0x7, 0x4, 0x1000, 0x2, 0x1, 0x5, 0x401, 0x5, 0x6]}]}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x340}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xd}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4dce}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x200}], @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1ff}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2b}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}], @NL80211_ATTR_CSA_IES={0x20, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x14, 0xbb, [0x5, 0x4dc, 0x7, 0x7, 0x4a, 0x0, 0x1c, 0x5]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0x6, 0xba, [0xc99]}]}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x84}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0xf5}]}, 0x8f0}, 0x1, 0x0, 0x0, 0x20008085}, 0x4) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="030000000000000000007300000008000300", @ANYRES32=r4], 0x34}}, 0x0) 13:06:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) sendfile(r0, r0, 0x0, 0x100000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) recvmsg$unix(r2, &(0x7f0000001840)={&(0x7f00000001c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/45, 0x2d}, {&(0x7f0000001280)=""/246, 0xf6}, {&(0x7f0000001380)=""/32, 0x20}, {&(0x7f00000013c0)=""/205, 0xcd}, {&(0x7f00000014c0)=""/169, 0xa9}, {&(0x7f0000001580)=""/4, 0x4}, {&(0x7f00000015c0)=""/95, 0x5f}, {&(0x7f0000001640)=""/246, 0xf6}], 0x9, &(0x7f0000001800)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x40}, 0x40000000) mount$9p_xen(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', &(0x7f0000000180), 0x401, &(0x7f0000001880)={'trans=xen,', {[{@access_uid={'access', 0x3d, r4}}, {@loose}, {@mmap}, {@cache_mmap}, {@posixacl}, {@loose}, {@privport}, {@afid={'afid', 0x3d, 0xffff}}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) fallocate(r3, 0x0, 0x0, 0x87ffffc) 13:06:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xc03e, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:06:29 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:06:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) fcntl$getown(r0, 0x9) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000040)) 13:06:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x33fe0, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:06:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 725.382947] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure 13:06:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}], 0x0, &(0x7f0000013e00)=ANY=[@ANYBLOB]) 13:06:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) 13:06:29 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:06:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x34000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:06:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 725.630926] 9pnet: Could not find request transport: xen 13:06:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_mount_image$iso9660(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x7, 0x9, &(0x7f0000002780)=[{&(0x7f0000000280)="1e118de0270bd8f396c627bcb875e624d949cfcaf465ac9505ddaa34f26d9fa73d97f9a4318bcd1766548f8eefd3f300667722b3a465a207e29e7a44e9aeb40cfc774cc1cdc2c5ee234b38afb64503062b4888c6cdfc27c42a58c52bc58f93b3853ac2c842f66935a0eb79eb93b69d6c6e960f05836579a6549af3bae838560aa98c01e7f6effdb42714950208ef5de17a58a4726324c8f01cacf84543db600e8d3a252f640b5fd8feac386ae70f65bf5960e1e9e36670f02b21539d81c9c3fb20ff1bcd8f1efefbab3bc572f81a6f4b19797fcf62874f5971f5b361cb4213672994f8d74d99c2422944127d2108f8", 0xef}, {&(0x7f0000000380)="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", 0x1000, 0x2e}, {&(0x7f0000001380)="e901f66498cd44", 0x7, 0x1}, {&(0x7f00000013c0)="e4174fce79d64a2e50a0575f9678fc3fe083fc3046fbb0aa64411190cd38cadb7e52e71b67e15f5c2454707a6b5c1739176569b1b989b624f63fe312d0c732c9a3a571c19b8755f8f1b98aa156ace328640b4f0b4cfbeae884561ba39c4ca0a5c206c0cdb130afcba40da189f79149a26fc65daccb9267ece5b0e5a8d6d25ae516405abe241905bf9444ba0efbf7f2957e86efa2989a57f3c7ee5bcc27c81fcf5f24f0114cf195a4cd6a63d56344473f3d76", 0xb2, 0xc1}, {&(0x7f0000001480)="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", 0x1000, 0xfffffffffffffffc}, {&(0x7f0000002480)="4a940ea4e35e2ed14edb41d1bbd9d451f6d54304b6fd2f926d44099a281ef264daa05773dbb6cb02f1712033323b5d115070ad7d3dfc7a306113a90822caabcc0f3060bcf6b7b3a9e85f74b09d2b95659292f378", 0x54, 0x101}, {&(0x7f0000002500)="78ccaeef006825fb200224cd9a5e259bca56752f20a92091256aad1402b525c38ca042faf68a38ae78cb6765ed9e7746ba62494390d132a72bf77addd01dec46d313e5d37e9f60fb3afc37b07bb0674ac31ecbecfd64837c30a0ba3f9001e17629d71a39d151603bbb2dc052cf7b1764882d76638a14e366cf12712c4b03b5740739f98fe40b17d016c2b4a9ff04e3ce6975b19d04b09ada44be0c8b13455ddc19ad8e39dc7a8c10b3551c7277aae0", 0xaf, 0x98f7}, {&(0x7f00000025c0)="ce3c2ac3330c4c0802ce6680adda95336e9959a32d59d74bb43a342389fc104d94b98e1a8c291b34e5f016289d6ea05584f1769f5c2aedde0724626ccc3693e52a55725b3987e68cd52b857dc23c6ae9cf40c7326e9588cf2ae5636d29c9480180a12cfa4e86c7602b015e1c5eaf429e18ba6008fbda5fc163f2dbf06507b63520852ff7cee7a24acf78086bde57462206e5715a99c9e81c78a8cbaf923e2b66dcdd09f25c78d36039bd96b5a2478b9cafce16f7eb6f3a0532861702159e9ab4a89794ad3216d4c0ade5711554cdee6977", 0xd1, 0x8001}, {&(0x7f00000026c0)="b280a802f801e9ca51535ea5ec9d503669440577bef34fb3d3b149b3d82f7dba7a5d3fd9ed2abcffabe4f247c7f1a7b1df2b14c62e52e0c88e5e2cd9dcda378e5474ef6cb4c16efc397d6946692ce79a6f460b0fb9ecc68f93fc8aef88e2030f2b34324265913e74dcc96a511342299c32064f2a64653305974317125c3783aa6e89", 0x82, 0x7}], 0x40, &(0x7f0000002880)=ANY=[@ANYBLOB="6f76657272696474667c08dd616b38", @ANYRESHEX, @ANYBLOB=',uid=', @ANYRESHEX=0xee00, @ANYBLOB=',uid>', @ANYRESDEC=0xee01, @ANYBLOB=',defcontext=system_u,\x00']) sendfile(r0, r1, &(0x7f0000002900)=0x5, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd(r1, &(0x7f0000002940)={[0x6]}, 0x8) openat(r3, &(0x7f0000002980)='./file0\x00', 0x4000, 0x44) rename(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00') r4 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf9, 0x81, 0xa8, 0x1f, 0x0, 0x1f, 0x80500, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x1, 0x0, 0x1, 0x3, 0x0, 0x100, 0x8, 0x0, 0x9}, r4, 0x8, r2, 0x3) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) [ 725.737010] 9pnet: Could not find request transport: xen 13:06:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000150a05000000000000000000411fba57"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000200)={{0x0, 0x1000, 0x6, 0x5, 0x107, 0x1, 0xda9, 0x6, 0x7, 0x10001, 0x7ff, 0x2, 0x4, 0x200, 0x400}, 0x20, [0x0, 0x0, 0x0, 0x0]}) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:06:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsopen(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000004280)={0x0, 0x0, "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", "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"}) 13:06:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) truncate(&(0x7f0000002780)='./file1\x00', 0x0) r0 = socket$inet6(0xa, 0x5, 0x2) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x6) 13:06:50 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:06:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x40000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:06:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x80000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:06:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x1f, 0x6, 0x0, 0x6, 0xc004, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfff, 0x71}, 0x1000, 0x7fff, 0x53, 0x6, 0xfffffffffffffff8, 0x7fffffff, 0xcef, 0x0, 0x10001, 0x0, 0x8000}, r0, 0xc, 0xffffffffffffffff, 0x8) 13:06:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:06:50 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:08 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x3b, 0xc, 0x37, 0x13, 0x0, 0x9, 0x800, 0xd, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x2ff, 0x5}, 0x10, 0x7fff, 0x9, 0x6, 0x5, 0x3, 0x1, 0x0, 0x6, 0x0, 0x5}, 0x0, 0x6, r1, 0x2) r5 = getuid() fsetxattr$system_posix_acl(r3, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r4}, {0x2, 0x1, r5}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0x3f}, {0xffffffff}], r4}, 0x18, 0x0) epoll_create1(0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) lstat(&(0x7f0000000540)='./file1/file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r6, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r7}, {0x2, 0x1}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300), &(0x7f0000000340)=@v3={0x3000000, [{0x100, 0x400}, {0x9, 0x197}], r7}, 0x18, 0x0) openat(r2, &(0x7f0000000380)='./file1\x00', 0x4400, 0x100) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000005d80)=ANY=[@ANYBLOB="010008000100000018000000", @ANYRES32=r0, @ANYBLOB="050000000000000000"]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000240)={0x90000000}) mount(&(0x7f00000003c0)=@filename='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='hfs\x00', 0x2000010, 0x0) 13:07:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:08 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:08 executing program 5: capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7ff, 0xa, &(0x7f0000000780)=[{&(0x7f0000000180)="8e2429efd2303757f182663bf3fa49266d48020acaa859f10bd9ae724a141d2e1f3423a090493acfe595d795b155e13b52500ce91e06dbe1b820a1e0a88dfa", 0x3f, 0x10000}, {&(0x7f00000001c0)="9431c3dc421be776b3664e5d40a79835085090bfc381e9d671d0a06ed38224994defeae48cc77b1b642766c138b446b608b10a661a5b37f55f9def6828cbded14fdc4bb4523f4afa02fb9484d93952e8b8eebc3f3694d4aa4480cf45886f02628c6edc0ac84cdd29e21b421b10013d916b484c7e418553ec2793228168990885ea6a9836797b4e9cbffb70eff4698bde5489390666452601c6", 0x99, 0xff}, {&(0x7f0000000280)="380003c9afcca27af1438ac63aa51e13d5d6adfface406b7e5f40f08f9c2ae869ffb4f971d2b983e7d31aaee9506650f17b1bb38df8cd52e4659c0f5324c83fe37c3b0e7f92243ee432af36ffb1a2373dd8d1cf3c5e626510bcb85afa2f0f122d699f2fe856dca444f6172f10fbbd77dfe86fc4b91ad19d47feb6d9fa2b69023475122", 0x83, 0x515c}, {&(0x7f0000000340)="564ec21c9ed4897a331c6edcb7b940a729748a793833bdc86f670b1fd6de605b836a4714fc565900424e9c8e1f0b29a85ccdef4b737e22775f4323675899f564c486ccf46d287d3493e86a6b2288f38edf206cecf8baeb7e7d3fa4add77b9ff3023b6d4b7364781a0a9b432664593a27daf65c03cf9190aa1644661b49e23569f178a5da1929e4c294cb13e104735eb4", 0x90, 0x2}, {&(0x7f0000000400)="405dcb6d82d1208cdc7669e1290cda07f121ad096c221f727671", 0x1a, 0x7e}, {&(0x7f0000000440)="88084f20cab821f019b5fd5b311cfd703989d4cebc8ebf16cc57708fd4e8ce53851e942c8a24f5e9b748f09d3e1392f3332291aa48013e3db8f1814571fff61bde4a94c690ad8f3f96916640e9a7d21fcf19da568c0a262ee374717f10dccb", 0x5f, 0x7}, {&(0x7f00000004c0)="c8cb5532063381934afc75dcc79678f48d46478a2fe3cc0d6790abdc36b74032f8ec8cb2cc5c559448ffb1f7e97c324354ae6b58bbe944e25cf9aaa220683efb40ea87874830b04a1b6da8cd78b64deed04ef0c08abe5e7a159e201c60b741f31597359298a43bd52be589ee8b4c45c1d8cd826d26f653c6ddd7e623e24105c9fd2adcb6b4cca342d3804cd51bdaa576470f9f5aa55b76c7ed929cfdd5aefdc600aaafc7a4ada9effc04b4a53f13de763c5af01c7fac28d396efb4c4500e74daa294ed79561d73daa0b34794278dee39ab95e407df0ec8d6511024dd1026b0ae1055ee742a61d1462d3c759f3fc61214acc60346795f632d95", 0xf9, 0x9}, {&(0x7f00000005c0)="7e03bcff683666372ed70b8a3c85838b1b9e6447318ba14cd7995de7ced6524f718bcd43d5c191e5e2e77b187cd86dd156403daf6d54fa51c3d290cdb40e0d899117cb092d456477fecbd6615c60106870ca63bfba06f81fb2268c7eacd911d0581863ec16e3bfa0c8b22d3f288a5f9dc004e2a911ba1c9b184f4ce28780b10947a4c2ef96a42be6af484209abd5d0e4ea6917d5719f4a2082782e2451bacda8b2b45a13be1d75816230b8015710d5d8", 0xb0, 0x1}, {&(0x7f0000000680)="621ffe87757ccfefe1340946636ebc9eaad0b937aec3523917c36630715ed1a60d3619b4b36a65a28cbef1e1e700e9845a7c47", 0x33, 0x2}, {&(0x7f00000006c0)="751b527880a6b645c4bf0a7f3405c57c00a1aa7c609dcfa01e91456430c64b5b2d8e3c1f348ab3f5a0b6c7aa7974d3e755e4709f333f0bbcef9116d8908d2a7c4f8946c08801c03110df0d86fd11ecd1a4ef57fbcc7192eb6a23401933b8758c3c883e222fb80358b9f4f65ad833c5fd6af33c99431c2703531424ce9e169fa293d0e3f12631748f63f769bc588a4cb7af06664f649ac946355ebac405b8b2fd7dd8da8687e059eb6272ead010ce72f1600621ea65", 0xb5, 0xc7ff}], 0x3000410, &(0x7f0000000880)={[{@nodots}], [{@fsname={'fsname', 0x3d, '.*.-'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@obj_type={'obj_type', 0x3d, '-'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_lt={'uid<', 0xee00}}]}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x0, r1, 0x8) capget(&(0x7f0000000080)={0x20080522, r3}, &(0x7f00000000c0)={0x3ff, 0x6, 0x1c, 0x100, 0x3a, 0x7f}) openat(r0, &(0x7f0000000940)='./file0\x00', 0x24840, 0x182) 13:07:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0xed, 0x3, 0x7f, 0x43, 0x0, 0x9, 0x40000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp, 0x48, 0x3, 0x1ff, 0x7, 0x9, 0x2, 0x4, 0x0, 0x5e, 0x0, 0x5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8) io_setup(0x40, &(0x7f0000000240)=0x0) r3 = eventfd2(0x8001, 0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/timer_list\x00', 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, 0x0, 0x220) io_submit(r2, 0x6, &(0x7f0000000740)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1, r4, &(0x7f0000000200)="1de689dafc66b3fea26b26361d1abb56da153645c136de4b1e45ef9851c732f429921e1af74d6d227ffd24ae1830a7eaec6efc0bb3ce1b9e3b59afe878c017d1beb886f75ac24dfe029b9664b10161da7266685754cbe0ef36fc061dc32d4a208788ff098e0a91899f4f8d0a97d08fc4577c6d8948a4f92f9502608bb5c25659f98f727885fd3e15977ed1bd760000ed49787fbadb1d78f0", 0x98, 0x34e8, 0x0, 0x3, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x400, r0, &(0x7f00000003c0)="5f444e43e45619e3775e8951833aafb4daed9de6c9be39334c91ede15871dad562d87ead431e2c11825654bb2da8a8f43ef27c8555cbb456db092f542ececabc3c826db9c8a600be0348e61d2e5ed50a332ec5a308a6ba215da6989fbd64db76402cdacf3f56990a0adf7ac4c88f44d152fd328f66fb6949a0cc9699e58ffb3c2bb1b703f64e3b70cd71871f7ee2ab9d7719aa007c1da5fd2e0ed23afa3f57d1913687d4bb33eb6a99f183303d02555e8b2eb1b9646194bc4402ecd3b85d13d0aa27404397e73b3bd4ff625b5c7352fa104302a2f31e23b5a00653b01b55ee0d3b962f2f", 0xe4, 0x7, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x8b72, r0, &(0x7f0000000300)="57974c8d38546921688075e2a65c4ef89027e71695fe14779f95765966d96b0ff7cb03f65dbcd27ba35cff1983389ad34bc9ef3a91f7e361709f7382811618ff2b00fc6ef0ccea9c499dda19b8245440bbf7acc2a4e8b2677e815a41945639855e5dd81505", 0x65, 0x5, 0x0, 0x2, r5}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x6, 0x6, r0, &(0x7f0000000540)="eb5711f97a495f9c1a", 0x9, 0xfffffffffffffff7, 0x0, 0x3}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x2, r1, &(0x7f00000005c0)="2bd5687c923ca63170e8df", 0xb, 0x200, 0x0, 0x3, r6}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x1, 0x5, r7, &(0x7f0000000680)="e839fb984dc4e5200aec48deef5cf657dcb4d681119d1edfb1ee8d7a1d1906eee347f11f91c649467e3aa0f8ebf12d702cdea67691ed5dca345b2b41cb5f6677a47f6b5b7df9208cc6831ed5d1f9227b9e13222a3bbc0d6b7a7c3b0737eb9148af8fa6fd96445cccc48a7c58dcbcd95d93177c98dabaf5ca", 0x78, 0x9, 0x0, 0x0, r1}]) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000780)={'virt_wifi0\x00', @dev}) fallocate(r8, 0x0, 0x0, 0x87ffffc) 13:07:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x400300, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:07:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x1000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:07:08 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) fcntl$getown(r0, 0x9) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x3010000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:07:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) r2 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x80, 0xb4, 0x0, 0x1, 0x0, 0x1, 0x9, 0xe, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x0, 0x4, 0x5, 0x9, 0x5, 0x6, 0x0, 0xfffffff8, 0x0, 0x86c}, r1, 0x3, r0, 0x2) signalfd(r2, &(0x7f0000000240)={[0x5]}, 0x8) 13:07:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:08 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r0, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0xf, 0x0, "4a8ae298b7fc295b7e19752629decc909c8938c6ad714d683e04c97520650a75154e721c5906ad1832aaccb9b7ec38ca3f886a3d93200087bb419e5776bb1f97c81bc338c5dc39d299dd4988dc0173f4"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x5, 0x0, "f2d9f528b3710ff65d6647ff8507ffd7c713301d1b235210d82f9fb111b3f358554f4e80c6fb989cabdadb962f69fece9c56fd2b0a21d29aaeb1cbd983af95ebf751f73960426d35d639a489e0f22845"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000001500)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x42, 0x0, "ae41ba3d08ae79cbef4c72343e141dc83dd4a24a447556e055d70b3b61fd7929acb571c66cd984146d66ae44bb567da9a6e26c17246bf5ac5a0b74d1cfdbac75e919f15f27d44a1e807ff95985c6f996"}, 0xd8) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000080000000000000000", @ANYRES32]) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) r2 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x3f, 0x5, 0x3f, 0x9, 0x0, 0x1, 0x200, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001, 0x1}, 0x11580, 0x9, 0x5, 0x5, 0x401, 0x9, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0x8, r2, 0x0) getpid() creat(&(0x7f0000000000)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='?']}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x800, 0x80) open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x8000) 13:07:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:26 executing program 4: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) clone3(&(0x7f00000017c0)={0x12d00, 0x0, 0x0, 0x0, {0x1002}, 0x0, 0x0, 0x0, &(0x7f0000001780)}, 0x58) 13:07:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/217, 0xd9}, {&(0x7f0000000280)=""/62, 0x3e}, {&(0x7f00000002c0)=""/99, 0x63}, {&(0x7f0000000340)=""/70, 0x46}], 0x4, &(0x7f0000000400)=""/178, 0xb2}, 0x40}], 0x1, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:07:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x4000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:07:26 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:26 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x0, 0x1, 0x8, 0x0, 0xffffffff80000000, 0x68000, 0x7, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2807, 0x0, @perf_config_ext={0x7, 0xfffffffffffffffa}, 0x10002, 0x4, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, r0, 0x8) 13:07:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) fcntl$getown(r0, 0x9) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x11000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:07:26 executing program 4: r0 = memfd_secret(0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x9) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000001900)={{0x0, 0x0, 0xffffffffad63a9c6, 0x9, 0x25e, 0x8001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x6, 0x0, 0x1ab3}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000004280)={0x0, 0x0, "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", "66e27c686346d463a5c12d237acff4192845608625de3e00c853ba6db99bdca8ce66b5d2986a3601702f62b704cdf1e3e8815d60724498fe310408bbef0fa4ee3ab93e2eee10adaf7fe25c3cd174494fbb8a8475418e3fd56d207055d4494ed2a34025e9ca172f7ae5388fa786c085f18ce46a27afa2957e87d3e2b1f1a9686e690a558e6d89141d831349af2a8102e281678f33db2f14ff8aea9281aa22c5bfc275faab2882f156fd38cc76835e391932300a5685e3c0ba9187f12117683de169cb3105f334435db81135dd318868c59a2fb19cd813914557f472377ad23a9b4dff26a50cde18a3a6d50b6abb2aec25324123cc37fac8238d63cd0c78d67c9eff7c8a1523b44f3cd514bffa001e05d3180fa830c0f090c6c7cebd2ffaa9546c5be56c3861313c7614c3298fca09c4a8e931e04b6ef44c5000923637dea858cabb882cd5df1252ba30a4b6e02f151375e481b0456ff7c7f97e846951ec0c7fd223df82548aeaf9d920e7539304fde028bb3ba90ef4e6f5d9be225e0ba4fae5988a87adfcfc7e1368edf8170955966e7cbf83657568dd2b1a3c42f0cc20b9190260cc6536051ecca8ffcc02a86267bf5718ad3c0ab285fd41bfa1e7154b3c24e377685a43be2406514cddc45d02ca954ace3729e27c2d3efc154465c248d6438ebecd96af55b9959797b08fc7571f8e053648b30baa53851d16a5418de7bc9831c08bcecd33cfead167fb360b77961331abfcc8ae6c20a4f7277ac081012eac8e2318d32d3bfb4c8bf6a844d467d52d02bf7807bd9704a3ca7ad184cea56f7f459c76652fe48930ca276bceb95b648f042b54ec2af8da5f38e8648e9ca2aacf7a5760e9148b445b6dbbaca8e420e026a7188466a832c8ebc22dda550c2fe1a6ae8f700d41792be7660821d962d995ddcd19e7e72040947c446df6b40618f985a935feb15485168caafc997ec2416908d48de441a6c444f33ac96f22d7f2b13963983e960622e2ffe27a4f496ed5d02eb0c8e28f09e554a38e252e8eb5066b38ff5524c5966c904bc20f5ff48f444ab9c4f54e0171de6ab92082293139ea1cde517b30f4dc8d9ba98256e31cc5ec20d6ca62cbe254b0f3897b58581c4e73b5777cfddd02bbe3b07d5d085d57f20a69f446bdd4b4ab41cd40a38069e0bea6a2717b02e51d139cb0a84a9f863b3ff89195b186bf439c2aacacbe2ef5784690d7028f80b66a10df4716354da85e8fbba87ee78aff91a9041b0a233b79dba28d754d818c84bdc8d96f3fff86566a1f15f4898fe070bc7b35c57ce8f93f58b80a3160985646bdc732934fade924d6e31c2c6e6a2ae643214c4c100b2f66ea6acec03b2cb40f39cb91be1e13211c0327d4d2daf59e414d8bed18bbbe05d85aee69ba68b83875df8b87f8bc90863c38e34c74e8f882bb992e7397ab8704002c14485d4d19915b840690ab13b9ed84d294a0aa74f7feb73ba7618bdd69243ef8670110044e32bd0ea079b745d6591cb61f18090045b426c07ee922ad93a16e209fc94ef8b21454830a65d764d8530f3137dd35a8a7c3b6f1c86721cebeefe01322fc91c3553d558d766b147d14ba6400f0dca309ae8c4865d730c33f3eaf0e2a60be6736a1ff5d2dcca550a700cc7f4d4378bb780dfa934254cd7d39b9d00a250f8f9539260645a0a0056690a454c7f9b31c9a358bed4271b5a192cc371178c0798eeba7c6cb14face65a8bacbb7d74b0b4bf56853b01bb86c937c814bee762933087a816966ac82c6b7d57ec3dfdf3a33834688829f20952020043d29863a4251ddd21e1ef6340f1e450042a82082c36e7e5032dafdd201494b84e5dd290f5bc545d90d0c3695bd5d89616e58b86dadce382fc1cc30c2c7f3f41c456a05e8d2bc8b500855697abd2c0e34e4bdf296fd65ea8213ee0115c661741ef7e60185491b54bc8623d8b8927f6411a324a20ca50043d35c26211faa3e6af590d56cd7b274a55420078b8e034888aee0489b070035c9b3aef475b4086e9ae5f4286aac3df3e5e9367af217a7de0575c7d9400c4a1ea12447c0e549e2ca4db225be99cc0e898b1f29b642575350fdb7c719e070077b210cd231c55cbeffea70cbf5449279d8809977f4d86de391dcd27b08a258963e27910a62da2228b88c33be770337974565e4dfdec85de7c8b46fb1264e5d1e5e7e4c3c490439555c6b550b710e0bed922fb97de7ea379d9308699707f92c3630981fcfac4d8321ab76441f7330135c1689a1e8f941104e4fecb1adcba63dcc1f3173488b1003a930c3b9bce9bd1eab45c3379ba449851c560c88d8e46bd419eac6c8b485db145ff40a417ac8639a74a71147218ee32fc023f5afcce9f223f6ca7da699d52e4b0cec6b354182b6bca7c983c265c348f8be6e45febd48389be41b288d91fa30e3e00fffd334b7b9542e47af657a841673c04ddecbc6df239abcea2d94cdb6fea72f84d43cf677270bd0c6e358add28ff32963509271987591d5f294f8a671881bc2b00f158c4c13c76825d361b810a77ac32d1f1dd7123ffcebb3df9b70cc213912885a80a7c29e0ed6ac492512075dff08bb042521c2495a163987970d2d02a2a4310f8ab5867d23603eab1a893558d04a0080f408ff536b47df5c12238819d7306e532ada3406e98fa9f14f913ec02022ee310662dd6c818d2996f51299764bcf67daf26501f4c79a5fc4d3d5ea1b9972e856789933361069acd6d2145251ab22b4403b1ad1d1c5df811b86fc0350eb771b214ff23419b321914b97b067d90e5a338c3de5bfcd81b638d8afb06ab2c3634420a3f8d6c45f54721b0b8b9ba4c0b12b436ee14cb6d50e623e4d9c594402f0b732b584917e28409a79924c23879762c34944badb44b385bbdcca73998830f9c826d7efcd585ee509491a219e5a8a4510df44db71df4d8576d30951b224748a0f4021998832a68af8b91c57d8631cfff32bd01b6555c33396d2fe8ce69be63480048b9257de136187d0b57c64578089d70b3e6c0b36eab0acc43bf0ebe5019fe4de0551299224480df52e989678157c8e443c7870e85913bce314ddfcd014ded8d172f95f2e2af7327e9380236e3c44e82c76ecca479227f34dbecc55629ffa0f65ee07c10f9de410f563120d07f91c3bd5dd39b053c5f9e4c8e63bf9edf56567bb64225093e76b7d018c348c7e11b86d859b6c5c71380665b93c9a6fca64e4a7da0f589355aca08c09d823caa551ee5cec74383a4d26f2c45cdf55941b4506a7c1068cf27628ceae486dc4a47d6940f99c5a8fa82187a6946fc39f37111ad723dca523ff0b9c38b30ba0bf505a53f85f4c3699c193036d6e5066efe6cb8c7f4f859c6890f72bb5c78f796f15015e97449691d7a61e473935e889c524df1bada8f4e351ac07229e904834081225f78af96585c7f03869d191330835f69581d181b365ffc1cbfe939a53f142e09f7546ee6286f877828e69a24c08c8d8f3b915c4dd34753f358e7283057047e52d930d4e3a40230daa9e47d66086a2d22d29e84d4237bba531e0ee90dadb80b245bc5c4059216616172e462f51d6775025f0f90ee51fcfa26ddbe4dd38cd8feb1bed1925e2f5e02958352ebb1305dc73b51d6c10acdea852ee6eb73e5b0c462fa3767992e5a6c65a742d60a75df9d77767e0ad609c9431530875f9c1a0fb5f43f8c3451a927cd8dad51aff7600a7fa04524b0a2b14d0c818ead49de6019d8a767e2d50c9934077ad437de691910213f846fb27bd1b855e3004035183500a271fae242c8dedd05530f98d9871999ae72c86b007ca1bfe0dfa96c2618aae8be099139574fc51cfcb5584fe956598e0d8ddc6d4f54b79f5ddd78be4153a58c96c20587c9021024940ac29e63b36bff65c2ce7cd78ec538b69b531f2ac3d04f91d1be8aab72c8abaa8a3e5449cd2a4b7d850c623952db3538094410f60c5c2d1f9e68c69d92684d1ea163494ce329c0423f18b15fd7e14e9b6f0c73d46231f2512e36dd15941eee58ffb17e75380259706332409dd35f707f75a42e0aa623492855688204e33fc09f1a28b0fdbb3fd3a6b29a8dd6a202aea102e8675a6084f23719f5641a7f69f4d0b163edc98f9c55731a5bc84d512cf2033eed5122b2fff56a6906186f4c318aa2e7fb7aa98c046ef42383a8647083211cf61cd3140a41259eb417f7f0f5301b4c0a1fe0331b2f19d71ac2692e4fa99ba5fc2803bc524df07f5da3c5d188bdc519bfb1ec419fec31ded4b3b0625840553f548cec8762a090000822371c7dd721b7ba21e0284df453af0b29cb92b6b928a7c73a291dff0c4e69777c50d11f7b4acca0322abb2adce8ba9ed9fa12db65bfa1120a5a618d4a3e3ea5185996337bf37f7618e0e13a6aac2f8400c551f9b79a98ac0dc06782d5ba5494bf0814a37565d1e0f88890ffb38abe2aa47822f3452cbab5e7e70ed13818c268616c1024d150a146963b531ba0e2b9727bdc25253d5489ff985f51bf4060c86d51c3517bbb9957ba81b36b98928d7ce0e710ee7915849fd36f5b16b38bba6333afc80a0da850aeba47bcca8414c0d5e3d8d89ab2424caccab759bea324f7b14f0d9765b773b1167a34067cc5727f3003bd5631b34103b819fff70476908ea3d9b6f679313555a84efd6673a101e51f48f322b3ce2dc80151264808d326a25d4034811b67d3a5ddf007137f777d09dc45e4cbb588bed918356e738e60a763bab026a30c330009ba63b06e0ddd8ca000fd11efe85b6c229ec28533b4b18a0c7dde0eac482a955214d890578d81ce433f6106f85affd8ad7f2601ee84fd2cc32926f1420a8b3063de2e0f24ca28917a57eb19b13401637ccfadca6a9d951df200e04f9160440386544b6e1d875408c0d40aadff96a0fc2b0efbd88c698ee1cae2d562ebf41e39a49ec8946d064697227cfdc1767a0cac59539721a22d5f765bdadb47f34804b7130e00b880e95b0898121d075af882b986fff3db66c96cbaece8461c2ca2734df3fbb394997308e594a237721b76fc52524bb5221170b4c6a0993740f427f3d979d21141696327ed0dcd2fa962c0c50389a20603b365cd77fc57701bc654734dc888da21a0036a9286487e6088fb5c884f6e374037d6447a0d2823342e5dcf7d13dcb0b2bd81a9153907a7a9a162f1433d194ef1be5689d027babbc1d817d63a955da150bd1961d5d761f311142d703ae175d87860b20466c01f6044aff4bff4e2e2d89ebba508413d8611b5a18b17de9c32620bd5905d1e6d559302c2930c16de1bf774697c1d199fe5975d95df394af45a76af933e3e6f699ade69d1ab4b6d5dafe9d284bdce322fce56a77d1885693112a6500a3039bbc0f573d068d6a42c113171b7370f5bfa27cdcf56fa95b7f7edd75b0eab5cfec348d841f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x94, 0x6, 0x81, 0x0, 0x0, 0x40000000, 0x200, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x401, 0x2, @perf_bp={&(0x7f0000000280), 0x5}, 0x8008, 0x1, 0x3, 0x3, 0x1ff, 0x7, 0x2, 0x0, 0x79, 0x0, 0x5}, 0x0, 0xf, r2, 0x2) r4 = dup(r3) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, 0x1c) r5 = accept$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) setsockopt$inet6_group_source_req(r5, 0x29, 0x2d, &(0x7f00000017c0)={0x7, {{0xa, 0x4e20, 0x0, @private2, 0x1}}, {{0xa, 0x4e24, 0x1004001, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x207}}}, 0x108) sendmmsg$inet6(r4, &(0x7f0000002880), 0x4000101, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, &(0x7f0000000000)=0x20) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000019940)={{{@in=@local, @in6=@initdev}}, {{@in6=@private2}, 0x0, @in6=@private2}}, &(0x7f0000000100)=0xe8) openat(r4, &(0x7f0000000240)='./file0\x00', 0x40000, 0x90) 13:07:26 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x4, 0x4, 0xf7, 0x8, 0x0, 0x3a2, 0x400, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x1000, 0x4378a178, 0x8001, 0xe, 0x3f, 0x2, 0x200, 0x0, 0xc06, 0x0, 0x8}, 0xffffffffffffffff, 0x5, r1, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:07:26 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x5, 0x0, 0x7e, 0x0, 0x6, 0x10, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x7, 0x3ff}, 0x40000, 0x0, 0x7fffffff, 0x5, 0x800, 0x7, 0x1, 0x0, 0x80000001}, 0xffffffffffffffff, 0x6, r1, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4202, 0x0) 13:07:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x4a010000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:07:39 executing program 4: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:39 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:39 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x578ef229) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)) 13:07:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) fcntl$getown(r0, 0x9) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:39 executing program 5: r0 = accept(0xffffffffffffffff, &(0x7f0000000100)=@sco, &(0x7f0000000180)=0x80) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000005c0), 0x4) recvmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)=""/70, 0x46}, {&(0x7f00000002c0)=""/219, 0xdb}, {&(0x7f00000003c0)=""/89, 0x59}, {&(0x7f0000000440)=""/45, 0x2d}], 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000180000000000000001000600f9ba0000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000240000000000000001000000010000000900000000000000641e7c29325bd4339bad4081c6e988e97868f9079780a70c131d1b3870f155d08faf8090fe89a8c69c96ed9aa0f46bd712a825c93f7ef8d5ae542f2afabe66738fdd29fe308aa3deeb6cb17f26dc998c1adebcfe1c112c0aa4f4eddfa4f479e999da5b388dc4bcf9945feb332d3f7f24c4127a4042f4a8964ea8a8f145b3b37bf2bd917069b58ac835f2e957857f00ab57ed7767a4a04c392cba7b23ec7939175bba12a4880e46f167feb3a1ccdd9f9ba99e14b9dcce9de25ea02bd1cf70fdecf81d863e2887a6ad3db028cb056a4b2b43d368ba2dc2ef6a", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x102) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) connect$unix(r1, &(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x0, 0x7, 0x0, 0x2, 0x0, 0x1}) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000640)={r1, 0x1, 0x101, 0x1000000}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000600)={r2, 0x1, 0x3}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) syz_io_uring_setup(0x7dbf, &(0x7f0000000840)={0x0, 0x4273, 0x2, 0x3, 0x3a4, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000008c0), &(0x7f0000000900)) 13:07:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:39 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:39 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x6e000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:07:54 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x803e0000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:07:54 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:54 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000001380)='./file1\x00', 0x20400, 0x199) close_range(0xffffffffffffffff, r0, 0x2) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x800, 0x0, 0x0, 0x0, 0x38f6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x40010, r1, 0x81) clone3(&(0x7f0000001300)={0x40090000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000012c0)=0x0, {0x33}, &(0x7f0000000240)=""/4096, 0x1000, &(0x7f0000001240)=""/113, &(0x7f0000000200)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x6}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f00000013c0)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x59, 0x80, 0x9, 0x0, 0x12, 0x4020a, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x2}, 0x10200, 0x9, 0x9e4, 0x1, 0x6b, 0xd774, 0x7f, 0x0, 0x3d4, 0x0, 0x9}, r2, 0xa, 0xffffffffffffffff, 0x3) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:07:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:54 executing program 4: pipe2(&(0x7f0000000300), 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x428, 0x1, 0x0, 0x0, 0x6, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x2, 0xfd, 0x2, 0x47, 0x0, 0x8, 0x8000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xbd57}, 0x40, 0xf3, 0x9, 0x1, 0x9, 0xe7, 0x3, 0x0, 0x100, 0x0, 0x400}, 0xffffffffffffffff, 0x3, r0, 0x9) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c90b1bbeb3f02a250800ff405e762ac6053f295d4ffc20d65892ef076a380e71c4fcaceb384300007d26af18e26c51db155af69e53f066816527ee897b6d5923e200"/91], 0x28}}, 0x0) recvmmsg(r2, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000020}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="7ae9ec44", @ANYRES16, @ANYRES64], 0x50}}, 0x885) socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x5, 0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r3, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x119) 13:07:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:54 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) 13:07:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xc0000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:07:55 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:55 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = dup2(r0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x2, 0x5, 0x6, 0xab, 0x0, 0x3ff, 0x8404, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0xffffffffffff38e5, 0xfffffffffffffffa}, 0x10c4, 0x2, 0x1ff, 0x3, 0x5, 0xfffffff8, 0xc000, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x14, r2, 0x8) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x1f, 0x9, 0x7f, 0x7, 0x0, 0x40003ff, 0x14062, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000180), 0x3}, 0xc85, 0xffffffff00000000, 0x3, 0x3, 0xabd, 0x9, 0x2, 0x0, 0x1, 0x0, 0x1}, 0x0, 0x10, r1, 0x1) 13:07:55 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x2, 0x20880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="140000001d0001000000000000000000040000009bd6b6fbef96f5a6675a1588a3374454086ae38aaffe5898dc2a6683a9c960e39eba219b6087d6b42b0fcd2cb0b80fee3ef95c1a84a490ceaf24f11d0411d1e98f0d877250a55e05fc4a3f4be0d0ea3bf10ba159ca540bdb"], 0x14}], 0x1}, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x72) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) syz_open_procfs(r2, &(0x7f00000001c0)='net/if_inet6\x00') setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f00000000c0)=0x80, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='timers\x00') clone3(0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f00000014c0), 0x800) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) getpid() stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) 13:07:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:55 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:07:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:07:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x48277eabfdb4e962) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40000020) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') unlink(&(0x7f0000000440)='./file0\x00') lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) clock_getres(0x0, 0x0) clock_getres(0x0, &(0x7f0000000040)) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0xc189, 0x10000, 0x1, 0x7fff, 0xfffffffffffffffd, 0x8, 0x2}, &(0x7f0000000300)={0x77359400}, &(0x7f0000000380)={&(0x7f0000000340)={[0xffffffffffffd5cc]}, 0x8}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000680)={0x1, 0x3}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) getuid() setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0x3f}, {0xffffffff}], r1}, 0x18, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f64ae006f90ca05dc83d8ed"], &(0x7f0000000200)='./file1\x00', &(0x7f0000000380)='nfs4\x00', 0x2000000, &(0x7f0000000540)='\x06\xf3\xa1\x9dP\xf7\b\x00\x00\x00\x00\x00\x00\x00@qR6\xd9\xfc\x1a\x16\xe5\xad\b\xbd%\x1c3fQP\xa4\x16\xa7\x1bW\x90\xac\xf6+H\xa7\v\x84\xe7\xcf\xe6H\x18h\xdb\xb9\x02R[Z\x05\x8dE\x9e6\xf5\x00'/74) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 13:08:11 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000940)={0x4, 0x80, 0x3, 0x7f, 0xac, 0xae, 0x0, 0x2, 0x8218, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000900), 0x9}, 0x2, 0x5, 0x8, 0x2, 0x0, 0x1f, 0x1, 0x0, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x8) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000100)={0x0, 0x0, {0x0, @struct, 0x0}, {}, {0x0, @struct}}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000500)={0x1f, 0x2, {0x9, @struct={0x7, 0x8000}, 0x0, 0x5, 0xa70d, 0x3f, 0x80000000, 0x5, 0x240, @usage=0x6, 0x2, 0x401, [0x3ff, 0x7, 0x1, 0xfffffffffffffff9, 0x9b, 0x7]}, {0x8001, @struct={0x7, 0xb5d}, r2, 0x5, 0x100000000, 0x8, 0x81, 0x2f8, 0x28, @struct={0x2, 0x7}, 0x5, 0x7, [0xffffffffffff0000, 0x2, 0x3, 0xffffffff, 0xffffffffffff0001, 0xfffffffffffffff9]}, {0x7fff, @struct={0xcd, 0xffffff00}, 0x0, 0x1, 0x42, 0x4, 0x400, 0x7fff, 0x62, @struct={0xec2, 0x40}, 0xffffff80, 0x5, [0x0, 0xffffffff, 0x4, 0x7, 0x4, 0x847]}, {0x1, 0xe3, 0x35}}) perf_event_open(&(0x7f00000009c0)={0x2, 0x80, 0x80, 0xfb, 0x9, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x1000, 0xfff}, 0x1480, 0x800, 0x7f, 0x3, 0x3545, 0x6, 0xfffc, 0x0, 0x7, 0x0, 0x5}, 0x0, 0x7, r1, 0x3) 13:08:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xc03e0000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:08:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:11 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:11 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:08:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x40, &(0x7f0000000240)=0x0) r1 = eventfd2(0x8001, 0x0) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x8000, 0xffffffffffffffff, 0x0, 0x0, 0x9}, &(0x7f0000000300)) openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_setup(0x40, &(0x7f0000000240)=0x0) r3 = eventfd2(0x8001, 0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) r4 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x145842, 0xe0) write(r4, &(0x7f0000000200)='E', 0x140000) write(r4, &(0x7f0000000080)="ee", 0x1) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r4, 0x80489439, &(0x7f0000000480)) io_submit(0x0, 0x2, &(0x7f0000000380)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x8, r1, &(0x7f0000000000)="fc941bc2f0b41b09484a3380beee9554318b35dfea55b86b4e1a68113be19d058ca5e47a560096", 0x27, 0x0, 0x0, 0x4}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="67f267ea6afdb7dc800193d95b6d11031b7af415598fd24fa0607e718b6c937e85864b9e7c161f8f8397e7db26a561a1afddf527f1a22eab37901cc0c9cc2ce5f01bfefc9fef7ce3116e750331ca2dfa5fad1a042772cbb97e1d63ac7b51631fffeaae014f425bbf18d95761ebc1350a9632ca59c05d39924fe88b2c625fab80e9c17acef6e0fbf569c6b07e44e02b6b530a8c555b99a3734264527cc98559800b592f30e102f4f31fe8955e522c0dcfe0e900517066da93c13aa6b6666fbf1d2b19ab", 0xc3, 0x2, 0x0, 0x5}]) sync() 13:08:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:26 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:08:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xe03f0300, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:08:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000140)={0x0, 0x0, "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", "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"}) 13:08:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xeffdffff, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:08:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x58091, 0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:08:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) tee(0xffffffffffffffff, r0, 0x1ff, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x2dc2, @loopback, 0x3907}, 0x1c) 13:08:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xf6ffffff, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:08:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xef, 0x0, 0x0, 0x0, 0x2, 0x48210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x30fe00, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'veth0_macvtap\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000003c0)={'veth0_macvtap\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)=0x80, &(0x7f0000000300)=@isdn, 0x0, 0x80800}, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) syz_io_uring_setup(0xa7b, &(0x7f0000000540)={0x0, 0xb480, 0x8, 0x2, 0x1ec}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000600)) syz_io_uring_submit(r3, 0x0, &(0x7f0000000680)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000001c0)="56c09b5d9ef8011a00bad5410a0730b27a5e58744a244c0d22f601d355c94d1a58b2ef59b00ffd553274e2426c71", 0x2e}, {&(0x7f00000006c0)="644e9dd123b0a524e4c820b98d31857d10b5623ceea6b484521658d73dfcce876ff8d37f1e9a6d711c3120066ad5bf0714a25951d54d55d0ee9805b487a9fa862b21e2bedd7cd2434a9fff5fe51d09ab171d2a1d217a6c159758212bf0332b5ce8b34f56f808732e10d287", 0x6b}, {&(0x7f0000000740)="6464a59c1f2daf23946b66605a821fc39256739ff85d12ad0ad29bbf027fe0537bcf5f10af9d077a48f955db63582c947049bd80bd28b2d0299ff0a429df86673eae4ca7a03872", 0x47}, {&(0x7f00000007c0)="29733e56900a861651bdf999ca2d428237be25973560b082fed80d09673262d64a12744e07ed9aada82afdc56e492f10bb3e4cc4005356d7a25f8c48a294bbfb51119201f134c17aacc4de2f228867905f909f8354cdc17655c3c66cf2b5a9a47bac7c58f586c9a4cc6c4797e9819fc32ec5f21be3ed03f82672ef9dbd28ed7fde0fb64b04a6ea2f433e54dfc37a79866aa38296614cd0a795ce669350e9a3b456c84d19009b1b4869310331c889a4ac4136b51d1790a7a39ba26008af38eb65", 0xc0}, {&(0x7f0000000880)="a16bc5b53d80b347b6456785d815646abfcab164d62f16dcf0e1e011a19144be7dae9d625319cd19505cefddf5135c7a8c11e1132a90fd24b026b6090d107cc1ca8a492ba11c775e75a3dd8e8321d012c66f85e769b7ca85eda6cdcd7faedb0b1e91e247c33a6b2a3388f1df5621383af88b1c87e718502f1d7a6783ce473fd0329bbac7e23bd7983a760b1e1909a3795dd38718203db9845187e74537f7826b4fd7377126baac64ad13ac5a4b83abf9c53224dd8a402a0a4098", 0xba}], 0x5}, 0x0, 0x48000}, 0xd1) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x2, 0x1, 0x8, 0x4, 0x0, 0x1000, 0x10, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x87, 0x1, @perf_bp={&(0x7f0000000200), 0x8}, 0x40500, 0x3, 0xff, 0x6, 0x400, 0xacf, 0x9, 0x0, 0x5, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0xb, r1, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)={'wlan1\x00'}) 13:08:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xfffffdef, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:08:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:08:43 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:08:43 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x3, 0x80, 0x6, 0xff, 0x3, 0x40, 0x0, 0x203, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffff8, 0x2, @perf_config_ext={0x200000080003, 0x6}, 0x800, 0x4, 0x2, 0x8, 0x2, 0x1f, 0x1, 0x0, 0x8, 0x0, 0xfffffffffffffffb}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x65, 0x0, 0x1, 0x3f, 0x0, 0xffffffffffff261c, 0x100, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x6030, 0x4, 0x7, 0x6, 0x3, 0x3, 0x8, 0x0, 0xfffffffb, 0x0, 0x466011b0}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xb) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/slabinfo\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x81, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8000, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x5, 0x401}, 0x61, 0x3, 0x7fff, 0x0, 0x4, 0x2, 0x7da, 0x0, 0x4, 0x0, 0x80000001}, 0x0, 0x2, r2, 0x3) 13:08:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xffffff7f, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:08:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:08:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ftruncate(r2, 0x800) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000000c0)={'wpan1\x00'}) write(r1, &(0x7f0000000080)="01", 0x292e9) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000040)) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x0) 13:08:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) capget(&(0x7f0000000100)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000140)={0xfffffffb, 0x5, 0xffff, 0x3, 0x1, 0x1}) 13:08:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xfffffff6, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:08:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:08:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x2, 0x80, 0x58, 0x0, 0x8, 0x34008, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x6, @perf_config_ext={0xffffffffffff5673, 0x2}, 0x8, 0x8000, 0xffffffff, 0x1, 0x3, 0x107e, 0x1000, 0x0, 0xfff, 0x0, 0x200}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xa, 0xd9, 0xa2, 0x4, 0x0, 0x6, 0x80082, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x2, 0x9, 0x6, 0xffff, 0x1, 0x800, 0x0, 0x3}, 0x0, 0x10, r0, 0xa) 13:08:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:08:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x911d}}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r3}, {0x2, 0x1, r4}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0xa}, [{0x2, 0x6}, {0x2, 0x1}, {}], {}, [{0x8, 0x2, r5}, {0x8, 0x4}, {0x8, 0x2, r5}, {0x8, 0x1, r5}, {0x8, 0x2, r5}, {0x8, 0x4}, {0x8, 0x0, r5}, {0x8, 0x5, r5}, {0x8, 0x7, r5}], {0x10, 0x7}, {0x20, 0x4}}, 0x84, 0x2) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, 0x0, 0x220) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001a00)=0x0) sendmsg$netlink(r1, &(0x7f0000001ac0)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbff, 0x8000000}, 0xc, &(0x7f00000019c0)=[{&(0x7f0000000100)={0x2a4, 0x2a, 0x10, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x15, 0x0, 0x0, @pid=0xffffffffffffffff}, @nested={0x80, 0x16, 0x0, 0x1, [@generic="03b7f3b3ffbbfb732b6b04b80999108eea3584d54922c8bfe26b135b2ed2fc2901e4812ecb3534cf361ea3c70dd5231da6b247c1332d4fce0ac3b45afa3167630df0068287400f7220bd590c64de7a46694fab155e9a3b17e9f6d6b6855f44f6efdde8d041598b76b5b3619d3aef540b4c30e2e1acaf3b2c5d180518"]}, @nested={0x20, 0x67, 0x0, 0x1, [@typed={0x8, 0x55, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x2e}}, @typed={0x14, 0x4d, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}]}, @generic, @typed={0x4, 0x11}, @nested={0x195, 0x3, 0x0, 0x1, [@typed={0x8, 0x6c, 0x0, 0x0, @ipv4=@empty}, @typed={0x4, 0x6}, @generic="75e9c70c3f0f689a187dc5d4235c781ad219b6d115fcf81ed20e766b68ecb027d05b8d6cb1fe6eeaef156d9f8fa6e00f39eb2491d110d5d559f134149923f7800b1578506c99b759eec2daddbe54042aaf69f3c21d96f753a0c41517e452ebd6bac0fdbaff4acca0137d2d007618d92e588d46440678eaf4bf6f82f3d1673bd9bd2ac92cd2142a9c2f1373df4aed756fec1c20c412fdffdc4effae5452ac88313a8ada979b6bec7db7f1687a85d923cdb598c0648b5370a3d7f25c039a6451a3d32f86cdae30b6e6c05087bd", @typed={0x32, 0x29, 0x0, 0x0, @binary="5b3a74a3f3aedc8df814b41debcdfec8e103f4d0bb251e7f339a593c5c2a8408efde33ded159f0d92a07b83eb5dc"}, @generic="19515be94090317fd6f88f17201eea29c62bf9215d950584aa68225176125f64bd3cea7b620612efa47dd958e3806677f410d5c5dd97f2cde0ebc618c63bc0f8d558dacb6eb796282a637065ef4c0c24e05cb37db9557aff49", @typed={0x14, 0x64, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @typed={0x14, 0x50, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @typed={0x4, 0x93}]}, @generic="4e14e108c291a8fae0bcb5ba7938bc111ba70e8ba9d6c35547f5cb437379caf75a9fa23d66798e78bb4891532e8ca371df5825e56a485e8b77121142a1b0e995756a208c73408c19194b1e685250fafb"]}, 0x2a4}, {&(0x7f00000003c0)={0x1600, 0x1e, 0x300, 0x70bd29, 0x25dfdbff, "", [@generic="0c29e43b81ec6389e069da9eb716b31edd58cd6e1a2477187b5575be5030a97d5caede1a6d8df72043e2895c61fbdfb5bd6dcfef3eff2b1ce58bbfe7ffcada028f6ab29be860e387f097e4a15e346a72d90008c9d2f804b82c988c6f30d15f72948b9337f9641141bc8826fe56da71b6235d664d116b176cf0133dfad8bfa879e29bb4473c2f3778e67b7435d43b629818fb380b1bd4df9d07924391aa706ee40b34a887a6c0df33a78c743a", @nested={0x1d0, 0x46, 0x0, 0x1, [@generic="01bf0ffdd28997fcd6fc814922846b105955cf43f382c2157dbb3dd56488802fbed0aea7736afcdb73efe16cc5d450a3dc2a9197d4a01b03a5b951927752fc9f7baa007e6a677fc70ecd139c882879315c2ebb06c862f3e934c33ff159faae71c364e60ae17918cc7161c8000411900a93aa1d2f725e60a3aed592ac7653de3cc6b98b7fe8a59ca0aec197ef0546ed44fd9ddb427d60564e0cb43abb", @typed={0x8, 0x83, 0x0, 0x0, @u32=0x5b1}, @typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@loopback}, @generic="a3d4b4ca9aa4c3dd412140dc4988060adac486c03f", @typed={0x8, 0xc, 0x0, 0x0, @ipv4=@private=0xa010101}, @typed={0x8, 0x6c, 0x0, 0x0, @uid=0xee01}, @generic="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"]}, @nested={0x1268, 0x1d, 0x0, 0x1, [@generic="9f663a6db005413c88c9af4aadbd6ca550e143f964d6c437c5e4a1d7858980a1ff5fe226db46abc957bfffd99a36b2ed48e177d61fe07ea147d03b41e24d7d03cebd24b335454d0345aef488bed7ffacac54ff70f68bc760155857c8357970d729b9a4a4f6d6d0abdf99ecb05ba5110196eec34bf684959fda83cb592f09004ebb284a61483bf740e76f10400b9626e873e8c1", @generic="4fea14d700b173d8383ceadb9fcfdac34c6e963f95d0c4ed5bffea4290795510ea71be4ba9658367850dedbaa6d2c8cd560c27fd851f2a0b703675b0027695ea3163a970acf3d987906c2f0ed7185598cc728413ac070ee11732266c79fe6e7ec9cee37b642fb8c6954c3e7db2c2bfd84615467693f5e7d707eb7c46513262e553cfe04a64c5ee81723740f5a5203a8616a1814eebabb2490f41e01cbb8f436f50aeb0f6d19c39d2e27a76ade9d4c29768dbf9a5dd7e1c035959a90474c5e430118e8d9104d883ad0484", @typed={0x8, 0x59, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="36845fe700b0d5f74062f1d0eafac4d3988abba8", @generic="89cae8b6cecf19d819c035f7712f51cfcc48bdda88b36b11ada5db4d6a2379785ae4b8d5f456621f7b4aed456b9ed30086adb77dd7398f62ed0d59aa04be5eb9b07bdb13005d43e175798cdd8aae3ede3df487617b3308ac0dc4df3984adaa0aec44f01b87c83b0692d5f8a9de5c446866d96bfd49f786426606859ae4a9e33a37269fe3b718c6eeb390d2f68137abed574a4406a9b84f3be53f0e6a60d7720be46eaa89a6fda8c43c0a8abff1816710256bd2d6ff9d448b4a497b36406d037c674207dbc329b2c81cd1de721c925796f9c0e47125ca256d99573ddbb295f0525565cc510c40e3f7267c66ca8baa21fe9493e72f3303c4109fd3365dfa1eb29d1ed8b73811b1689c0ca4d4cb9ef6e5519b46ef9ceb141d1c1ec7b5bdb6492ffe7c20472ed0147bcc2706fca383e49450a214895dcbcb260eff14369ea010b0d597757102745ccf2f3d71d9b2d90ebead75d8c63c5c3b5584c9e48acce920d4265226b640cc4682f2c1e4c591ac5de6e6f4c8e3c0f54b15aa9dd26bc96ecbb74353a96ae5525ae1f700b1afeb1e4c2ef028f1cd72ac846fd216b016f1218ca8e262074dbb9c94eab3e556eb0243e867de3af246c3df3fca1a4950b791cdd2989a3691e4d1447e67136ec6adaaee06024fbae5f5ca9a9b70c70e9364d45af39a42123f1116d40a1ef54ee4bc02ca340827934b0bed8c935785797467127cd5ba62deb14e7773a35373c095a4d296cc012c14cbc18cfba81a4495b18252e8a14f3ffb9fbbb5801c25abaab0cc8e41644db388d4c7b24d917412901a0c1d44e07ac856ab6c457612133a4483741e9e51e6a715f96742ec6e21a3c7c72d811b27db47785e8e950b75146e45fedcfbfc3befa06f0f013ff4375730989c3230b425d541caad9ed816586a90f48a18d66741cc3ef10b27421fe2bccf055a5bb4a97d06de6c0304cdd0f065e44ca28ea09f606be6d7ea69c8efa540f778c58f70afedf254222b0ecd8b1b465df042f995ed123bff73a28f2ec8cac0cd1af4609254d24139755ac8ace3618a2358e089e50b05e1f18d5746bbce234604345c4e1cd93c40ec953dd4b1eb3458938f03345893e4e5e0ceb1884e15b82f9ebc3ccbe53f9949696f1ca684b6ad70371574249ee53f3849ffdf10e080a689be03e78b7f2431b7a3195526d3f230899a8ff6e597c765df0f5b3ddba0483b22b20e7ae06f3c51ee047fcd3278f3550a2d479b93cb780178768e67fa79a929923336fbbc93442b396cc1b63ed1536f047e36943fb51449767755530a6aa33d6669a52b28b9e6181664b3620d9b9eee11f941df0d35c3682a7bb6333f600825742fc9d66f77c17487bd0d8d2b350f729801dc3d563ccd96d4e71d06eb0319a1c5e3305b0b6861a4558ea9de88e288aac2c17fcae07fdf82c3692b42cc75315234a0d46fd2ab72b4e844f9da13e34fb9d72c5a205e9205411a7bdfdb00b4f1b54fa1e44695012b2b7e1c72b382cccc7dcc9d646ae7baec41e8044e64e6412026747fca7a487e927f824b8811f6e4eb9e9bd8a2c0ea55b32c584aee2443b26749b5020ff608616d82c8bec1aab54e439caee348b24c763b3e7e03d040592d210e9aa0dfc9ee7c6dc8407416491c7b95ced43ce30289fdf792dfc24088698b63c882949942b183968e11cc23c198817cb777abed1a49c70acdbf2b5e1aa4fa0abf91d9c16e60285c9fb0a2d945c84bd61d93ba2da6d16bb3b115f6cd0ecd1f6d66a2309e0e6d0b61a3d79e94bbde025c8331ba6e483273a92ee24799d020a7c54579c81cdb7f89fce5612f6d2f109c6596378043630f720bdd9bbf2e63a3028890b04ff1ea900e80f7963da6eda98ccf38123fe3dddc8213662bf2bf01e24a968c4ae692c5fc3b8c2d7b5e5e1611caa3aa4acd60545f548473710fa2cfccc40832a3d035f1dcc391f319ed88c3d62ee7bfdd4506434f9b465362976f49f8ca07723a6b1f13988b0f84a7ed1f77c50fdb9145b0140368d4bca5114053262a9c221f8dd8236e81ad2fae35f817665c5bbcec63118b7eda79e9769d6d0afe61e1bd9f698625cd898619f9d23ef89093985015edd975543ad92ad5163e09d4bf71746850c9b5ea391597ed1dd6ad0be0208e71e5d9c4ddc48254d81b2df29f26823fc2edd7e69702198bc09296a9a76cbf95d73fbaa7291042f226601863ad9018c2d9c50057b2dbd1e6939aa84d5a99b27420928c8c48265ea454dfb34391f1c22d951b439bee453e2769f5d4d047e46bf5594ecab07244dbbd4f97a6a12b8c421cd84b1f3c3200d1086cb76be9b5b21c7ddf5efdf19384e105ac6ef9c98878c8e43660c18b9b457ac7c46fd44bf215c447d3109fd506ce84cdf888f55206b8e5354f10102a5d81fa543ef09a51490b163bbef72f980dc435da87f8241d5a19c3a572ef730794e048fcb1345e17c04da57e6c83b2387244c5c497fca27f52beb4a6ebb6cda363d0a8a16a492c882650554049a433cc3fe831a776af5d5f169743e911067e1c76615b1165a53eef8b21a339b76ddaf2305e0ce64aebf0b04ea2767f27b0002908526ce2a2c93a5d2bf967365594f3a7281e8e82fb8967b71a7906191750309afa5387017cf3736f22944d465f508a8bcd62ef6c0ab08fa5f1eea9b06e216aa52ffc40c01f7f05d6b1c8f1d954588e824ca40cafa42ce6ce8cb73aad2e2e50e882a204d99be914e673154700f676449f681e59e0f3b62fd62d3dac5192baa364d2415ab24957e70c63d05c8f801d71648ab1056dc54e93691e0e1348de8f2c2175d15628f37580e7f389008382b7f5b65730269b5e49a4a8108b5518b9d8a2c5d1fe544a6b851c1944619946ec9bcbd00b388c4db3aa9d52b3c37274cd22c8a24eed17dfdd6fc7c4bc7153304c2292fdf7f04ad1aed3b03d516cde42a33d93a87bb67706b889e48143e7f38b6d00265563e17c41f8e1d30e1d9d6dcf861f49dee03eb67b9fd23673973b0878fef0150e5f7da7601daae51395a4d310333636218de6edafffa05a3711b08481f029c894b572ee672137e2b267ca8acb9f55af405d1d8b9f4a4d7940683f2c5b3fbabb980ee04759b94f2da6d83542dd1c391133e4a645c2d6c78676bb983205a05c6b15a9aeffaa4aeff91298a5ed34da9f59a3645cba72253137491b3a8cf3a6dc80c0a557d70396ec3e095fbb6d37e3444290fcd1f8ea0b339496bdd5d3282858ada99455cb4cd361d722d12a97e957fcc62851068ccb3e4dfce65ec9fe306cfdbad56783c79ed8018c21de7f17c520bf2a26dd3fecfc050deb708af6eb4bc5557605ec417b0f025a083740f88ede413aa38a260b83e68a2469f95e72ddb774baeb89c712e62c2afd314d0adb25197e7d0d8c70ba8e0d055b99703438de8b7e0e2966809acc389bf051a9d9872fab32f152d1e6215590315b950eabce00df5f92fcd85feb9f8728b10494b96e5843ab7055b6ec96e2c44c2dbf4f3b257ca22da6c5df95d4125073656c77656549a0270b029b12ea6e1e2a4fc6aada897f418d6922a648700b5e9e0b00c40156e7ba22f7c40263a93172ecabd3b11fa7bb64ae28e3aaae55b2eba03a0ac1d36a2766e3cbbd80eaef0815a4ba6d3bf32eb91706c86150d957745219d2b61af57111ddbf991e30a7bdabba1459e980abde039a7c1576815703db4b45a9b5fbfcdf0ea423681b4803408ce7941f734d98d93e7a7a0c0aafc2b359369128771dbdd1e7aad93c5c3976def1c39cf1c2edbf5e0b713c107a047cba8b3de0b699eadd137b82c911b6a51cf8a085c180729590cc139cac5846b6b362634d720469b2ab199d86ffa971dd1715673f595f259bd0c1e65733c17fb43393f6ff6e314054f40e36b0d963c753c5828312f1cd9c7e28eae63acaf09fb70e005290560d022d7565551e963daa7fc3d31055ab184b68042db12775de8fd2e2aa02eac21a52abe76185d79ec05bc851f41888b327b0c65a056fc7c34ee1662eea9952049dcd06e1e06294b6606bc6ad93c99983511bd2548265b8b9405ac3877ec042a75263483b1816e6debfa673524fede67fda3f73d1cf0837fdd011af9dcf8d5f486b4245772fc3957740345cb54e7e98838d0fd5e6bb0253a79412c3bc3d7dcac52813a06dd6232b316637584469b7904acb2623e1c95e41d84017a2e69807a3dfcab7b28d1eab54d64fe26dc13649ee71dcfec82489d11141ea3238effd42913c8bac2f76f5db65d5414def6ec1a1fc5b07a2758dd29ab4be02c947ed92ba1e02427776055796182b1cc186d9639183ebeb1caefb7544b4b19315096b635b3807afac05d75c705d98ca947b68c56e4f1781698dd16403b27e639ff09c63458bee209e162ba4a697d2c5eaf3509d09c4a2ca48a8906022effdd806b437b9f168a484161c283c3c87af7d42bd6db8f1adee7a0482f0f77cc40fc26a55c8053a8e208a9b13ddf835ec03ba51fc9ea6e4311ab6a635733147ca5dd9910eb329a0986a3aa70447f898c2edc6c5b98168f89124aea9be7f7070a041a8e88e5b1fb5fd3a00c72303f06d81aaf4881be3727f9bc253174f8ccb992561e1ffa4201b6ddb16e9f9bb9a0b34ab4e9d24a817e1c1de83ff796b8d826717765045caaafafe82b2f4f28088095563c675a7e6408e177c9e75d8074319f4427072d274e83db00387559dc8c899fc445d22702c1ed2a2b4982c4b7dc7beb4a41e177ec70f5fc4dc8158d65d9c0714dc1645b765731f7636598a9ec70011de7087727df8f4a22d5fd2a5f8bd0de57eb82ca858c987470f9d80f0ec1a49d964b1653f4f246770a3b3c74025ebe475cf1a846a8abb4ae08dedb5d150f6184dbff93be4217fe638f9e9cfe8bc8716d6c6fe2ac89f3ea17dc224e9850cfc86acb05202478a4d3742aa9fe487f7e4d695574f5fe81b3bde490635d77a7398f20c276a52bba326ea70d2c80704988f7f50601165963db4f39fb3f06825bedf779c5fdc406061e1e595ac8607969fe742b1ae997eada88a34618b494ed918d449e74b2da4dd188d7f4731f74656276526ee6ecb9253e094ab322b22df851ec2519aab3d2f8f5b5f2a6164df40455cc172a22389e56b07ed89b15b20e424cd633036bbd3dfe08da5f72e3e7979d000a41f962a0a8d49f8565b8526184aee54f33352992f4b42b1c42de280164d2cf5c377b936fd7cfabbb8ead6c0ba3431cef750e8284d7e245b271f8f6c7b0e54e77b9abee492be25d8711ceffd9bb417904ce838c5c4d7317dd7f793e567a800a13439c33460cf4405f70528ef9919e809e8dc535a6711ca3ee44018d826bf728d519028f92a25a3b742cccfa2ec7eae3a0cc0c71abdebf7a4f1de94371e2a102a05d7105e4da20519e349dd27d035b0551e58b251ef41663c04aae95ec54915fc1cc4b768f5212cf8fb00fee3f44a5ea6b430c014cfad91f700b0180d410bd940b8cd8545f9db53387341eb3fe7deb9b1e943d9b99ad92b36b1e887330d14d7a4566d859a824886c7cd330faaddee51d844bd13d99b7d60bde1930b89ad6de8b61d8d2f96f752bc6fd097cf97194398a9bc812b5e5415fac2cb17aeb341120a8e6afe64c53f933589cf4795c6c506ac1be88d792f6c053b1dcc144a4ecf41acd59d3166f1f26c2ffb051f07316557951aeb0d9e759aa01f696d68a9dbb7d93fd4ed5eab6edfd29c8588c5cd068ef71069a69e5021340f46239e7bc5b971d43a3651e286c545868b36466fa0b821a3370cb1b2886260942c525125f47d0b572c952cb3af02b1d85da11a4eb01e3540bdae", @generic="21bbb0c552e36bd2c6eaf9e3ee250491d17a66ea45eba064087567cab9b7542d61855a3c351d08ed71477e7ea0f39bf173374881b56a1273d182e62dabed3db8b23e5f601346156507f13315b6fe322bdf6bee5df56914bf2e69338caa07b7396dc587ae1c9931fbafd85e9f591c5fa5b543c01ce84b7c73cf9865e06ebea1ba37a42020db81fd850e3f9607513b7eb884bcb5fe9278513a6299bd96a008f0cb963d341df428e89f1d7e924d5892a5449bf1945bd85343286410e8a73624d687f9ec032dc4a418314915e3df8c036583e3e059e7b8408e78616d8965861e8aa84a9c7603622eda55086021"]}, @nested={0x99, 0x37, 0x0, 0x1, [@generic="97f36114717f0e16137b1642e23326d6dea8cd0f3f172216475f68071eb30dbf449934f0aeec1e4ebd710bdc237fd782338691cf91c8b37a048b73207ffb2fbda6f7d49cf8a6ece1b49e84865f5370381a98e2496fa5a6add46b585b1445f8595250d9cae7be46fb8cfce65ea581210139427344788dfc324919bf215d8471e38e910f899df6193f8e6ef7ced0", @typed={0x8, 0x22, 0x0, 0x0, @uid=0xee00}]}, @generic="4b0e4e5753011d73df2584dbe8d08173b32e3886c2e9faa3ed8bf87fb961163c0adabe0399b0ec5627f002f669771b771235899bc68c228cfd0b3adef74fc1ffc71a7d94f0e91c76b3cd8adc47a21a5e02b7857b9ab6cc720881350bbb60f63c3079e4ea8089510e078c0156cd67"]}, 0x1600}], 0x2, &(0x7f0000001a40)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3, r5}}}, @rights={{0x24, 0x1, 0x1, [r6, r7, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00, 0xee00}}}], 0x68, 0x8000}, 0x40080) connect$inet6(r1, &(0x7f0000001b00)={0xa, 0x4e22, 0xb51, @mcast1, 0x4}, 0x1c) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000002140)) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x0, 0x0) 13:08:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:59 executing program 5: sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1e0, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xfffffffd, 0x3d}}}}, [@NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_KEYS={0x160, 0x51, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x2c, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "9c8c524231"}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "736c91e63a84505a322ec6a8cf"}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0xc, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_DEFAULT_TYPES={0xc, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "a135b8b01a"}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_DEFAULT_TYPES={0x2c, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_IDX={0x5, 0x2, 0x3}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3cacb98cfcd7a39b8f194670d0"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "9f084cd334"}, @NL80211_KEY_DEFAULT={0x4}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_SEQ={0x11, 0x4, "610325376d019a75c12e8aea7c"}]}]}, @NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x66}, @NL80211_MESHCONF_CONFIRM_TIMEOUT={0x6, 0x2, 0xfb}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x6}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x8}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5, 0x11, 0x1}]}, @NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0xc, 0x3, 0x5, 0x0, {0x1, 0x6, 0x0, 0x3f8, 0x0, 0x0, 0x1, 0x2}, 0x6, 0x3ff, 0x6}}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0xb738}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x44800}, 0x4000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:08:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x8}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:08:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:08:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:08:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:15 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xff, 0x1f, 0x5, 0xff, 0x0, 0xff, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x400, 0x0, 0x3ee, 0x6, 0xc88f, 0x0, 0x4, 0x0, 0x401, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x8, r0, 0xa) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) sendfile(r2, r1, &(0x7f00000001c0)=0x1f, 0xfff) openat(r2, &(0x7f0000000200)='./file1\x00', 0x109000, 0x10) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0xfffffffd}) 13:09:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x11}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:09:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:15 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:09:15 executing program 4: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x64cc2, 0x20, 0x1d}, 0x18) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000980)={0x0, 0x0, 0xcfc}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000140)={0x8, 0x1, {0x30a, @struct={0x0, 0x7fff}, 0x0, 0x8, 0x6, 0x2, 0x400, 0x3a02, 0x1, @struct={0x435b, 0x1}, 0x4, 0x16, [0x8, 0xac4, 0x3ff, 0x2, 0x7fffffff, 0xdb8]}, {0x1f, @usage=0x8000000000000, r1, 0xb9ba, 0x8, 0x5, 0x0, 0x7, 0x80, @usage=0x3, 0x5, 0xf08, [0xd1, 0x1, 0xff, 0x8a87, 0x1, 0x5]}, {0x6, @struct={0x81, 0x1}, 0x0, 0x2, 0x9dc8, 0x81, 0xffffffff, 0xfff, 0x14, @struct={0xf663, 0x4}, 0x0, 0x87, [0x3, 0xffffffffffffffb7, 0x4, 0x805, 0x3, 0xffffffffffffffc1]}, {0x9, 0x8, 0x5}}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r3}, {0x2, 0x1, r4}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) mount$cgroup(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000540), 0x1205003, &(0x7f0000000580)={[{@subsystem='freezer'}, {@subsystem='pids'}, {@clone_children}], [{@pcr={'pcr', 0x3d, 0x2d}}, {@euid_eq={'euid', 0x3d, r3}}]}) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0xa, 'system_u'}}]}}) 13:09:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:15 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:09:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x6e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:09:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:09:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:09:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:09:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000340), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) fchownat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x400) 13:09:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 4: sendmsg$NFNL_MSG_CTHELPER_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x4024}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000009c0)=ANY=[], 0x1c}}, 0x20008011) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)={0x70, 0x0, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:inetd_child_exec_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x2, 0x40000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x75bf2694, 0x5}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x2a) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) perf_event_open(&(0x7f0000000800)={0x4, 0x80, 0x1, 0x3f, 0x9, 0x9, 0x0, 0x8, 0x10, 0x54a13a429fa1ccb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x104, 0x2, @perf_bp={&(0x7f00000007c0), 0x3}, 0x10, 0x8, 0x80000001, 0x9, 0x8, 0x6, 0x7fff, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x1) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="000829bd7400fddbdf254c0000000e00a80066697273746e616d650000000c00a70037b1ee28b653d58bca8f0609000000000000060000000009000000000000000f00a9007365636f6e646e616d65005716f8e4c69bde9bee041d0008000300020000000f00a8007341636f6e646e616d650000080001007063690011000200303030003a30"], 0x8c}, 0x1, 0x0, 0x0, 0x20008894}, 0x54) 13:09:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x103}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:09:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000300)={r2, 0x0, "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", "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"}) 13:09:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:09:32 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:09:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x14a}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:09:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:51 executing program 5: modify_ldt$read_default(0x2, &(0x7f0000000100)=""/95, 0x5f) modify_ldt$read_default(0x2, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0xcc, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000280)=""/82, 0x52) modify_ldt$read_default(0x2, &(0x7f0000000300)=""/116, 0x74) modify_ldt$read_default(0x2, &(0x7f0000000240)=""/60, 0x3c) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) modify_ldt$read_default(0x2, &(0x7f0000000180)=""/154, 0x9a) 13:09:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="130000000000000002000a000000"], 0x14}}, 0x0) 13:09:51 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:09:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:51 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x301}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:09:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:09:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:09:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:08 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:10:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:10:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:10:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ffffbff, 0x1, 0x4, 0x0, 0x2, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x81, 0xff, 0x4, 0x0, 0x9, 0x51000, 0x6, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x2, 0x1}, 0x20, 0x9, 0x8, 0x5, 0x8001, 0x0, 0x89, 0x0, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x5, r0, 0x2) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x8, 0x0, '\x00', [{0x3ff, 0xffffff7f, 0xf7, 0x81, 0x6, 0x6}, {0x6daf, 0x1000, 0x3, 0x2, 0x98d, 0x4}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) 13:10:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) r1 = openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x404080, 0x106) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000180)={{r2}, {@val, @actul_num={@val=0x2b, 0x1, 0x74}}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x81, 0x4, 0x7, 0x6, 0x0, 0xbdb3, 0x2001, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0xffffffff, 0x9}, 0x12504, 0x1, 0x2, 0x2, 0x6, 0x122, 0x0, 0x0, 0x400, 0x0, 0x7}, 0x0, 0xe, r4, 0x2) mq_timedreceive(r3, &(0x7f0000000240)=""/119, 0x77, 0x3f, &(0x7f00000002c0)={0x77359400}) fallocate(r3, 0x0, 0x0, 0x87ffffc) 13:10:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) inotify_init1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20860000}, 0xc) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000440)={{}, 0x0, 0x30, @unused=[0x9, 0x0, 0x101, 0x10000000], @subvolid=0xc}) statx(0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0, 0x0, 0x0) 13:10:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x3e80}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:10:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:10:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0xa9, 0x3, 0x1f, 0x0, 0x5, 0x685835dfe38dfdac, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000140), 0x4}, 0x411c4, 0x7, 0x5, 0x6, 0x5, 0x7, 0x3, 0x0, 0x40, 0x0, 0x8000}, 0x0, 0xe, r1, 0x9) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e22, @broadcast}, 0x10) 13:10:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:08 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:10:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x3ec0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:10:08 executing program 4: dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x80000, 0x8f) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x100000) 13:10:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x80000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xff, 0x1, 0x6, 0x7, 0x0, 0x8a3, 0x0, 0xf, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0x401, 0x2}, 0x8, 0x1, 0x9, 0x8, 0xb7, 0x3, 0x1f, 0x0, 0x9, 0x0, 0x9}, r2, 0xf, r3, 0x1) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x8, 0x7f, 0xff, 0x7, 0x0, 0x0, 0x318b0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x8, 0x100}, 0x4040, 0xfffffffffffffffb, 0x19, 0x1, 0x9, 0x7, 0x0, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x1) 13:10:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x521a01, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1a23}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_open(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000140)) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x5) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:10:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:23 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:10:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 1) 13:10:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4a01}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 958.610064] FAULT_INJECTION: forcing a failure. [ 958.610064] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 958.611015] CPU: 0 PID: 6831 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 958.611592] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 958.612168] Call Trace: [ 958.612367] [ 958.612546] dump_stack_lvl+0x8f/0xb7 [ 958.612858] should_fail_ex.cold+0x5/0xa [ 958.613175] strncpy_from_user+0x38/0x3e0 [ 958.613502] __do_sys_request_key+0x85/0x3b0 [ 958.613840] ? __pfx___do_sys_request_key+0x10/0x10 [ 958.614218] ? syscall_enter_from_user_mode+0x21/0x50 [ 958.614604] ? syscall_enter_from_user_mode+0x21/0x50 [ 958.615002] do_syscall_64+0x3f/0x90 [ 958.615294] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 958.615683] RIP: 0033:0x7f1da7f6db19 [ 958.615961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 958.617242] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 958.617788] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 958.618295] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 958.618799] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 958.619304] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 958.619813] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 958.620357] 13:10:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x6e00}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:10:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 2) 13:10:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r1, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x4, r3}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@private2, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8001, 0x4, 0x100, 0x100, 0x1, 0x810000, r3}) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r5, 0x0, 0x220) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) close_range(r0, 0xffffffffffffffff, 0x0) 13:10:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) r1 = syz_open_dev$mouse(&(0x7f0000000140), 0xfd5d, 0x111003) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f00000001c0)={{r1}, 0x0, &(0x7f0000000180), 0x8, 0x8, [0x8, 0x3f, 0x40, 0x2006]}) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r2, &(0x7f0000000100)='.&-{-\x00', 0x1) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e21, 0x8, @local, 0x101}, 0x1c) 13:10:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 3) 13:10:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x803e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:10:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:39 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:10:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 4) 13:10:39 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:10:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 974.920647] FAULT_INJECTION: forcing a failure. [ 974.920647] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 974.921633] CPU: 0 PID: 6900 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 974.922210] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 974.922788] Call Trace: [ 974.922984] [ 974.923158] dump_stack_lvl+0x8f/0xb7 [ 974.923466] should_fail_ex.cold+0x5/0xa [ 974.923787] _copy_from_user+0x2e/0x180 [ 974.924089] memdup_user+0x72/0xd0 [ 974.924366] strndup_user+0x78/0xe0 [ 974.924662] __do_sys_request_key+0x107/0x3b0 [ 974.925013] ? __pfx___do_sys_request_key+0x10/0x10 [ 974.925395] ? syscall_enter_from_user_mode+0x21/0x50 [ 974.925791] ? syscall_enter_from_user_mode+0x21/0x50 [ 974.926187] do_syscall_64+0x3f/0x90 [ 974.926465] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 974.926850] RIP: 0033:0x7f1da7f6db19 [ 974.927125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 974.928366] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 974.928925] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 974.929437] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 974.929944] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 974.930445] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 974.930954] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 974.931498] 13:10:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) capset(&(0x7f00000001c0)={0x19980330}, &(0x7f0000000200)={0x9, 0x4, 0x8, 0x1, 0x8, 0xdb20}) capget(&(0x7f0000000140)={0x20071026, 0xffffffffffffffff}, &(0x7f0000000180)={0x2, 0x39, 0x8000, 0x8, 0x5, 0x1f}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendfile(r1, r2, &(0x7f0000000100)=0x9, 0x8) 13:10:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r3) write$binfmt_script(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="00aafe51654c6e5f881d40b15fb0e3ff81199e890e3b7f32847ab28fd00001ff03013423d8312b7b0e14d84931cc9f41a89b90b3a0b1e31a56b598abfb10406b090061694b0533be140f83fffb8d6c90b33eb14347cfca30f70e9d28dea4a1708fc8feec91adabca27a7b3d50514f841311fc55b059fdc71adf68cd18215b85bee635d7a62658d1110c7dd3e5f5152062e9472b10c24544807d4a3f46e34dd94395af223fabf8ab36dd093e879df98f1d72c657277484421eeca7ee4b8f8358b7e0dc82163db829d2b32ee589d1c2e279119bbd0e9ebae1993663ef6a22afa90cb3274522ac1983273979384594dc82db4e70f0565674b9924593577d350fe5ae865bf557df81c67005912527da1299d8b5d1f6272a21589f9ad5db081d921773c98cbcb8ce0d7103e55d24556ae9948e7105cdff17c35d2868d05acf273448ca4fe57827f09f9e7d9a311fb565c9a37dfbd89e9d389f5c5e3ffbd27629eab3ecf8b31c058849dbea71916a5436cfcf80dc9dd931c80e19b4378fc2a0a810793eedec04729771c4278db4fd980a13cb9a170acc853d44446f956149f295bef19a7b9"], 0xb) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x9) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x2f, 0xfe, 0x40, 0x5, 0x7f, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x3}}) io_setup(0xd29, &(0x7f0000000780)=0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x8, 0x8, 0x0, r5, 0x0}]) close(r5) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_audit(0x10, 0x3, 0x9) r6 = gettid() ftruncate(r2, 0xfffffffeffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0x5, 0xfffffffffffffffe}, 0x26, 0x661, 0x0, 0x0, 0x0, 0xffffffff}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 13:10:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:39 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:10:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 5) 13:10:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc03e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:10:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:53 executing program 4: mknodat$loop(0xffffffffffffffff, 0x0, 0x9510, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x1, 0x4, 0x201}, 0x14}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0xf, 0x6, 0x801, 0x0, 0x0, {0xc, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000884}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:10:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:53 executing program 5: iopl(0xff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x79ea}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:10:53 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:10:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x33fe0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:10:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 6) 13:10:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:53 executing program 5: capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:10:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:10:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 7) 13:11:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000}, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x8, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:11:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:11:08 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:11:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x0, r1, 0x8) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0x6, 0x1, 0x1, 0x0, 0x0, 0x2400, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x40000, 0x8, 0x400, 0x7, 0x5, 0x4, 0xffff, 0x0, 0xfffffff9, 0x0, 0x1ff}, r3, 0xb, r0, 0x1) [ 1003.974218] FAULT_INJECTION: forcing a failure. [ 1003.974218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1003.975847] CPU: 1 PID: 6994 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1003.976936] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1003.978002] Call Trace: [ 1003.978353] [ 1003.978678] dump_stack_lvl+0x8f/0xb7 [ 1003.979222] should_fail_ex.cold+0x5/0xa [ 1003.979775] _copy_from_user+0x2e/0x180 [ 1003.980308] memdup_user+0x72/0xd0 [ 1003.980788] strndup_user+0x78/0xe0 [ 1003.981286] __do_sys_request_key+0x146/0x3b0 [ 1003.981896] ? __pfx___do_sys_request_key+0x10/0x10 [ 1003.982546] ? trace_rcu_dyntick+0x1a7/0x250 [ 1003.983148] ? syscall_enter_from_user_mode+0x21/0x50 [ 1003.983826] ? syscall_enter_from_user_mode+0x21/0x50 [ 1003.984522] do_syscall_64+0x3f/0x90 [ 1003.985042] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1003.985728] RIP: 0033:0x7f1da7f6db19 [ 1003.986212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.988546] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1003.989573] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1003.990478] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1003.991377] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.992290] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1003.993194] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1003.994132] 13:11:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:11:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x410, &(0x7f0000000140)=ANY=[]) lgetxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="75734f912e5c5c2c5d5b5e272a2f2c2baa9b43e178a51097068e92009f66ea6dd0eeb9051285a11c2288770b97402aa84a0a26a11461b19079673c6f479c05b8b558151a9114385ec24cc1800257a1bdea55259c92766a94cde2593d60a82c44904d4d07e73f8f480d2b3c0492ee5a172626ea51ba1046f4b988124cb3d22f07e87dc2a46b6ffafb"], 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xec465000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) write$bt_hci(0xffffffffffffffff, 0x0, 0x13) openat(r0, &(0x7f0000000040)='./file0\x00', 0x800, 0x25) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x11c) pwritev(r2, &(0x7f0000000680)=[{&(0x7f00000003c0)="96d2c46c4469f48fb25175a44a1e67ccf41b2eff39c06a7106719880d782c05b613535b4d8b01c1d9b1dc24bd8ed1edb197c2cfd261d0d512280655ab0b9aa7b12828a0ff10cffd3135162ed541cefe513524f4d7345d0da1e86901e0d42e7471d7138f8d0caf8fd292023d3883c7367e64a5024", 0x74}, {&(0x7f0000000440)="466655356874ebfd90234ba38eb742e271e252f200142e53ed4024a0d5347a251f23961080011adc5343d30583b7040b71424886f3f1f8d37ac85b6487a3ada565941ad660f03328c9304c3c9f1d22703044460d8d610fcce38d71866ba12352b6a763a52efaab11376f3c6ebad4d5465a78d2b4840e6b522429deb8b3a3c57f110a9372f72f0fd5d41ca1", 0x8b}, {&(0x7f00000001c0)="79a900cd6e75c83655f0902d37427034973d39d6aca88a44747a57e69cd47503dee9fe31edb1860f75bb35e5ae90435276380336b674f01c", 0x38}, {&(0x7f0000000500)="cd7ab6b6a2be11d6b01baea3e647111cee2cc0c66f0e0d4424635379807e1c9cdf354edab4df1a199256c87ea60eb0fa8112bf35a71cd32c4795601f1a37f17d1c9b2c4b43b16a27f4c8d06394e1365eb856ba12625867db36b379e85fe086d553a1e9cc12a85ab60d17a9c29c16c3fb61790b9d071c9aa73ac80895b12826dfe3dd80c5ac9d7ad642c616ee0d", 0x8d}, {&(0x7f00000005c0)="08ffae018a719dc2c93208bd3f25b1652643438eeeabbdee19c9b53e312c77a8a52728e6e66d07508b987e57a9efebc67855a274dcd387125a65d7b3adb4b37d11653b48aa6fd6166a49d52e387eab82580fef9339f578bedf477ff2fed0a5e73a6fb05237c09815999f56d96d37a78d24bcbe394383e588fc31bb7944e9558856506a06e8864a08702977", 0x8b}], 0x5, 0x400, 0x9) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) open_tree(r3, &(0x7f0000000240)='./file0\x00', 0x80100) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 13:11:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 8) 13:11:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x80, 0x2, 0x4, 0x1, 0x0, 0x2, 0x100, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0xffff}, 0x200, 0x100000000, 0x5, 0x5, 0x9, 0x854, 0x5628, 0x0, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0x10, r1, 0x5b12c46c42812bc9) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x5, 0x81, 0x3, 0x7, 0x0, 0x4, 0x4000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x3040, 0x8, 0x8, 0x7, 0x8482, 0x8, 0x8000, 0x0, 0xfff, 0x0, 0x7f}, 0x0, 0x10, r0, 0x0) 13:11:08 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {0x0, 0x0, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) [ 1004.296745] FAULT_INJECTION: forcing a failure. [ 1004.296745] name failslab, interval 1, probability 0, space 0, times 0 [ 1004.298307] CPU: 1 PID: 7016 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1004.299333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1004.300355] Call Trace: [ 1004.300693] [ 1004.301035] dump_stack_lvl+0x8f/0xb7 [ 1004.301562] should_fail_ex.cold+0x5/0xa [ 1004.302109] ? prepare_creds+0x2f/0x6f0 [ 1004.302635] should_failslab+0x9/0x20 [ 1004.303144] kmem_cache_alloc+0x5a/0x410 [ 1004.303701] prepare_creds+0x2f/0x6f0 [ 1004.304203] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1004.304888] lookup_user_key+0x387/0x1260 [ 1004.305442] ? lock_release+0x3b6/0x750 [ 1004.305976] ? __pfx_lookup_user_key+0x10/0x10 [ 1004.306564] ? __pfx_lock_release+0x10/0x10 [ 1004.307130] ? trace_lock_acquire+0x14c/0x1c0 [ 1004.307737] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1004.308457] ? _copy_from_user+0xf6/0x180 [ 1004.309010] ? memdup_user+0x89/0xd0 [ 1004.309515] __do_sys_request_key+0x1a4/0x3b0 [ 1004.310118] ? __pfx___do_sys_request_key+0x10/0x10 [ 1004.310770] ? syscall_enter_from_user_mode+0x21/0x50 [ 1004.311445] ? syscall_enter_from_user_mode+0x21/0x50 [ 1004.312129] do_syscall_64+0x3f/0x90 [ 1004.312638] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1004.313333] RIP: 0033:0x7f1da7f6db19 [ 1004.313820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1004.316092] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1004.317090] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1004.318015] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1004.318944] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1004.319862] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1004.320789] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1004.321769] 13:11:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x80000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:11:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 9) 13:11:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000100)="fd87d09a5c811a9f114cc1c6c40abb7c4675a3b033398a0d0f5ad608dab1eb64e4f3a8c9c1916c47e6a6bb633a6f248645b96a7db16793542fc111c5abc6a7d95f9bcbcc43e58222a4c9689a01456341c8ddcba56560b4697b1eeed5c9f5ac34a4c9ecd637574449ba085910d27fe8d9fa38b311d71de739b49e517ddc63ae43ecb8bea4982ff8b1bb3efe206393c768af33e65c86038f7fd26c5073cbe414ae4e7d0e23c93d69e0aab158cc28866b844ff6579e229539189103e1224e337d9f7b4360", 0xc3}, {&(0x7f0000000200)="220ecf3471d1e5a11544ebaa6e29dffb1cfc3313f7111e5c02bca29450a384031b81906dfcbcf8ef134d0b28ceee57c721a26ed73106b04ad53f6b97fbdef1c9914f4b94fe4ec7639865a6a66282d9b29360462a6c21a9f09a820afda67d988a43e57bd49dce6550a8971d7de57aa27678e07d19", 0x74}], 0x2, 0x7fffffff, 0x5) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000002c0)=0x5) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x1, 0x1f, 0x0, 0x4000, 0x8040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0xfffffffe, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(r0, 0x80000000, 0x1000) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300), &(0x7f0000000340)=0x14) 13:11:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:26 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {0x0, 0x0, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:11:26 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=@v3={0x3000000, [{0x61000000, 0x1}, {0x7fff, 0x5}], r3}, 0x18, 0x2) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r2}, {0x2, 0x1, r3}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) r4 = epoll_create1(0x0) dup2(r4, r4) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup(r5) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000002880), 0x4000101, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000480)='\x00', 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000400)={0x1, 0x0, 0x1000, 0xdf, &(0x7f0000000300)="b224337e70d2cd0e51711ca09aa7129bf09ae25a25c69a1f2c03ad51bad5dbc1c3b6ecada919f6be87e4031a9f74c0ee5cf9c1684a0790dad073abeb2ebe7d80d5ae4246854fca85b56b299894e114aa0070d62c3f1d509dbefddc56d21531ffc6719c168c4169c4322e0647736698c4f9d83ee352f4ac518c9002a0c7efe0cc5068085914dc872233fa18f3cf3623dae571217a6be50f67bcac77bd844d137b5d29793622185f56448bd3523bc83e966e91ea04c40eabc50a0d8cc74d51061011a10b8bcbfca9546f735c647fe8335b56790515984982d3192b4505bb2a56", 0x13, 0x0, &(0x7f0000000240)="7cba72e777b46ef9643162f0987a1895a65504"}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000005d80)={{0x1, 0x1, 0x18, r0, {0x5}}, '\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:11:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:11:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 10) 13:11:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x4, 0x1, 0x3, 0x0, 0x0, 0xa00, 0x6, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000100), 0x5}, 0x4c, 0x1, 0x5, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x81, 0x0, 0x800}, r2, 0xffffffffffffffff, r3, 0x3) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) 13:11:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1022.181722] audit: type=1400 audit(1672751486.660:24): avc: denied { tracepoint } for pid=7044 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 1022.197130] FAULT_INJECTION: forcing a failure. [ 1022.197130] name failslab, interval 1, probability 0, space 0, times 0 [ 1022.198780] CPU: 0 PID: 7071 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1022.199821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1022.200863] Call Trace: [ 1022.201220] [ 1022.201536] dump_stack_lvl+0x8f/0xb7 [ 1022.202076] should_fail_ex.cold+0x5/0xa [ 1022.202642] should_failslab+0x9/0x20 [ 1022.203169] __kmem_cache_alloc_node+0x5b/0x400 [ 1022.203787] ? security_prepare_creds+0x116/0x190 [ 1022.204451] ? security_prepare_creds+0x116/0x190 [ 1022.205102] __kmalloc+0x46/0xc0 [ 1022.205612] security_prepare_creds+0x116/0x190 [ 1022.206262] prepare_creds+0x509/0x6f0 [ 1022.206786] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1022.207474] lookup_user_key+0x387/0x1260 [ 1022.208043] ? lock_release+0x3b6/0x750 [ 1022.208581] ? __pfx_lookup_user_key+0x10/0x10 [ 1022.209215] ? __pfx_lock_release+0x10/0x10 [ 1022.209808] ? trace_lock_acquire+0x14c/0x1c0 [ 1022.210455] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1022.211194] ? _copy_from_user+0xf6/0x180 [ 1022.211748] ? memdup_user+0x89/0xd0 [ 1022.212264] __do_sys_request_key+0x1a4/0x3b0 [ 1022.212891] ? __pfx___do_sys_request_key+0x10/0x10 [ 1022.213559] ? trace_rcu_dyntick+0x1a7/0x250 [ 1022.214171] ? syscall_enter_from_user_mode+0x21/0x50 [ 1022.214865] ? syscall_enter_from_user_mode+0x21/0x50 [ 1022.215574] do_syscall_64+0x3f/0x90 [ 1022.216098] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1022.216786] RIP: 0033:0x7f1da7f6db19 [ 1022.217280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1022.219543] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1022.220534] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1022.221446] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1022.222343] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1022.223232] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1022.224132] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1022.225095] 13:11:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:26 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {0x0, 0x0, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:11:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:41 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000), 0x0, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:11:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:41 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) pipe(&(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') dup3(r0, r1, 0x0) pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000140), 0x200, 0x201000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000180)=0x7) 13:11:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x3010000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:11:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 11) 13:11:41 executing program 5: ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:11:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:11:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 12) 13:11:59 executing program 4: sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x6, 0x8, 0xe0, 0x3f, 0x0, 0x4bbd, 0x8000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x400, 0xffffffffffff8001}, 0x3, 0x9c, 0x0, 0x5, 0x6, 0x2, 0xd7, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000002800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000000)={0x80001014}) r2 = syz_open_dev$vcsu(&(0x7f0000000100), 0x9, 0x400d00) sendmsg$NL80211_CMD_NEW_MPATH(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYRES64=r0, @ANYRES16], 0x68}, 0x1, 0x0, 0x0, 0x82855}, 0x41041) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) sendmmsg$sock(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x3, 0x2}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000600)="75ba41887bdb5262cebeaea2796e953c054723a32acc788e19182898de6903a851a1ce88d6fe6186cda79b5ade91b51ed24639bf831b21ee92d8da49fdf8b12d4f8ba133916e49ab43", 0x49}, {&(0x7f0000000680)="74a2ac0cfcc7d5defc3c98741bdb3bd947280cfda1337ddbeb239161e86af85d0048f564baef63a65f78d097bc99cabd934e95d7ec1825244637278aa91992399f77806c048381cc6bd6c5a945a5", 0x4e}, {&(0x7f0000000380)="35f1f78cea4dae6f2b9b1499d93ba218a73fe477e3d617acc3d643fb23e190dabf84ccccabb82e7c70dcb625bdd3cfacd09c8d", 0x33}], 0x3}}, {{&(0x7f0000000700)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e23, 0x6, @rand_addr=' \x01\x00'}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)="209ca708f3ef628530dbd5088a5102ad618fbff15cba18d851ce779b13b901b6681c7729f982412e4edbaabfb1b5c420a7f2e531a7485e4c2df55d5374c66a70cd7aed5deaeef4ece675801142727bbe960769e829e62fb4aa417b100abc7c3e826c87cfb43d47bd517e8fc0b90292a06b1795274c87d87ee49943def16cb0ad71fa59544229f635130720c8dea8e90b52cb80fc1fb1929db4c8e3a6a824327b128d218d9afdd95802f2b7d619aac1c2a5779179952b00fce5a0cf35fb4de963d3fda5b9238a3a1319dca0441bcf28162bb5d5a4bcf68736ceff7f224ca149a555760f441498f26787b912bf7948debff366a129c9", 0xf5}], 0x1, &(0x7f00000008c0)=[@timestamping={{0x14}}, @mark={{0x14, 0x1, 0x24, 0xfffffff7}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xb6b4}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x90}}], 0x2, 0x400c0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000140)) close(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x80000f, 0x11, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x7668, &(0x7f00000003c0)={0x0, 0x132c, 0x10, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000440), &(0x7f0000000480)) 13:11:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000), 0x0, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:11:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x77, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xfffffffffff7fffd, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) fallocate(r0, 0x44, 0x3, 0x5) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80960, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) r3 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000300)=0x80, 0x80800) connect$inet6(r3, &(0x7f0000000340)={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x2}, 0x1c) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x5adc00, 0x43) write$binfmt_aout(r4, 0x0, 0x220) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x4e24, 0x7, @private2, 0xd2d7}, 0x1c) getgroups(0x7, &(0x7f0000000380)=[0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0xee00]) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x2, {0x18d2, {0x0, 0x3}, 0x80, 0x0, r5, 0x1, 0x7, 0x9, 0x100, 0x3, 0x9, 0x10001, 0x8, 0x10000000, 0xba, 0x8, 0x8, 0x1, 0x1000, 0x8}}, 0xa0) r6 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r6, 0x0, r1, 0x8) capget(&(0x7f0000000200)={0xaf04b395ff6d1e40, r6}, &(0x7f0000000240)={0x9a9, 0x10000, 0xa85c, 0x3c, 0x8, 0x3}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/key-users\x00', 0x0, 0x0) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x94400, 0x0) connect$inet6(r8, &(0x7f00000004c0)={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x3}, 0x1c) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x9, 0x8, 0x7, 0x0, 0x6, 0x21003, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x415a1, 0x5, 0x0, 0x8, 0x1, 0x200, 0x1, 0x0, 0x101, 0x0, 0x3}, 0x0, 0xe, r7, 0x0) 13:11:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:11:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:11:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1054.962649] FAULT_INJECTION: forcing a failure. [ 1054.962649] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.963491] CPU: 0 PID: 7141 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1054.964077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1054.964639] Call Trace: [ 1054.964839] [ 1054.965021] dump_stack_lvl+0x8f/0xb7 [ 1054.965323] should_fail_ex.cold+0x5/0xa [ 1054.965646] ? key_alloc+0x3d5/0x1280 [ 1054.965931] should_failslab+0x9/0x20 13:11:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1054.966223] kmem_cache_alloc+0x5a/0x410 [ 1054.966725] key_alloc+0x3d5/0x1280 [ 1054.967017] ? lock_is_held_type+0xdb/0x130 [ 1054.967347] ? __pfx_key_alloc+0x10/0x10 [ 1054.967647] ? security_prepare_creds+0x116/0x190 [ 1054.968005] ? rcu_read_lock_sched_held+0x42/0x80 [ 1054.968379] ? trace_kmalloc+0x2d/0xe0 [ 1054.968671] ? __kmalloc+0x73/0xc0 [ 1054.968942] ? selinux_cred_prepare+0x13/0x170 [ 1054.969290] keyring_alloc+0x46/0xc0 [ 1054.969598] lookup_user_key+0xbef/0x1260 [ 1054.969914] ? __pfx_lookup_user_key+0x10/0x10 [ 1054.970250] ? __pfx_lock_release+0x10/0x10 [ 1054.970577] ? trace_lock_acquire+0x14c/0x1c0 [ 1054.970917] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1054.971330] ? _copy_from_user+0xf6/0x180 [ 1054.971640] ? memdup_user+0x89/0xd0 [ 1054.971933] __do_sys_request_key+0x1a4/0x3b0 [ 1054.972274] ? __pfx___do_sys_request_key+0x10/0x10 [ 1054.972682] ? syscall_enter_from_user_mode+0x21/0x50 [ 1054.973077] ? syscall_enter_from_user_mode+0x21/0x50 [ 1054.973482] do_syscall_64+0x3f/0x90 [ 1054.973789] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1054.974194] RIP: 0033:0x7f1da7f6db19 [ 1054.974482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1054.975784] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1054.976335] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1054.976845] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1054.977363] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1054.977900] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1054.978433] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1054.978987] 13:11:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:11:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:11:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000), 0x0, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:11:59 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x51, 0xff}, 0x0, 0x0, 0x3, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x39, 0x8500) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6f, 0xdd, 0x2, 0xca, 0x0, 0x0, 0x10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x842, 0x8, 0x7, 0x4, 0x5, 0x9, 0xfff, 0x0, 0xffffffff, 0x0, 0x896}, 0xffffffffffffffff, 0x8, r0, 0x9) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) capget(&(0x7f0000000200)={0x20071026}, &(0x7f0000000240)={0x1, 0xfffffff9, 0x7, 0x7ff, 0x20, 0x76f}) 13:11:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:11:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 13) 13:11:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) io_uring_enter(0xffffffffffffffff, 0x58df, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x180, &(0x7f0000000540)={0x0, 0x0, 0x2, 0x0, 0x27e, 0x0, 0x0}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x2) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x4d, 0x1, 0x3f, 0x8, 0x0, 0x200, 0x0, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x1}, 0x10002, 0x8, 0xfffffff8, 0x2, 0x100, 0x5, 0x4, 0x0, 0xffff, 0x0, 0xe707}, 0x0, 0x5, r2, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(0xffffffffffffffff, 0x80049367, &(0x7f0000000400)=0x2) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x14b03, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000300)={@id={0x2, 0x0, @auto="0059685263ded7d1b41834e2062127e6"}}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140)={0xa49, 0x4, 0x5, 0x0, 0xb0000000}) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') 13:11:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4a010000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:11:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2}, 0x1c) 13:11:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 1) 13:11:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9", 0x12, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) [ 1055.282300] FAULT_INJECTION: forcing a failure. [ 1055.282300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1055.283291] CPU: 0 PID: 7181 Comm: syz-executor.3 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1055.283843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1055.284396] Call Trace: [ 1055.284587] [ 1055.284755] dump_stack_lvl+0x8f/0xb7 [ 1055.285050] should_fail_ex.cold+0x5/0xa [ 1055.285358] strncpy_from_user+0x38/0x3e0 [ 1055.285678] __do_sys_request_key+0x85/0x3b0 [ 1055.286009] ? __pfx___do_sys_request_key+0x10/0x10 [ 1055.286377] ? syscall_enter_from_user_mode+0x21/0x50 [ 1055.286751] ? syscall_enter_from_user_mode+0x21/0x50 [ 1055.287131] do_syscall_64+0x3f/0x90 [ 1055.287415] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1055.287791] RIP: 0033:0x7fe3ed5a5b19 [ 1055.288056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1055.289244] RSP: 002b:00007fe3eab1b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1055.289773] RAX: ffffffffffffffda RBX: 00007fe3ed6b8f60 RCX: 00007fe3ed5a5b19 [ 1055.290261] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1055.290743] RBP: 00007fe3eab1b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1055.291218] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1055.291698] R13: 00007ffe3d8a527f R14: 00007fe3eab1b300 R15: 0000000000022000 [ 1055.292211] 13:12:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 2) 13:12:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:12:16 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x4}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) sendmsg$802154_dgram(r2, &(0x7f0000000680)={&(0x7f00000005c0)={0x24, @short={0x2, 0x1, 0xaaa0}}, 0x14, &(0x7f0000000640)={&(0x7f0000000600)="c60f", 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x4004800) pwritev2(r1, &(0x7f0000000580)=[{&(0x7f0000000bc0)="f4647a8273771cdf8fdab968ea61af73a840ab582e59aa93d9b0dc81d2d69af7089368ba31b4e95357bbf3c9d083291cd1b73efb23d20f0fbfb6098f549f603037607b48be2a92bd7fe580c28dbab837109fdad16e96b1202c08f7f46876e8ee03db5b9db8f49233047b679b5ccb619648bae9adefb34b7057588db523fe404249c617532c2a95059d4b0a96fce3ab5b748ff14e505ef87cd840c3572b9b2b6e4b67b97df261b66b411fb54dfb694dde7e7d49a2279fdfb170e121277770c093430bc259417154bda30bcd25ed88146ac2043fb63c1fdb2682ffc3ea3260534c85dfd603e171e28f79de7aedfbad8ea0ab072ea5cd841041f501557725902fe0a0eeeb3e6d5734fd2cf4676bfeab7e09c2808a5a46704ca75c154f657f514535751c26985a27f34813da61e08e8658741ae238b8b3bf794994ce69d84c57c5e090d23e4b52f072632633c14f5bd3f806601b96e090e46cfc9b5cf1cc514810a093b5fd13608d927f94590d763db6ed091250337f52c8a3390b69c7585c86089d1ab20888f1ea1c9f031047213644764a4c9d2e6d475e122dfca8934e4dced20fea61358d65f7ac31b5fd318dc09c76af36cd6e6dd3967af29159a2485d5802f60d25fd4a5947e0f2acae01daefb675385331bcbb315a93b3b6e27da7ad0225fdfe850f570e640fad4bbac828ca2fd5bf727e396f52867bb90f3d2f48e5386e3aad27227fdbf38d0d13f657e6b421c0004dbe0dadf9f785220420cf3238dc886063e7748eef5b1e49287bcdfc818f855b97085afeac63db24662fbf067fd929424a5cc4978fd1671fa2a03da7b5d5a5cfeb54e8177e91297241def3f3243626ed6bda9d0957acc4fbd655c5db2d01bcb9e13f0e2b6c0b216b2f71dbe04dd8aef69c7b0b65343b1bfaf5ff3397db86a3da5559ae2c5b00f9dc550ca09bc19675aeabc7e6ed97d91c92127c6a21080505e2afc533a4241718d839acf19a03a98b798b926a266165ca7f6df8f4ff14bfee4bb1f7d3edfda5b7384b3a6324d82ff9bffe6a85e9e5c66031ffc1787a8b585d9a8cf0d35fb507e0e7ee0e12f3c3f59e21262cfc2cd009f2bdd8c58b2ab13316ecb7f7ca4a1fbba4feee341ece5775b5040c10174f1e4eb5292dd146bcba4c474a65a39eb0aeca82a149ec66005dd4db0a3b6d0c3b708ff25502e01dbab40e7ad44a7901911ca0135c21f8176337e4b545bed793566eb28e5567a949f29fa23fe86df634e37aa353211026bb452d733631d507d768536053354690526966a54dc8d8d534be25ad85afc85ed880efa16633ac93a4011ccd642010175cfb6fb99dd5c941a776d103d5b8ee0448bc6919a69898acd99332b696ad3247232f50f1b39dcabf11bdee049fd6e9355151861c5c09fdb97fc4d71a44bb48925b9a694f7a455c2cd7cc47f7f45dda930fc6485d6748fbc27e3957623996e51f9cd29039a5d4ef949acfc24bfc83177b0de883b4292312b5412392ffad51adf00e0d85cdad0836c8cb49aab2016b0cab79f3bee04a45d075faad14bd78cd5c1214302f33934e8974dd5ec2ec480292322903f3234827fc6cf8dd85a9ad265379dfcc85f8e50304cb848c4ef3d4937537db82cf2703a3d0e285233f99ed7c9dde223cd4b2cece39300684cc2e84ba650697d1438fe897259c6cc3908dcd284f06058d559570528894ab23924640a5fe040a803195a608b0674bff2395ffac0db4e076bd25d387d8a6d7459f5422c61e0d277107fee74f18d52446f909fe95d51dcd2dd829f6b162ace5dbc4d1f69ac8e92e1c30dffe260d42196fa6638a06da45b418cc4d40160d2e67a2506f3a7343d6baa07c1bb330665abbfb358ccb6a7c0c7b21a771ffda1ae5a33fc94937f88c1115e73d7e8cab72bbb2b0100ae3012d8525044c1b7bd735a3d5b0b5f5a566dc6e06d725ce54ba7a85a1ad68b4a921c81e5cdb360910001fc6b717982aa89c5a724736413afcf1141c1aa2da041d0265bbf396ce167269466f9233eec13a366903df8011b0bd0a3c466c7613bf84879a82c14cdfbd633310272e8864a3eaef2067693d720bda2e291beb19d6219ba84f47f6a923717d14fee44ac6a277b710d2c8f90deaf457a98eb00f2ba5f289685770778e1755c7bf244c944af37fb9c7f3ad9dbdce3e5da24507ad02a928f106b124e49dd6ceb4c868b4b9eb737c1b790b23011e3172e6d8c3e6c29959e71d6dbb67050a912fb97eef7817a900d462b49fcd5e013e047afd949aa97a5a0d05808be8ab7f37b8c3e8d84a88f9a80468bd953c4b6e62b3637699b3dd2c12ee8b8a8678419611cba2434e145463f96438c19dd606e08f5f2d22b560ea4917467b558d6980cc04ef4232badf65c455dc7029aedeafb277185c42df401ca7f1678e96487d330fb3a4fe467e19a42f625bc116b9c485b46f28e560a00905b43211c93e680033ee35580fdffaaea83a0dabb411df2bcac5d127144df68408895f90f354eff505cdc0b9c391d99434db5a2aacee6fef42ba1d00eced5c911024d7c1a709cdf93af3523e91e637f02a3f48eaceef0bbca516327dd7642fb4b4dc817229292deb9abf4404f9be7e9a2c61ed7bae3b7be3d80d09787fd25314bf11b3ff6938d16dfa362b35b5dda979766e4c50a8cd69b905dc5e36dfd02bf2b92e5d320b42034a5418bba2ca71a500562e9c4d62cf614019bdb2c5fb099d091089f0c4ceb5cd18f8ae518e39470758a0b3934e3f0866a251be4a909bb5ee6c9076cf38dd9daed4e3fbcef2ef91e6b4f1d29c96ce6b044e5558dd085f79cc1fc70de40c7d8935169fbbbd7f28042657219ddedaae24b0af377528314923fb1551823e2aad19cdd3c198dc43905abd89b7f74a9ac75c57ce76167d7dc3ffd7460b479adeb24770303b21788133fd148b1a74c7c2b0c8703636adfe2d6dbb0223090060e4921e370166c887b092d6497a7a57533883fbf226f884b49bad886e8ec5d25476e405abf271ef62d138a31fe85fb2906cc65de56f2bc97589d8fbe4567c1f973d5759f24d56dbaa12ff4785e4dd2cab78ab17660568868aa17a8d58689aaf15b9ba1d36674baaed6c43eb82b5b3115e53796e832b1a36b2cc8ccee2b1d3fac198cfcaf0112189770e7974ff7666397b38f673d9f94245af32698945c3e003c1282155e446e567237f4bad8d2183c0711dcd1a603bf62e1beaa1de6510a039e45a2f3b8e317c3b656b64040361daa65eae535cf87c8639b138856f9bd930a85fd9300fda8add2abb7cc441197c766da35cf56c0bf6e4aa4a5de1d30719404c86910018c8a4246c050d0d6869aa5d16ab15f6724901c737ef9bfe895a5203d9e7478c72f1f7f4b83d772d871da2691ffd016553f4edad8fef4fbe9435300c36733776945720627e07066f10eb0e96c50a662d62169763895981772ffb39c15f9fd4a2d90200c4ad8a8460f92884c9872bc3f436000f7455226c3e970041c66710c88b4bdb7e62456c68a9354858201f4b69663883f5ee7fc056dfa466b9a5c36c877bf9bd2e12fee779a40f8a9bf17c5023f88395fd03982c1f89e8b79eaa73853fd39b3358ea48bd5532a93705c43388236296dddfefc7cb0020537094d7aadf3c4b0130db78542ba1ca6b238caccd3f2d44355e30e3ba321af59061e0895a7a21e62a83aab2a12a7361082b29b71e2734b5b1c8ff1a4d9d4f31087ebb2c9b40592ec3460b9aa37a80f6bb12114a4e73aea4e441680d7136007704ce28ea04feaf48d6832f0f2510234dd3204fa5d4f92400e6ca8ecd61ac75c27133f50ff7a99d8464647c60eb39eb57c1a97590149722d094fffb857949380cce87ee561efe0fc9a02872ffd7265b105e7f5ff456d4d72670ba0747d7ce44638e8cc478b85da3c35886d9d09892bf9d648944e6503c189ee1fe26b49ca06207fc77254b07350b412feae1a7f1046f0b0b9e6baf09c7fead56c74d8e9c154a23155b0b0085cc57ee52a7ff6967d644751fcad7cd53e2d5af25fb73202787952b102e04906df66182297b4497073a7dc883b1e5a1fa77483c466679d9cd8ccc51c718cc629b79576f43e3453b7fb80253346a58618b4994b62640cc444cdbfff0919543baa928a4be7f6f1f92c9eefb42908044968e60f31b54cc67da5a83f2f754ec609b2b65f93cc98beffad36fb9de2c1c910cbb0c9f0fcd662bb450863774b114ad4e785c2495c18bf3b4c2f176c02a71f10e531f6363bd8ed601ef26e4ef458e8c96688e4a6c7d901d854fde3e554f9c2389821e8a05d9f0ea62291a0aee989e4aa38524def1a1e2c3d33f21005b308041ad76cb2a41423e5f37ca5e43060b4c64d2c0d2524a89d52992fb04bf7f6b6e7b2a4cef32907147957f29bdb5e9dbd86f9a39da5ecf6c530d7107a02ba4b6ab2081e191efe418267fddc327c46680215c59263a4ae36f9e50c29722bf7588cdddffeabfdbed4d23d30c0680d855c4c8420340c79596e601b82170eea66b141e4111f9d76dd91daf53dac4e3e38ca4710a9e10af471d9eff7e0904cde5fa227da47fc35f1bab04c9a53c9822a0c15ce7492d4d153a6356d901cf2fd07cf287c35efbc2260008d62a9965eac3687a8e525cf50c03683ae7ed9efb111273b7109533618f8c8f31360c5e7e31c5a0b08845ac1a331fa2ef6a5650d59c1572cb980e2e5f3aa8f572f09c673d1c772ecfe31ed75fab8694cb6ab43d365d256ea2866a41bba698f8c304901d01613f674d0c2fe63388efb28b164b182e12e85a19731fbec0d6527940ce9308aa1169a8271bdbf627b7ecd21eceface71e13232cf04ebd0662025e7a1abbc2decd7e145d4d094cd63cc42ad2e944d8c3ae24bf5f71f9b9695e61677ba915921dfa8051ab69a18afaf085a5a965561465a1441ab663e8912051559eb8d8418d84c96d01fac12eedf40f81acf5f8e490425f49a76d52cb549d477e2cb61a3221d4dab2fc00e88cb7d082366e57f77f5bc6253e505f9fbd2e9ea56001fbc064fc8f87e030ac8a470315fc789c858bc260631eeeaa3cdcc1a516727d32f7055950ba05cd48924df455da7bb5e3eb6fde4502a2e92385840d52d2b7f0fe9525940b52d5d4215b4301200a949f004765422156ddf9f94b7ea30b9695113f58c7b00ae42491cd7f3b8bec344e4b4431a22916647cb12c5d8a85d886df2e12e155c2e3199cf25393e1c69be9138736f7077d44f28f19761b0424cbf1952fed21f752accb5f79835d1d08f36d06f44e5e40e9fcb2980d3a9d062ba999040f73f72bcd53e0982d8a82c879ae2393f603d5b2cd4db706e5546a779f0eeca00d3071c8261560aa6ccf03a9e6eb88a9b0c78b1625b438d3c519ad52dc9dc77e09040022ecacf80453671aa6b0571fa9a9d1ebdbb8559ccc663fd2d4549eff4bfe234cd2162629e548fac00b415479f7c6236854a56653a71d8c611e73e411fcdbc6714e197493bed960dc6ab9dca392ee749d140f83cc73fd1fa264964739035d9223b82b3a14633804f1dfc964bed88f4025fe3cbd64a57bbe86f01e61dfdedd92734b68ace83bff9e1a9f77fbd34f387ac99c99a658ebf3dc7bfa85d2464293036740094d5b16858e46ee0298047090589e86a8e59de9e51b1a8f18f4f0c22e984b4771649dc9328fbc5ac59e2507d13150d6d8b46203cb5a8ad175801035e2601e81859c0b252b32a173c4753ba0cae029c6a0e9b39569cc410d634039ea012c7090b843bec92560734eddc78e4d13a2795647525e4c2f19daf347e0b8753852aa2d694d2ef9de510101c", 0x1000}], 0x1, 0x0, 0x36, 0x4) r3 = clone3(&(0x7f00000004c0)={0x400, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0xf}, &(0x7f00000002c0)=""/229, 0xe5, &(0x7f00000003c0)=""/155, &(0x7f0000000480)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x58) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x80, 0xc1, 0x6, 0x0, 0x63, 0x80008, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0x81, 0x3, 0x9, 0x200, 0x36e, 0x787, 0x0, 0x0, 0x0, 0x3}, r3, 0x10, r0, 0xb) r4 = syz_open_dev$mouse(&(0x7f0000000840), 0x1, 0x100) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r5, 0x0, 0x220) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r4, 0x8008f513, &(0x7f0000000540)) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="08000501", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r6, @ANYBLOB="10000700000000002000040000000000"], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01, r6}}, './file0\x00'}) 13:12:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:12:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 14) 13:12:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x6e000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:12:16 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000380), 0x4080, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32]) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x80000001) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0xf6, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x0, 0x100000001, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0xffffffffffffbb9b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000380)={r0, 0x8, 0x1, 0x400}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)) r4 = eventfd2(0xae, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r4, 0x810c9365, &(0x7f00000003c0)={{0x2, 0x26c}, 0x100, './file1\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000240)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}}, 0x0) fallocate(r5, 0x0, 0x0, 0x87ffffc) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r6, &(0x7f0000000080)="01", 0x292e9) 13:12:16 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9", 0x12, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:12:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1071.806746] FAULT_INJECTION: forcing a failure. [ 1071.806746] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.808748] CPU: 1 PID: 7199 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1071.809890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1071.811019] Call Trace: [ 1071.811402] [ 1071.811755] dump_stack_lvl+0x8f/0xb7 [ 1071.812360] should_fail_ex.cold+0x5/0xa [ 1071.812965] ? key_alloc+0x433/0x1280 [ 1071.813533] should_failslab+0x9/0x20 [ 1071.814101] __kmem_cache_alloc_node+0x5b/0x400 [ 1071.814787] ? key_alloc+0x433/0x1280 [ 1071.815359] ? key_alloc+0x433/0x1280 [ 1071.815927] __kmalloc_node_track_caller+0x43/0xb0 [ 1071.816656] kmemdup+0x2c/0x60 [ 1071.817147] key_alloc+0x433/0x1280 [ 1071.817709] ? lock_is_held_type+0xdb/0x130 [ 1071.818359] ? __pfx_key_alloc+0x10/0x10 [ 1071.818952] ? security_prepare_creds+0x116/0x190 [ 1071.819664] ? rcu_read_lock_sched_held+0x42/0x80 [ 1071.820368] ? trace_kmalloc+0x2d/0xe0 [ 1071.820967] ? __kmalloc+0x73/0xc0 [ 1071.821503] ? selinux_cred_prepare+0x13/0x170 [ 1071.822198] keyring_alloc+0x46/0xc0 [ 1071.822764] lookup_user_key+0xbef/0x1260 [ 1071.823381] ? __pfx_lookup_user_key+0x10/0x10 [ 1071.824034] ? __pfx_lock_release+0x10/0x10 [ 1071.824678] ? trace_lock_acquire+0x14c/0x1c0 [ 1071.825368] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1071.826163] ? _copy_from_user+0xf6/0x180 [ 1071.826789] ? memdup_user+0x89/0xd0 [ 1071.827364] __do_sys_request_key+0x1a4/0x3b0 [ 1071.828050] ? __pfx___do_sys_request_key+0x10/0x10 [ 1071.828813] ? trace_rcu_dyntick+0x1a7/0x250 [ 1071.829493] ? syscall_enter_from_user_mode+0x21/0x50 [ 1071.830279] ? syscall_enter_from_user_mode+0x21/0x50 [ 1071.831053] do_syscall_64+0x3f/0x90 [ 1071.831628] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1071.832388] RIP: 0033:0x7f1da7f6db19 [ 1071.832940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1071.835485] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1071.836553] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1071.837555] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1071.838584] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1071.839624] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1071.840651] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1071.841711] 13:12:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 3) 13:12:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x803e0000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:12:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:12:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:12:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa8088, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0xcc80, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) r0 = syz_io_uring_setup(0x4cdd, &(0x7f0000000140)={0x0, 0x6c4c, 0x0, 0x2, 0x20f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000300)) syz_io_uring_setup(0x2c86, &(0x7f0000000600)={0x0, 0x0, 0x2, 0x6, 0x210}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000480), &(0x7f0000000800)) r1 = getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000004, 0x2811, r2, 0x0) get_robust_list(r1, &(0x7f00000007c0)=&(0x7f0000000740)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)}}, &(0x7f0000000840)=0x18) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000340), &(0x7f00000005c0)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x7, 0x3, 0xa6, 0x0, 0x2381, 0x400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x393a, 0x4, @perf_config_ext={0x7, 0x101}, 0x5209, 0x7, 0x9, 0x4, 0x0, 0x2, 0x3, 0x0, 0x2, 0x0, 0x3ff}, r1, 0x7, 0xffffffffffffffff, 0x1) fallocate(r3, 0x0, 0x0, 0x87ffffc) r4 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100000, 0x95) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0xffffffffffffff0e, 0x7, 0x6, 0x7}) close(r2) syz_io_uring_setup(0x6f33, &(0x7f00000004c0)={0x0, 0xffffffff, 0x20, 0xfffffffd, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) syz_io_uring_setup(0x800c07, &(0x7f0000000680)={0x0, 0x4d14, 0x20, 0x2, 0x3b7, 0x0, r0}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000700), &(0x7f0000000780)) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/47) 13:12:16 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9", 0x12, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:12:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 15) 13:12:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc0000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:12:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:12:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 4) 13:12:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc03e0000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:12:31 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x141042, 0x0) pwritev(r3, &(0x7f0000000640)=[{&(0x7f00000002c0)="02", 0x1}], 0x1, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x2, 0x1, 0xa, 0x2, 0x0, 0x100000000, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0xa805, 0xf000000000000000, 0xfffffc00, 0x5, 0x10001, 0x400, 0x2, 0x0, 0x8, 0x0, 0x400}, r4, 0x0, r1, 0xa) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000000)={0x0, r3}) 13:12:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:12:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:12:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 16) 13:12:31 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687", 0x1b, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:12:31 executing program 5: fork() ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)=0x5) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x30, 0x8, 0x0, 0x20, 0x0, 0x80, 0x35291, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x2, 0xb06}, 0x400, 0x81, 0x5bb5, 0x1, 0x1ff, 0x6, 0x40, 0x0, 0x8, 0x0, 0x401}, 0xffffffffffffffff, 0xf, r0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000001c0)={0x0, @adiantum, 0x0, @desc3}) [ 1086.948224] FAULT_INJECTION: forcing a failure. [ 1086.948224] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1086.949169] CPU: 1 PID: 7258 Comm: syz-executor.3 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1086.949749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1086.950308] Call Trace: [ 1086.950502] [ 1086.950679] dump_stack_lvl+0x8f/0xb7 [ 1086.950980] should_fail_ex.cold+0x5/0xa [ 1086.951293] _copy_from_user+0x2e/0x180 [ 1086.951588] memdup_user+0x72/0xd0 [ 1086.951856] strndup_user+0x78/0xe0 [ 1086.952129] __do_sys_request_key+0x107/0x3b0 [ 1086.952471] ? __pfx___do_sys_request_key+0x10/0x10 [ 1086.952845] ? syscall_enter_from_user_mode+0x21/0x50 [ 1086.953221] ? syscall_enter_from_user_mode+0x21/0x50 [ 1086.953605] do_syscall_64+0x3f/0x90 [ 1086.953891] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1086.954283] RIP: 0033:0x7fe3ed5a5b19 [ 1086.954555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1086.955778] RSP: 002b:00007fe3eab1b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1086.956304] RAX: ffffffffffffffda RBX: 00007fe3ed6b8f60 RCX: 00007fe3ed5a5b19 [ 1086.956793] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1086.957293] RBP: 00007fe3eab1b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1086.957794] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1086.958306] R13: 00007ffe3d8a527f R14: 00007fe3eab1b300 R15: 0000000000022000 [ 1086.958857] 13:12:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 5) [ 1087.028949] FAULT_INJECTION: forcing a failure. [ 1087.028949] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.030552] CPU: 0 PID: 7268 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 13:12:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/shm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@mmap}, {@version_u}, {@version_L}, {@aname={'aname', 0x3d, 'vfat\x00'}}, {@cache_none}, {@dfltgid}], [{@fowner_lt}, {@measure}, {@appraise}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}]}}) flock(0xffffffffffffffff, 0x0) [ 1087.031623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1087.032830] Call Trace: [ 1087.033181] [ 1087.033495] dump_stack_lvl+0x8f/0xb7 [ 1087.034053] should_fail_ex.cold+0x5/0xa [ 1087.034618] should_failslab+0x9/0x20 [ 1087.035132] __kmem_cache_alloc_node+0x5b/0x400 [ 1087.035756] ? selinux_key_alloc+0x4a/0x1b0 [ 1087.036328] ? memcpy+0x3d/0x60 [ 1087.036803] kmalloc_trace+0x26/0x60 [ 1087.037314] selinux_key_alloc+0x4a/0x1b0 [ 1087.037879] security_key_alloc+0x5a/0xb0 [ 1087.038458] key_alloc+0x8a7/0x1280 [ 1087.038978] ? lock_is_held_type+0xdb/0x130 [ 1087.039562] ? __pfx_key_alloc+0x10/0x10 [ 1087.040093] ? security_prepare_creds+0x116/0x190 [ 1087.040736] ? rcu_read_lock_sched_held+0x42/0x80 [ 1087.041388] ? trace_kmalloc+0x2d/0xe0 [ 1087.041912] ? __kmalloc+0x73/0xc0 [ 1087.042409] ? selinux_cred_prepare+0x13/0x170 [ 1087.043040] keyring_alloc+0x46/0xc0 [ 1087.043567] lookup_user_key+0xbef/0x1260 [ 1087.044143] ? __pfx_lookup_user_key+0x10/0x10 [ 1087.044748] ? __pfx_lock_release+0x10/0x10 [ 1087.045322] ? trace_lock_acquire+0x14c/0x1c0 [ 1087.045954] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1087.046712] ? _copy_from_user+0xf6/0x180 [ 1087.047266] ? memdup_user+0x89/0xd0 [ 1087.047793] __do_sys_request_key+0x1a4/0x3b0 [ 1087.048406] ? __pfx___do_sys_request_key+0x10/0x10 [ 1087.049063] ? trace_rcu_dyntick+0x1a7/0x250 [ 1087.049678] ? syscall_enter_from_user_mode+0x21/0x50 [ 1087.050382] ? syscall_enter_from_user_mode+0x21/0x50 [ 1087.051098] do_syscall_64+0x3f/0x90 [ 1087.051615] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1087.052329] RIP: 0033:0x7f1da7f6db19 [ 1087.052841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1087.055169] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1087.056171] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1087.057109] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1087.058071] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1087.059010] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1087.059946] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1087.060941] 13:12:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xe03f0300}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1087.148330] 9pnet_fd: Insufficient options for proto=fd [ 1087.165843] 9pnet_fd: Insufficient options for proto=fd 13:12:48 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 17) 13:12:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:12:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/shm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@mmap}, {@version_u}, {@version_L}, {@aname={'aname', 0x3d, 'vfat\x00'}}, {@cache_none}, {@dfltgid}], [{@fowner_lt}, {@measure}, {@appraise}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}]}}) flock(0xffffffffffffffff, 0x0) 13:12:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:12:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:12:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 6) 13:12:48 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687", 0x1b, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:12:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x81, 0x7, 0x7, 0x19, 0x0, 0x8, 0x85004, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xc5e5, 0x5}, 0x0, 0x9, 0x4, 0x9, 0x8, 0x3, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xc, r0, 0xb) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:12:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 1) 13:12:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1103.849431] 9pnet_fd: Insufficient options for proto=fd 13:12:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 7) 13:12:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:12:48 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 18) 13:12:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x2, 0x3, 0x4, 0x1, 0x0, 0x6f7e, 0x22, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x40c, 0x5, 0x20, 0x9, 0x0, 0x80, 0x1, 0x0, 0x3, 0x0, 0xffff}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) 13:12:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000002080)=ANY=[@ANYRESOCT, @ANYBLOB="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", @ANYRES64]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000e00)='./file1/file0\x00', 0x214801, 0x120) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000800)='./file1/file0\x00', 0x148, 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000840)="ec14ed39a2b56e72b9211c6384e92450a4b16ebd0185883c91c8a463dd306db551850bec4b33c52e9f039dc8e1a31d3173e064ea2ec432dc56731cb7fd0ff5c97af721bc2b7ef8ead48172f8ad073417bbc1d8932435fdf65ec2a67c8e101595c0edd2483513a5047c204d9554024b143ecfc4203e5295d3442577faec19d1cf1e094e8de2043eb0e76dcc6d5077237bb3f6cf3200fa75af061d3509756c2efd99c0b848603d2b0b9b72cdd15bdb0bf6", 0xb0, 0x1}, {&(0x7f0000000900)="c80f73226dca43b9bb0cb8d379b1a9aea2ebfd4f99b19ae67dda2be8fb689aada249d018628f1e9a838e07b5ff6348a13e30c007ae70a8bfe0570ecb05ac37f7c910d0d000d6e248f15c6517a17457adbfb98615fe5205a72d13dc5dfb133209114f3d76e592f55894f9d0a2ae22ce85f86ac5475ddd533c4aef98d3a9c7122a26c289148892777b817aabe857f8fdc54a0116148d1dbcebc58e0b3b575255e77fa3fe16e596f460838fe8e73435b54fa2bced626fca4a99a2ec3542077f1a0f920de534fe8e62ca5f58bc255f4a7043027105f16601f09fa438014d9408f1716b14698894cb74aca733fc525aa318b7de94ddc0f488a0", 0xf7, 0x9}, {&(0x7f0000000a00)="7370f662fc0a768eddcee0c555e00aba5dd8fc33ff0a689653305ea7c4dad4186326eb07b5d250679921c15c81be25eaf651df0d3676bb79e1fa1fa169e1b7eeca09605c3f30e57c0e639dc906d974734267531035a429c35d235ee76466cd081d247619fdf56d267f51b44044af5cf1567ff695d1c6c8b1af01813b7eef683512c4e673d5c7d8bf8f7417e8a6eab3154b4a", 0x92, 0x100000000}, {&(0x7f0000000ac0)="a5d51d29ea1f567040a7b40fcc916dd8d97b45de0cc0c8a1a1bf629bcfba450534fea6e9babdf1e06b60503fa037ffea28f8228d3a4449ae96aaad15a1ab943d40bda654237d4c99768dbdee75f7b9199b5abd791201dc45ed8761369cff8b67690c8f7790a10f15a03a5a4f049e351987912b647f3877ed17b0915f78daf10cb089761f5c4f301d21abf9f68167234f67f552bcd856140e59d42223c78b15d5b72cb4be2060a557fd4340eb28a7de94df5ab241f51ad5a5d329108cc18705e33173db92e16a0a77c633a36f6c7c192f17bbde1777b6c00f746997a7080d", 0xde}, {&(0x7f0000000bc0)="9ff8c9c7ae3455e74b329088f07e53b1d650f4a77a8338817e6fcc26b3ab97ea0c155a6094d90e877c7af344bd76928098de0ff655a6071573bf80b43777581015d217de17a5f491274e3ed5d7adc8b83fb55ca6b3bd2d93dc81ef83fca2e9a0656b0b37ab33408d1d2d0ee928149f51e9c84eb08a1bdaab61bd4825d7b110cefa817f44046df72bfd831b505140c52ce044cb0203a924999d41224fc999aa7f8fcb84d24bae1fc243394ac8d6e9c18fa052a2221211fbe7200c5c50b4895aae49c22877e268ed97743249d10a8758d7d73f3934be37c98b82429d770fc644b4651037a1de9f9f6a9068ca39127d96efb9673e76d19b", 0xf6, 0x33}], 0x20, &(0x7f0000001f00)=ANY=[@ANYBLOB="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"]) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/shm\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file1/file0\x00'}) chroot(&(0x7f0000000000)='./file0\x00') write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000ec0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000000f00)={{r1}, "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"}) execveat(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', &(0x7f0000000640)=[&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='vfat\x00', &(0x7f0000000440)='/proc/sysvipc/shm\x00', &(0x7f0000000480)='/proc/sysvipc/shm\x00', &(0x7f00000004c0)='))\\\x00', &(0x7f0000000500)='(\x00', &(0x7f0000000540)='/dev/nvram\x00', &(0x7f0000000580)='vfat\x00'], &(0x7f00000007c0)=[&(0x7f0000000680)='/dev/nvram\x00', &(0x7f00000006c0)='%\'\x00', &(0x7f0000000700)='},[)/\xf5\x00', &(0x7f0000000740)='/dev/nvram\x00', &(0x7f0000000780)='vfat\x00'], 0x800) r2 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) sendfile(r2, r0, 0x0, 0xfffffdef) [ 1104.037508] FAULT_INJECTION: forcing a failure. [ 1104.037508] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.039332] CPU: 1 PID: 7324 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1104.040316] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1104.041278] Call Trace: [ 1104.041613] [ 1104.041918] dump_stack_lvl+0x8f/0xb7 [ 1104.042443] should_fail_ex.cold+0x5/0xa [ 1104.042947] ? key_alloc+0x3d5/0x1280 [ 1104.043439] should_failslab+0x9/0x20 [ 1104.043922] kmem_cache_alloc+0x5a/0x410 [ 1104.044436] key_alloc+0x3d5/0x1280 [ 1104.044946] ? __pfx_key_alloc+0x10/0x10 [ 1104.045464] ? search_cred_keyrings_rcu+0x93/0x2e0 [ 1104.046092] request_key_and_link+0x6c5/0x1210 [ 1104.046691] ? __pfx_request_key_and_link+0x10/0x10 [ 1104.047305] ? lock_acquire+0x32/0xc0 [ 1104.047788] ? key_type_lookup+0x1e/0x100 [ 1104.048309] ? __pfx_key_default_cmp+0x10/0x10 [ 1104.048877] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1104.049524] ? _copy_from_user+0xf6/0x180 [ 1104.050044] __do_sys_request_key+0x21f/0x3b0 [ 1104.050628] ? __pfx___do_sys_request_key+0x10/0x10 [ 1104.051244] ? trace_rcu_dyntick+0x1a7/0x250 [ 1104.051784] ? syscall_enter_from_user_mode+0x21/0x50 [ 1104.052426] ? syscall_enter_from_user_mode+0x21/0x50 [ 1104.053074] do_syscall_64+0x3f/0x90 [ 1104.053559] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1104.054226] RIP: 0033:0x7f1da7f6db19 [ 1104.054690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.056793] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1104.057684] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1104.058531] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1104.059360] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.060191] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1104.061030] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1104.061892] [ 1104.088420] FAULT_INJECTION: forcing a failure. [ 1104.088420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1104.089977] CPU: 1 PID: 7330 Comm: syz-executor.0 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1104.090923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1104.091846] Call Trace: [ 1104.092155] [ 1104.092429] dump_stack_lvl+0x8f/0xb7 [ 1104.092903] should_fail_ex.cold+0x5/0xa [ 1104.093346] FAULT_INJECTION: forcing a failure. [ 1104.093346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1104.094623] strncpy_from_user+0x38/0x3e0 [ 1104.095149] __do_sys_request_key+0x85/0x3b0 [ 1104.095686] ? __pfx___do_sys_request_key+0x10/0x10 [ 1104.096292] ? trace_rcu_dyntick+0x1a7/0x250 [ 1104.096833] ? syscall_enter_from_user_mode+0x21/0x50 [ 1104.097441] ? syscall_enter_from_user_mode+0x21/0x50 [ 1104.098062] do_syscall_64+0x3f/0x90 [ 1104.098539] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1104.099151] RIP: 0033:0x7f7242783b19 [ 1104.099587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.101586] RSP: 002b:00007f723fcd8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1104.102459] RAX: ffffffffffffffda RBX: 00007f7242897020 RCX: 00007f7242783b19 [ 1104.103255] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1104.104063] RBP: 00007f723fcd81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.104864] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1104.105676] R13: 00007ffdee4f6d4f R14: 00007f723fcd8300 R15: 0000000000022000 [ 1104.106502] [ 1104.106788] CPU: 0 PID: 7326 Comm: syz-executor.3 Not tainted 6.2.0-rc1-next-20221226 #1 13:12:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) [ 1104.107973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1104.109140] Call Trace: [ 1104.109493] [ 1104.109809] dump_stack_lvl+0x8f/0xb7 [ 1104.110378] should_fail_ex.cold+0x5/0xa [ 1104.110942] _copy_from_user+0x2e/0x180 [ 1104.111496] memdup_user+0x72/0xd0 [ 1104.112016] strndup_user+0x78/0xe0 [ 1104.112540] __do_sys_request_key+0x146/0x3b0 [ 1104.113180] ? __pfx___do_sys_request_key+0x10/0x10 [ 1104.113874] ? trace_rcu_dyntick+0x1a7/0x250 [ 1104.114521] ? syscall_enter_from_user_mode+0x21/0x50 [ 1104.115244] ? syscall_enter_from_user_mode+0x21/0x50 [ 1104.115983] do_syscall_64+0x3f/0x90 [ 1104.116509] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1104.117216] RIP: 0033:0x7fe3ed5a5b19 [ 1104.117737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.120128] RSP: 002b:00007fe3eab1b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1104.121144] RAX: ffffffffffffffda RBX: 00007fe3ed6b8f60 RCX: 00007fe3ed5a5b19 [ 1104.122104] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1104.123065] RBP: 00007fe3eab1b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.124013] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1104.124960] R13: 00007ffe3d8a527f R14: 00007fe3eab1b300 R15: 0000000000022000 [ 1104.125961] 13:12:48 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7f, 0x0, 0x20, 0xff, 0x0, 0x0, 0x1, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x53b, 0x100000001}, 0x10000, 0x8, 0x3f, 0x0, 0x3, 0x2, 0x2, 0x0, 0x8, 0x0, 0x400}, r2, 0xd, r1, 0x2) 13:12:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:12:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:02 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 19) 13:13:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:13:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 2) 13:13:02 executing program 4: r0 = syz_io_uring_setup(0xe76, &(0x7f0000000180), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000240)) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000008, 0x8010, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f0000000200)) syz_io_uring_setup(0x3a25, &(0x7f0000000080)={0x0, 0xffffffff, 0x10, 0x2, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000000300), &(0x7f0000000340)=0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000400)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r2, 0x0, &(0x7f0000000540)="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", 0xfff, 0xc0, 0x0, {0x0, r3}}, 0x3) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}, 0x1, 0x0, 0x1, {0x0, r3}}, 0xd6b) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000001, 0x20010, r0, 0x10000000) syz_io_uring_submit(r1, r6, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x3, 0x0, @fd_index=0x8, 0x0, 0x0, 0x0, 0x1}, 0x7) 13:13:02 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687", 0x1b, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:02 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x42eec849c8cf2e36, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x1bc, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xc7, 0x5}}}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x8a0}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_MESH_SETUP={0x24, 0x70, [@NL80211_MESH_SETUP_USERSPACE_MPM={0x4}, @NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5, 0x6, 0x1}, @NL80211_MESH_SETUP_AUTH_PROTOCOL={0x5, 0x8, 0x3e}, @NL80211_MESH_SETUP_USERSPACE_AMPE={0x4}, @NL80211_MESH_SETUP_AUTH_PROTOCOL={0x5, 0x8, 0xb7}]}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x1}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_MESH_SETUP={0x150, 0x70, [@NL80211_MESH_SETUP_ENABLE_VENDOR_PATH_SEL={0x5, 0x1, 0x1}, @NL80211_MESH_SETUP_AUTH_PROTOCOL={0x5, 0x8, 0x3}, @NL80211_MESH_SETUP_IE={0x22, 0x3, "67bfbd83cde5d45eb3e7563dcdcdb4017f14aaefeb123b98be7a8ef77a40"}, @NL80211_MESH_SETUP_IE={0xef, 0x3, "6887f10fecece4da2b4efaa3d3717cbe0ce224bbb55a6b3d681e65aac0c77a281534788ca9d9d6d3ecfb425140ebac242c997cb0797c3b791d1e3f0f0b3c70d50ba5203769df36f30e217dcabce34fbc704fb443286a7102cec9bf3b9137125920b9035685e03bb7083ea25baee804e2e6b37e2b7ba97d23aca12c8bccfcf6bd1c09c2c450dd11cbcc5ea17bd76973bfe7200725d1dae57f11cfc70bf03189129f494bfc8e83e0161561be8a64c4425d031cf66abef897fa2351ef4741e7dd9d5fd8322d465a5049b20b72686cfd7ad1f8206d44850a5977a825767f42d99261f529a965a2977b4d6ae5ca"}, @NL80211_MESH_SETUP_ENABLE_VENDOR_METRIC={0x5, 0x2, 0x1}, @NL80211_MESH_SETUP_ENABLE_VENDOR_PATH_SEL={0x5}, @NL80211_MESH_SETUP_ENABLE_VENDOR_PATH_SEL={0x5}, @NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5}, @NL80211_MESH_SETUP_USERSPACE_AUTH={0x4}, @NL80211_MESH_SETUP_USERSPACE_AMPE={0x4}]}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x8}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x3}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24008010}, 0x4000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:13:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 13:13:02 executing program 5: getpeername(0xffffffffffffffff, &(0x7f0000000240)=@nfc_llcp, &(0x7f00000002c0)=0x80) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) r1 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3f, 0x33, 0xff, 0x7f, 0x0, 0x1, 0x10200, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x5, @perf_bp={&(0x7f0000000100), 0x5}, 0x2010, 0x101, 0x10001, 0x9, 0x3, 0x4, 0x8, 0x0, 0x1fc000, 0x0, 0x3}, r0, 0xa, 0xffffffffffffffff, 0xe) capget(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x40020}) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x0, 0x8, 0x1, 0x81, 0x0, 0x5, 0x84420, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000300), 0x9}, 0x0, 0x2, 0x7fff, 0x1, 0x200, 0x401, 0x5, 0x0, 0xfffffff7, 0x0, 0x7ff}, r0, 0x2, r1, 0x3) [ 1117.975081] cgroup: fork rejected by pids controller in /syz3 13:13:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:02 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d9868070", 0x1f, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 3) 13:13:16 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d9868070", 0x1f, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0xebc2dfde4476dcf6, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x91, 0x3, 0x7, 0x40, 0x0, 0x7, 0x40800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x782092d1, 0x7ff}, 0x1430, 0xa2, 0x5, 0x2, 0x62c, 0x8, 0xff, 0x0, 0x2, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x8) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f00000001c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x7f}) 13:13:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x3}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 20) 13:13:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 4) 13:13:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) mount(&(0x7f00000000c0)=@sg0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='ceph\x00', 0x2000, &(0x7f0000000200)='journal_checksum') mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x163008, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x10000a8, &(0x7f0000000240)={[{@journal_checksum}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/sg0\x00'}}]}) 13:13:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 1) 13:13:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xfffffff6}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1131.994322] ext4: Unknown parameter 'smackfsfloor' 13:13:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:13:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) read(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3e, 0x0, 0xd6c2, 0x0, 0x2}) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x400040, 0x0) openat(r2, &(0x7f0000000140)='./file0\x00', 0x30042, 0x18) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @local}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4}, 0x1c) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) [ 1132.042403] FAULT_INJECTION: forcing a failure. [ 1132.042403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1132.043360] CPU: 1 PID: 7524 Comm: syz-executor.0 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1132.043950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.044534] Call Trace: [ 1132.044740] [ 1132.044926] dump_stack_lvl+0x8f/0xb7 [ 1132.045257] should_fail_ex.cold+0x5/0xa [ 1132.045593] _copy_from_user+0x2e/0x180 [ 1132.045913] memdup_user+0x72/0xd0 [ 1132.046213] strndup_user+0x78/0xe0 [ 1132.046513] __do_sys_request_key+0x107/0x3b0 [ 1132.046887] ? __pfx___do_sys_request_key+0x10/0x10 [ 1132.047257] ? trace_rcu_dyntick+0x1a7/0x250 [ 1132.047582] ? syscall_enter_from_user_mode+0x21/0x50 [ 1132.047950] ? syscall_enter_from_user_mode+0x21/0x50 [ 1132.048316] do_syscall_64+0x3f/0x90 [ 1132.048594] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1132.048961] RIP: 0033:0x7f7242783b19 [ 1132.049223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.050417] RSP: 002b:00007f723fcf9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1132.050948] RAX: ffffffffffffffda RBX: 00007f7242896f60 RCX: 00007f7242783b19 [ 1132.051431] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1132.051914] RBP: 00007f723fcf91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1132.052396] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1132.052879] R13: 00007ffdee4f6d4f R14: 00007f723fcf9300 R15: 0000000000022000 [ 1132.053382] [ 1132.057146] FAULT_INJECTION: forcing a failure. [ 1132.057146] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.057975] CPU: 1 PID: 7535 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1132.058552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.059138] Call Trace: [ 1132.059328] [ 1132.059500] dump_stack_lvl+0x8f/0xb7 [ 1132.059795] should_fail_ex.cold+0x5/0xa [ 1132.060103] ? key_alloc+0x433/0x1280 [ 1132.060395] should_failslab+0x9/0x20 [ 1132.060689] __kmem_cache_alloc_node+0x5b/0x400 [ 1132.061037] ? key_alloc+0x433/0x1280 [ 1132.061331] ? key_alloc+0x433/0x1280 [ 1132.061622] __kmalloc_node_track_caller+0x43/0xb0 [ 1132.061987] kmemdup+0x2c/0x60 [ 1132.062235] key_alloc+0x433/0x1280 [ 1132.062518] ? __pfx_key_alloc+0x10/0x10 [ 1132.062813] ? search_cred_keyrings_rcu+0x93/0x2e0 [ 1132.063189] request_key_and_link+0x6c5/0x1210 [ 1132.063535] ? __pfx_request_key_and_link+0x10/0x10 [ 1132.063910] ? lock_acquire+0x32/0xc0 [ 1132.064202] ? key_type_lookup+0x1e/0x100 [ 1132.064515] ? __pfx_key_default_cmp+0x10/0x10 [ 1132.064856] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1132.065243] ? _copy_from_user+0xf6/0x180 [ 1132.065552] __do_sys_request_key+0x21f/0x3b0 [ 1132.065892] ? __pfx___do_sys_request_key+0x10/0x10 [ 1132.066242] ? trace_rcu_dyntick+0x1a7/0x250 [ 1132.066589] ? syscall_enter_from_user_mode+0x21/0x50 [ 1132.066971] ? syscall_enter_from_user_mode+0x21/0x50 [ 1132.067360] do_syscall_64+0x3f/0x90 [ 1132.067650] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1132.068029] RIP: 0033:0x7f1da7f6db19 [ 1132.068298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.069554] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1132.070102] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1132.070614] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1132.071120] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1132.071631] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1132.072130] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1132.072656] 13:13:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 5) 13:13:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x8000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:16 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d9868070", 0x1f, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 21) 13:13:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x6, 0x2, 0xc1, 0x0, 0x33, 0x140, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x11, 0x10000, 0x80000000, 0x5, 0x1, 0x80000001, 0x5, 0x0, 0x7, 0x0, 0x101}, 0x0, 0x10, r2, 0xa) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x1000, 0x0, 0x0, 0x0, 0x10, "ddab93e1adcbd470"}) ioctl$VT_DISALLOCATE(r3, 0x5608) io_submit(0x0, 0x4, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="666fd6fb7c4c8e8bf4059397e83e5ca7e7a13e2dbc3057", 0x17, 0x0, 0x0, 0x3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x1000, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x1, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000004c0)="457e9ecce6f0e6267ca821ea89e945294a9d2c204cfc7e6ab54c19988716", 0x1e, 0xffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0xffffffffffffffff, 0x0, 0x1, r0}]) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) r4 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x8}) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x4, 0x8, 0xff, 0x1f, 0x0, 0xad, 0x44, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_config_ext={0x3f}, 0x41200, 0xfffffffffffffc01, 0x81, 0x7, 0x8, 0x9, 0xb4, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000500)={{}, r5, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000f40)={{r0}, 0x0, 0x0, @inherit={0x68, &(0x7f0000000600)={0x0, 0x4, 0x9bc, 0x4, {0x11, 0x0, 0x1, 0x0, 0x4}, [0xa086, 0x0, 0x5, 0x0]}}, @name="9b99481df9e33af2acf9db5cdb6165b171c279a9f4f5cf9a8a48ebb5b37ca8398d6a6b63a665fe7aeaed6e6e879ab67842be80e5f097c4af7a343bc65ce4f6518fe330d638671ae996857bd3795fba93f935b892b0c5fc76ab6b125eb9d83bd6fc8b9442932d0f865e517084d3ad3ab7c0c8de8f64acbf8471106559d8cbb5da680de2dbe0352cded04a533b881cf3285e9087a50ac071aa473eb9c187d88d2b3e57c064fa6529084998a5f3019e1c99aee1fc7746f2d0a95fda77a02232c717dfa1e0ba10f12592ee9d3c236147c34498c6a17601fe472526e8344b9b87d1adba319312c6c0c6293708df0d416acb10c3e28588a7864bb45752e3ae605cbe614a2a047db4612f8d7598298ed270b281acbaa88163b3475ea957e94bbc95567b2aefe11559ecf7f7a4413a97d632b3b7b941da9dfc89a6abbeb6566e4087bbdbef011b038e47880beb2d195061ff592b450e3410cf654c371737991edefa2519315a06c8c81e95ffb4227d0ebfdc11131a3648ab7aed22d3a8afd7d5fbf09c5a2986c3d28dce4534bcd085c49f959554d11c301f3a1c4f57f6e680bd691e7788792dac5b8456a7accd50c48bf27154a67cf91b3510b6e389727785052ca22702cb17a8e7fde4e5c05ce84f550d65769fa56a566adf84a934b8257470ff0e35f57cd7d1c44af544e65a7ef8a338f575a18ad1038a8619096427dbe0ed06c5ec417f5092d792235a55cdbc182b97a7331b509e838b20af785afd60afdce7d9b0f29c38efb68675e060e787f5bc1cb83db8dc3ce8de3590e99f17472f316b77b16fc761bb29b31a5beb2fa165e3080cb289a2a5751165373e66f8ef4e4303032ef4c48e2c2df30a58f931f293747f43ab96dcab04fabd98b91f48a0d8318a67169e7e8699ee1078680cc1161e5f6fb269de18a96bb36a517ebf68f897e2a896e7243801f369875406e6dd71b9fa1c24b171be31c05c2180cd5317e0af7d632d485132113baf621f3c41dbe2fc59b2665ae7caaaa60d93bd6856d0c1412721c340deac874536a00b62797e0c60fc8cf3379385037cdc84bba08c2414407f7bc520b3f94b36fdf0b02152fdcdcfe18b235f9a227bc7d8ca62cdba30455d3a5e5ebf12bc3159937c464167f73a841124aa1d48b93eaff0b4ce9a06481cd29143ed65f8e96f4eaf9efcba20a7f654709b378774524cea62afffcfb33e134fc53fc76dfdb3a7222a7395c5b4ff227d20b4b684dbaf6d0f8fe13b6801511a3e500ad5bfd686bec05de7b58f5e618337ae633e1fcfe059239577b72326c318855ee72b8e59e034adfafaf35d6aec8148f8e102c12d326c11c2cfd38b1d1d769097f4423ee3ccc5f9897bb680827595ee6f5a744163877abdb59d85f3e4f0b3b8f8494fc0836d8d7c33dbd8f124275586e0bdb61812fbdda77f53f0635860ffc9ca1a047bb0c0315f01322c676edde89f32f0d06b9dac148046b4d33a94ca83d2fb84b2252bb2cb63c5bcaf2229a27f9b6aa0d4fe647c139b3817257bf98c6baa831f599f9a208b02f9e6f8b5f48540bf0a86b88ff0c9edfad5c8a760e2fc87e45b36887807c4e4247c860a549d6f563fe76d73e2be9c373343d9ebefc315afff64f964a821149f239604c29b508846d65b09488d9b126e9cf6eed055a7a691b4a32515aee6319b83d7b0d3a253c828fb8e6b9ab431fe56461331395956593ac54cfc10f786bb5e9a05cc27ccbd10b1eb0fdba0d81a8ed0bfb72135d6c8224dc779d77013bfe92069ce2d0592b4fb0e1228aab22dd92dd940e7855a985a1dbe372e76a5db5014ee462fd459d640ca19fae6efcc7539e1808e8081007f7f4e8c66026039219eafe7c4e366f1141577c6dc8562de9af0d558d9f6822406f3ebe3a7bc2ee1b2aaecc24a3c447a9ffa06ec68367656ec249d9d6787b58784da08c5c03bcfa76c883bffeaeb85eafa5eafcb686f7e95229b838cbdeedf54c484e2cc909d462c859feff5cab0891b52e6fd99c0230e17ad625fc38fd7659ec9e46d5bd71a496e40770b611d3bf2a9f1fc9dfb024fdaad8900331bfe33d68086e06617ee3a55d89768d82080b9a8f7ee5979d75a7a0380eca6f3cbed7c4035281ed74f02f5e59a775ed94e2ea76db093384b5afb2bb7f640f4180db6e185512c55cd816cfa53380b0e0ddad33bdae2c484dc66b7193138d20dbd25b015026077f4b75ab1ee282db041fedb090a360182f4153dfcc077a19ca8196c9d626959d505c82fbf25d42361087d528cb5cf74492d4971c4647246f3ae8894429d2da7d3fff9cfb7833af107ad55fc9e9ab31df562c3a8f8b10b3b45189dbc469fbfbf7ec5e182c7ec22a4c1d567e651799e027d66047d373071449002b28b2de2d60415df52a71de07daeb2ceed62bd76d01a934e252d665ed3d85e09640637e6e3528bed84815638d753b44ee55798853d2b1df636a5fe5bad379733a00c635aa597ba0308783c54deaba200451761f23fdc85b164aeaa0b3e733589cd75441d78c2573ac900fe214065dd718f9be567b428a4f47ec810d894086a096453ed057533391dbfa2b2b32a28be8d6c582b7c3ccf1d88a6a26a8c8f01483e12be922a3f0dcaa542dcb6d3308a6186c9823acb67fb0ed114db5869d802fd8ee1be39110f67cf66eb80a03b094d96079ccec316f703e89d19f4b6a650b02be82ee37d209a329c44ef29aa59ea2ddaf40062a0ac90d4d5f68bbd072acbbc94962e40ddd49ea4f6684aab3a651124ef7dc5fcc7715d76fe1bccbbde933769d2506b55e972fe55f59b14e56835053f619a094ff1bcd0deb03bb9edf1d5cefaef38daa24678d901b000c3c743458733d686296abced75f77eb89dc89c4a6c8c0d01c4d5efc79009c0f30d3cc8f37a7eea41ebeab136c669bff535cb4fd9cec966108d8ecebbe73b080b0c6c0265b02c714229e40d95fd638db2f51a1cb53316ceb25859d56bb165edf4d7a9984f27065f218d4066ffdbd34516003e076ec9707f7a937f64c01c9451db5381d6aba2e3100b69b5fa13f4d3ecabcca29ad173dc5b542d4ce4c6766ff89ff8cbe2dfd301f22ac438edb4221d27b281ebe922fa87d6f3609ec4090666d99e264ae3db4e2cc412e8baf5ad48e8d13fd90e10acab05d27711079af4193075f8eb833f19853e17274c09ef9c8ff4b7b8430d9674714a58ff574feeb07c4fa392bd81d9137a8fcf561e2b1ce57b5768b57efaf8b48918368912564d92f18bd7d15fbaa919f91e5afb64814cbfe22358e620739a9cccd9884f4722d19489525743778b04272c83174b6826130ce704323fb10bc7b09d4860114f8d3fb22db767952b316efb61d51714c9ba4c1548371752a382b4d6c35d902c97d25edec2330d0f16fe5f47d3a7e20e1678e619e8c189cfa363596ab40ced745f56bb6f472ef1ac4d7f55c4f93169c7ac58c9219694f79e42635872e01c4005e956632dc1ecc36a8e38be1aad5c0d9f769b692c051437ed7a7eb4bcdd4bbba6d121cc0414174fbdc07a491afa420c6e45d51e91f801ce8feca12a90cab127450bca298acf2c38a6e1ee6780a14b3f5861f8fb7e8451452f4fc4aba5d00e25fe96fc00bb8a71c0b261b85f0ad97896fb85dac8aa09f0a6a38d3d4ee083cb6ec5504df44a15d7bf6ccb88a9a0db2d74929e39dfa1723a8d11306961d2211bbbf2edaf9eed0e9705f507f4504fe474ce897c0b7ab5aaac70055ec77cdb876fd7dbe9b881dc1e092a248e6b762f55ae9e7b1748092448812942db65d72e1139b76f9de534cd54f1cc953ba6c90a97264f17596cecb8d2d4e1e6c66a3589dac8e4c22181c47b878489cf47dab37f783f3ecd4650563f000602c3a896a6888b2cd6a11eda5c86c056f08b6e502a579fed56245ccb35c1d801c31b5f5a4bbdf756963abb2a9b9500f0a0c75acf80fe91bcdbeb7df97e4ca8f6deb992cb116107773e9ff6260102e45ef06c7a33a0f9d194210eb88ca948a35bb09ac171650b0fabefa8031fcfe2db7ee89127cc57d31e9af3bbcf40e9843fcd8f037a61fc1aeb332dcbe18cea5bf015cc4b920a7ddb62f172d91d09941944764c83efffa9da681afde1e0ca9e6c40817dcfbf07e175fae16b3b5d3678640076ef4a9829074208ddfde69de8dd9377a0c5a1cedf8d04b129851f96b1f11cd287317ea103576652f7379ea5981e19703a690c183565975ff2dcad7c6d960cb39ed62c52fcb176dd086cd5a0a42e19720d1619c207dd7a2f6d3bed1905f344484a2694eec8bbdf638d62b57b173a7cefcaad119bb41f44ef601d4393854b3129f88fe32ab341611ad1c2c542e1273f386b616df150e5bebe1516b43b605207161c4c6aeb2eef7e458d3bf22f8590be60f21970140a8c5f4d1c1a357d21b1c7e3aa0ed533515d218446e0ff85f9cab9b1777471f2e1e29e662a8c8ec4dd0b6fad36441c0f3eaf4dea88ef09d61dc41e8a0429ad3b4f098252fe1683bba974a75de6250a0d0ee7644068a6bb8952808e3bc0e3bad341c9e3707c6f9b207c894fcd05b1f50b2fb2af206c1b72ce349effb4d77c3872f2533bdb2180b4aa204dc8c5e03fc7d49410ec0637cec666fe4ab516dec36598c82b06247b83841da9c9779a9c50f17e9a35efb3e7ddd8d24ed3483615e0623bb8d25205b3a5bb2167d00c50d0b0737bd03efa0dd3223fc55701d2b6b2c8d7bedd32b9a1589f0815992027463b2f090398d971ea95b6358f97e6135d07a8bbba15858f6c9bb297bd644669bf240e78cb5fc883b5e456d65f19b6b2b8847169a4b44feede60315ef8044572af8f31063c0343ea15a5ca82b5c5dff0cd9da2be50b03881e20c96a8957f66687a3b9eea1fa05a182e42a619a38a8b502645784cd765e106ff342476fb73d6c05bcbc35d1cd05cb5179d4851280ad87a659a504400880b15a19246397c634ee376005a6c371cccbb56d902617e488c8d4a43b0ffceb5090ace72722bfcdf624b2b05285b8ea00a34e42162216cfa3c40185f3e1ed10c9fe71839077389c46aa6cf68938165921f244a3d514a5340814146baddc9a8e1689dece9819fac5c64b4718cde1ad36f530fc10d2d3fac44b293355c54f211e11209df2682d03b82dc2e5d849b978375f5e91cce502daff7e135336d35aa2deaa4b7e4d328e95bab4be0aa47679b1ce5156ac0a026743f1f437ede10fd235722c102002c5906e307cdf60c1a078ded3f2e7d0f1dfec62d263ec75b93abb3f5ac00a8354878243a54516efa351aab9e3586664cdf33aa6fc62c8737cf3cb53fff6ec2e0a32c0c2f347a85b0aab75f83b0d5f69d909b1c574081d9e79fae96bb419e1eba6c5dbd0af3f0e9746f4ebe0db6194a73752dfb7d7d6d9e0b0ebffc9d58837ab054bd829df64a0a45ca55494e84bbbf5334abd5a828c41e7e4ca00673b8cefa46cbf1fb6aa00946228681b15db9ce6fd4baafe79df7117a9234f176e2ff76778b45914be975bc4c2f854ed38c47d0c6f0bdfe551e0eca13433de6d64f55c8fa9cc289729580043106e4e0b17b6be4b18a0612ed415c7d0192721e25784f9fb6c25fa83b0d5f478ab90d1a00bb3093ac97b661e89eca1a2bfdb5d5c2a373ce9a19c2b5bc2b748ffdec6a0b7712bd30b68d8b1ed83df1060af36b9ebf5fed2364c77d3d2caeb438dc1769d678b883ea8367ab26e1d20f2447225269070fbc32b8023339319cbea9fc14868ace"}) 13:13:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x6, 0xfd, 0x1f, 0x3, 0x0, 0x3, 0x10800, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x4}, 0x4040, 0xfff, 0x0, 0x6, 0xfff, 0x2, 0xa, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x10, r0, 0x8) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x5) write$tcp_mem(r1, &(0x7f00000001c0)={0xff, 0x20, 0x8, 0x20, 0x3}, 0x48) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:13:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x40030000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 22) [ 1132.474754] FAULT_INJECTION: forcing a failure. [ 1132.474754] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.475595] CPU: 1 PID: 7708 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1132.476133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.476691] Call Trace: [ 1132.476877] [ 1132.477040] dump_stack_lvl+0x8f/0xb7 [ 1132.477330] should_fail_ex.cold+0x5/0xa [ 1132.477630] should_failslab+0x9/0x20 [ 1132.477906] __kmem_cache_alloc_node+0x5b/0x400 [ 1132.478241] ? selinux_key_alloc+0x4a/0x1b0 [ 1132.478552] ? memcpy+0x3d/0x60 [ 1132.478810] kmalloc_trace+0x26/0x60 [ 1132.479081] selinux_key_alloc+0x4a/0x1b0 [ 1132.479381] security_key_alloc+0x5a/0xb0 [ 1132.479686] key_alloc+0x8a7/0x1280 [ 1132.479964] ? __pfx_key_alloc+0x10/0x10 [ 1132.480251] ? search_cred_keyrings_rcu+0x93/0x2e0 [ 1132.480619] request_key_and_link+0x6c5/0x1210 [ 1132.480949] ? __pfx_request_key_and_link+0x10/0x10 [ 1132.481297] ? lock_acquire+0x32/0xc0 [ 1132.481574] ? key_type_lookup+0x1e/0x100 [ 1132.481876] ? __pfx_key_default_cmp+0x10/0x10 [ 1132.482198] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1132.482571] ? _copy_from_user+0xf6/0x180 [ 1132.482879] __do_sys_request_key+0x21f/0x3b0 [ 1132.483208] ? __pfx___do_sys_request_key+0x10/0x10 [ 1132.483565] ? syscall_enter_from_user_mode+0x21/0x50 [ 1132.483930] ? syscall_enter_from_user_mode+0x21/0x50 [ 1132.484300] do_syscall_64+0x3f/0x90 [ 1132.484576] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1132.484945] RIP: 0033:0x7f1da7f6db19 [ 1132.485207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.486474] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1132.487029] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1132.487551] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1132.488062] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1132.488570] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1132.489075] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1132.489599] 13:13:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 6) 13:13:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x5}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x6, 0x2, 0xc1, 0x0, 0x33, 0x140, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x11, 0x10000, 0x80000000, 0x5, 0x1, 0x80000001, 0x5, 0x0, 0x7, 0x0, 0x101}, 0x0, 0x10, r2, 0xa) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x1000, 0x0, 0x0, 0x0, 0x10, "ddab93e1adcbd470"}) ioctl$VT_DISALLOCATE(r3, 0x5608) io_submit(0x0, 0x4, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="666fd6fb7c4c8e8bf4059397e83e5ca7e7a13e2dbc3057", 0x17, 0x0, 0x0, 0x3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x1000, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x1, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000004c0)="457e9ecce6f0e6267ca821ea89e945294a9d2c204cfc7e6ab54c19988716", 0x1e, 0xffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0xffffffffffffffff, 0x0, 0x1, r0}]) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) r4 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x8}) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x4, 0x8, 0xff, 0x1f, 0x0, 0xad, 0x44, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_config_ext={0x3f}, 0x41200, 0xfffffffffffffc01, 0x81, 0x7, 0x8, 0x9, 0xb4, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000500)={{}, r5, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000f40)={{r0}, 0x0, 0x0, @inherit={0x68, &(0x7f0000000600)={0x0, 0x4, 0x9bc, 0x4, {0x11, 0x0, 0x1, 0x0, 0x4}, [0xa086, 0x0, 0x5, 0x0]}}, @name="9b99481df9e33af2acf9db5cdb6165b171c279a9f4f5cf9a8a48ebb5b37ca8398d6a6b63a665fe7aeaed6e6e879ab67842be80e5f097c4af7a343bc65ce4f6518fe330d638671ae996857bd3795fba93f935b892b0c5fc76ab6b125eb9d83bd6fc8b9442932d0f865e517084d3ad3ab7c0c8de8f64acbf8471106559d8cbb5da680de2dbe0352cded04a533b881cf3285e9087a50ac071aa473eb9c187d88d2b3e57c064fa6529084998a5f3019e1c99aee1fc7746f2d0a95fda77a02232c717dfa1e0ba10f12592ee9d3c236147c34498c6a17601fe472526e8344b9b87d1adba319312c6c0c6293708df0d416acb10c3e28588a7864bb45752e3ae605cbe614a2a047db4612f8d7598298ed270b281acbaa88163b3475ea957e94bbc95567b2aefe11559ecf7f7a4413a97d632b3b7b941da9dfc89a6abbeb6566e4087bbdbef011b038e47880beb2d195061ff592b450e3410cf654c371737991edefa2519315a06c8c81e95ffb4227d0ebfdc11131a3648ab7aed22d3a8afd7d5fbf09c5a2986c3d28dce4534bcd085c49f959554d11c301f3a1c4f57f6e680bd691e7788792dac5b8456a7accd50c48bf27154a67cf91b3510b6e389727785052ca22702cb17a8e7fde4e5c05ce84f550d65769fa56a566adf84a934b8257470ff0e35f57cd7d1c44af544e65a7ef8a338f575a18ad1038a8619096427dbe0ed06c5ec417f5092d792235a55cdbc182b97a7331b509e838b20af785afd60afdce7d9b0f29c38efb68675e060e787f5bc1cb83db8dc3ce8de3590e99f17472f316b77b16fc761bb29b31a5beb2fa165e3080cb289a2a5751165373e66f8ef4e4303032ef4c48e2c2df30a58f931f293747f43ab96dcab04fabd98b91f48a0d8318a67169e7e8699ee1078680cc1161e5f6fb269de18a96bb36a517ebf68f897e2a896e7243801f369875406e6dd71b9fa1c24b171be31c05c2180cd5317e0af7d632d485132113baf621f3c41dbe2fc59b2665ae7caaaa60d93bd6856d0c1412721c340deac874536a00b62797e0c60fc8cf3379385037cdc84bba08c2414407f7bc520b3f94b36fdf0b02152fdcdcfe18b235f9a227bc7d8ca62cdba30455d3a5e5ebf12bc3159937c464167f73a841124aa1d48b93eaff0b4ce9a06481cd29143ed65f8e96f4eaf9efcba20a7f654709b378774524cea62afffcfb33e134fc53fc76dfdb3a7222a7395c5b4ff227d20b4b684dbaf6d0f8fe13b6801511a3e500ad5bfd686bec05de7b58f5e618337ae633e1fcfe059239577b72326c318855ee72b8e59e034adfafaf35d6aec8148f8e102c12d326c11c2cfd38b1d1d769097f4423ee3ccc5f9897bb680827595ee6f5a744163877abdb59d85f3e4f0b3b8f8494fc0836d8d7c33dbd8f124275586e0bdb61812fbdda77f53f0635860ffc9ca1a047bb0c0315f01322c676edde89f32f0d06b9dac148046b4d33a94ca83d2fb84b2252bb2cb63c5bcaf2229a27f9b6aa0d4fe647c139b3817257bf98c6baa831f599f9a208b02f9e6f8b5f48540bf0a86b88ff0c9edfad5c8a760e2fc87e45b36887807c4e4247c860a549d6f563fe76d73e2be9c373343d9ebefc315afff64f964a821149f239604c29b508846d65b09488d9b126e9cf6eed055a7a691b4a32515aee6319b83d7b0d3a253c828fb8e6b9ab431fe56461331395956593ac54cfc10f786bb5e9a05cc27ccbd10b1eb0fdba0d81a8ed0bfb72135d6c8224dc779d77013bfe92069ce2d0592b4fb0e1228aab22dd92dd940e7855a985a1dbe372e76a5db5014ee462fd459d640ca19fae6efcc7539e1808e8081007f7f4e8c66026039219eafe7c4e366f1141577c6dc8562de9af0d558d9f6822406f3ebe3a7bc2ee1b2aaecc24a3c447a9ffa06ec68367656ec249d9d6787b58784da08c5c03bcfa76c883bffeaeb85eafa5eafcb686f7e95229b838cbdeedf54c484e2cc909d462c859feff5cab0891b52e6fd99c0230e17ad625fc38fd7659ec9e46d5bd71a496e40770b611d3bf2a9f1fc9dfb024fdaad8900331bfe33d68086e06617ee3a55d89768d82080b9a8f7ee5979d75a7a0380eca6f3cbed7c4035281ed74f02f5e59a775ed94e2ea76db093384b5afb2bb7f640f4180db6e185512c55cd816cfa53380b0e0ddad33bdae2c484dc66b7193138d20dbd25b015026077f4b75ab1ee282db041fedb090a360182f4153dfcc077a19ca8196c9d626959d505c82fbf25d42361087d528cb5cf74492d4971c4647246f3ae8894429d2da7d3fff9cfb7833af107ad55fc9e9ab31df562c3a8f8b10b3b45189dbc469fbfbf7ec5e182c7ec22a4c1d567e651799e027d66047d373071449002b28b2de2d60415df52a71de07daeb2ceed62bd76d01a934e252d665ed3d85e09640637e6e3528bed84815638d753b44ee55798853d2b1df636a5fe5bad379733a00c635aa597ba0308783c54deaba200451761f23fdc85b164aeaa0b3e733589cd75441d78c2573ac900fe214065dd718f9be567b428a4f47ec810d894086a096453ed057533391dbfa2b2b32a28be8d6c582b7c3ccf1d88a6a26a8c8f01483e12be922a3f0dcaa542dcb6d3308a6186c9823acb67fb0ed114db5869d802fd8ee1be39110f67cf66eb80a03b094d96079ccec316f703e89d19f4b6a650b02be82ee37d209a329c44ef29aa59ea2ddaf40062a0ac90d4d5f68bbd072acbbc94962e40ddd49ea4f6684aab3a651124ef7dc5fcc7715d76fe1bccbbde933769d2506b55e972fe55f59b14e56835053f619a094ff1bcd0deb03bb9edf1d5cefaef38daa24678d901b000c3c743458733d686296abced75f77eb89dc89c4a6c8c0d01c4d5efc79009c0f30d3cc8f37a7eea41ebeab136c669bff535cb4fd9cec966108d8ecebbe73b080b0c6c0265b02c714229e40d95fd638db2f51a1cb53316ceb25859d56bb165edf4d7a9984f27065f218d4066ffdbd34516003e076ec9707f7a937f64c01c9451db5381d6aba2e3100b69b5fa13f4d3ecabcca29ad173dc5b542d4ce4c6766ff89ff8cbe2dfd301f22ac438edb4221d27b281ebe922fa87d6f3609ec4090666d99e264ae3db4e2cc412e8baf5ad48e8d13fd90e10acab05d27711079af4193075f8eb833f19853e17274c09ef9c8ff4b7b8430d9674714a58ff574feeb07c4fa392bd81d9137a8fcf561e2b1ce57b5768b57efaf8b48918368912564d92f18bd7d15fbaa919f91e5afb64814cbfe22358e620739a9cccd9884f4722d19489525743778b04272c83174b6826130ce704323fb10bc7b09d4860114f8d3fb22db767952b316efb61d51714c9ba4c1548371752a382b4d6c35d902c97d25edec2330d0f16fe5f47d3a7e20e1678e619e8c189cfa363596ab40ced745f56bb6f472ef1ac4d7f55c4f93169c7ac58c9219694f79e42635872e01c4005e956632dc1ecc36a8e38be1aad5c0d9f769b692c051437ed7a7eb4bcdd4bbba6d121cc0414174fbdc07a491afa420c6e45d51e91f801ce8feca12a90cab127450bca298acf2c38a6e1ee6780a14b3f5861f8fb7e8451452f4fc4aba5d00e25fe96fc00bb8a71c0b261b85f0ad97896fb85dac8aa09f0a6a38d3d4ee083cb6ec5504df44a15d7bf6ccb88a9a0db2d74929e39dfa1723a8d11306961d2211bbbf2edaf9eed0e9705f507f4504fe474ce897c0b7ab5aaac70055ec77cdb876fd7dbe9b881dc1e092a248e6b762f55ae9e7b1748092448812942db65d72e1139b76f9de534cd54f1cc953ba6c90a97264f17596cecb8d2d4e1e6c66a3589dac8e4c22181c47b878489cf47dab37f783f3ecd4650563f000602c3a896a6888b2cd6a11eda5c86c056f08b6e502a579fed56245ccb35c1d801c31b5f5a4bbdf756963abb2a9b9500f0a0c75acf80fe91bcdbeb7df97e4ca8f6deb992cb116107773e9ff6260102e45ef06c7a33a0f9d194210eb88ca948a35bb09ac171650b0fabefa8031fcfe2db7ee89127cc57d31e9af3bbcf40e9843fcd8f037a61fc1aeb332dcbe18cea5bf015cc4b920a7ddb62f172d91d09941944764c83efffa9da681afde1e0ca9e6c40817dcfbf07e175fae16b3b5d3678640076ef4a9829074208ddfde69de8dd9377a0c5a1cedf8d04b129851f96b1f11cd287317ea103576652f7379ea5981e19703a690c183565975ff2dcad7c6d960cb39ed62c52fcb176dd086cd5a0a42e19720d1619c207dd7a2f6d3bed1905f344484a2694eec8bbdf638d62b57b173a7cefcaad119bb41f44ef601d4393854b3129f88fe32ab341611ad1c2c542e1273f386b616df150e5bebe1516b43b605207161c4c6aeb2eef7e458d3bf22f8590be60f21970140a8c5f4d1c1a357d21b1c7e3aa0ed533515d218446e0ff85f9cab9b1777471f2e1e29e662a8c8ec4dd0b6fad36441c0f3eaf4dea88ef09d61dc41e8a0429ad3b4f098252fe1683bba974a75de6250a0d0ee7644068a6bb8952808e3bc0e3bad341c9e3707c6f9b207c894fcd05b1f50b2fb2af206c1b72ce349effb4d77c3872f2533bdb2180b4aa204dc8c5e03fc7d49410ec0637cec666fe4ab516dec36598c82b06247b83841da9c9779a9c50f17e9a35efb3e7ddd8d24ed3483615e0623bb8d25205b3a5bb2167d00c50d0b0737bd03efa0dd3223fc55701d2b6b2c8d7bedd32b9a1589f0815992027463b2f090398d971ea95b6358f97e6135d07a8bbba15858f6c9bb297bd644669bf240e78cb5fc883b5e456d65f19b6b2b8847169a4b44feede60315ef8044572af8f31063c0343ea15a5ca82b5c5dff0cd9da2be50b03881e20c96a8957f66687a3b9eea1fa05a182e42a619a38a8b502645784cd765e106ff342476fb73d6c05bcbc35d1cd05cb5179d4851280ad87a659a504400880b15a19246397c634ee376005a6c371cccbb56d902617e488c8d4a43b0ffceb5090ace72722bfcdf624b2b05285b8ea00a34e42162216cfa3c40185f3e1ed10c9fe71839077389c46aa6cf68938165921f244a3d514a5340814146baddc9a8e1689dece9819fac5c64b4718cde1ad36f530fc10d2d3fac44b293355c54f211e11209df2682d03b82dc2e5d849b978375f5e91cce502daff7e135336d35aa2deaa4b7e4d328e95bab4be0aa47679b1ce5156ac0a026743f1f437ede10fd235722c102002c5906e307cdf60c1a078ded3f2e7d0f1dfec62d263ec75b93abb3f5ac00a8354878243a54516efa351aab9e3586664cdf33aa6fc62c8737cf3cb53fff6ec2e0a32c0c2f347a85b0aab75f83b0d5f69d909b1c574081d9e79fae96bb419e1eba6c5dbd0af3f0e9746f4ebe0db6194a73752dfb7d7d6d9e0b0ebffc9d58837ab054bd829df64a0a45ca55494e84bbbf5334abd5a828c41e7e4ca00673b8cefa46cbf1fb6aa00946228681b15db9ce6fd4baafe79df7117a9234f176e2ff76778b45914be975bc4c2f854ed38c47d0c6f0bdfe551e0eca13433de6d64f55c8fa9cc289729580043106e4e0b17b6be4b18a0612ed415c7d0192721e25784f9fb6c25fa83b0d5f478ab90d1a00bb3093ac97b661e89eca1a2bfdb5d5c2a373ce9a19c2b5bc2b748ffdec6a0b7712bd30b68d8b1ed83df1060af36b9ebf5fed2364c77d3d2caeb438dc1769d678b883ea8367ab26e1d20f2447225269070fbc32b8023339319cbea9fc14868ace"}) 13:13:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 23) 13:13:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000), &(0x7f0000000040)={0x0, 0x0, 0x100, 0x0, 0x2, 0xffffffff}) 13:13:30 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd", 0x21, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 24) 13:13:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x301000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:30 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd", 0x21, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) [ 1146.143738] FAULT_INJECTION: forcing a failure. [ 1146.143738] name failslab, interval 1, probability 0, space 0, times 0 [ 1146.144866] CPU: 1 PID: 7884 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1146.145448] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1146.146043] Call Trace: [ 1146.146236] [ 1146.146408] dump_stack_lvl+0x8f/0xb7 [ 1146.146717] should_fail_ex.cold+0x5/0xa [ 1146.147045] should_failslab+0x9/0x20 [ 1146.147339] __kmem_cache_alloc_node+0x5b/0x400 [ 1146.147691] ? assoc_array_insert+0xe2/0x2b70 [ 1146.148038] kmalloc_trace+0x26/0x60 [ 1146.148328] assoc_array_insert+0xe2/0x2b70 [ 1146.148661] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1146.149038] ? rcu_read_lock_sched_held+0x42/0x80 [ 1146.149405] ? trace_lock_acquire+0x14c/0x1c0 [ 1146.149745] ? __key_link_lock+0x50/0xd0 [ 1146.150059] ? lock_acquire+0x32/0xc0 [ 1146.150360] ? __pfx_assoc_array_insert+0x10/0x10 [ 1146.150724] ? down_write+0x157/0x220 [ 1146.151040] ? __pfx_down_write+0x10/0x10 [ 1146.151351] ? __pfx_key_alloc+0x10/0x10 [ 1146.151658] ? search_cred_keyrings_rcu+0x93/0x2e0 [ 1146.152031] __key_link_begin+0xf0/0x250 [ 1146.152339] request_key_and_link+0x744/0x1210 [ 1146.152683] ? __pfx_request_key_and_link+0x10/0x10 [ 1146.153046] ? lock_acquire+0x32/0xc0 [ 1146.153332] ? key_type_lookup+0x1e/0x100 [ 1146.153647] ? __pfx_key_default_cmp+0x10/0x10 [ 1146.153987] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1146.154378] ? _copy_from_user+0xf6/0x180 [ 1146.154695] __do_sys_request_key+0x21f/0x3b0 [ 1146.155042] ? __pfx___do_sys_request_key+0x10/0x10 [ 1146.155420] ? syscall_enter_from_user_mode+0x21/0x50 [ 1146.155806] ? syscall_enter_from_user_mode+0x21/0x50 [ 1146.156192] do_syscall_64+0x3f/0x90 [ 1146.156482] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1146.156866] RIP: 0033:0x7f1da7f6db19 [ 1146.157143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1146.158437] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1146.159008] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1146.159529] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1146.160049] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1146.160565] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1146.161077] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1146.161620] 13:13:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x299b1187}, &(0x7f0000000040)={0x0, 0xb3d, 0x0, 0x400000, 0x0, 0x20}) 13:13:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x6, 0x2, 0xc1, 0x0, 0x33, 0x140, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x11, 0x10000, 0x80000000, 0x5, 0x1, 0x80000001, 0x5, 0x0, 0x7, 0x0, 0x101}, 0x0, 0x10, r2, 0xa) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x1000, 0x0, 0x0, 0x0, 0x10, "ddab93e1adcbd470"}) ioctl$VT_DISALLOCATE(r3, 0x5608) io_submit(0x0, 0x4, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="666fd6fb7c4c8e8bf4059397e83e5ca7e7a13e2dbc3057", 0x17, 0x0, 0x0, 0x3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x1000, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x1, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000004c0)="457e9ecce6f0e6267ca821ea89e945294a9d2c204cfc7e6ab54c19988716", 0x1e, 0xffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0xffffffffffffffff, 0x0, 0x1, r0}]) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) r4 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x8}) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x4, 0x8, 0xff, 0x1f, 0x0, 0xad, 0x44, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_config_ext={0x3f}, 0x41200, 0xfffffffffffffc01, 0x81, 0x7, 0x8, 0x9, 0xb4, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000500)={{}, r5, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000f40)={{r0}, 0x0, 0x0, @inherit={0x68, &(0x7f0000000600)={0x0, 0x4, 0x9bc, 0x4, {0x11, 0x0, 0x1, 0x0, 0x4}, [0xa086, 0x0, 0x5, 0x0]}}, @name="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"}) 13:13:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x3}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:44 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd", 0x21, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 7) 13:13:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 25) 13:13:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x400000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1159.677783] FAULT_INJECTION: forcing a failure. [ 1159.677783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1159.678788] CPU: 1 PID: 7934 Comm: syz-executor.0 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1159.679392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1159.679987] Call Trace: [ 1159.680188] [ 1159.680370] dump_stack_lvl+0x8f/0xb7 [ 1159.680672] should_fail_ex.cold+0x5/0xa [ 1159.680997] _copy_from_user+0x2e/0x180 [ 1159.681306] memdup_user+0x72/0xd0 [ 1159.681583] strndup_user+0x78/0xe0 [ 1159.681875] __do_sys_request_key+0x146/0x3b0 [ 1159.682231] ? __pfx___do_sys_request_key+0x10/0x10 [ 1159.682623] ? syscall_enter_from_user_mode+0x21/0x50 [ 1159.683030] ? syscall_enter_from_user_mode+0x21/0x50 [ 1159.683435] do_syscall_64+0x3f/0x90 [ 1159.683723] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1159.684127] RIP: 0033:0x7f7242783b19 [ 1159.684409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1159.685736] RSP: 002b:00007f723fcf9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1159.686305] RAX: ffffffffffffffda RBX: 00007f7242896f60 RCX: 00007f7242783b19 [ 1159.686829] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1159.687361] RBP: 00007f723fcf91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1159.687892] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1159.688422] R13: 00007ffdee4f6d4f R14: 00007f723fcf9300 R15: 0000000000022000 [ 1159.688974] 13:13:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:44 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8f", 0x22, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 8) 13:13:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x4, 0x0, 0x8, 0x0, 0x2, 0x3104, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x950, 0x0, @perf_config_ext={0x8, 0xeffe}, 0xdc6e9a7f7ec99c40, 0x3, 0x2, 0x9, 0x100000001, 0x7fffffff, 0x40, 0x0, 0x2, 0x0, 0x1}, r0, 0x3, 0xffffffffffffffff, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)=""/186, 0xba}, {&(0x7f0000000300)=""/110, 0x6e}, {&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000400)=""/16, 0x10}], 0x4, &(0x7f0000000480)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf8}}, {{&(0x7f0000000580), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000600)=""/26, 0x1a}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000640)=""/168, 0xa8}], 0x3, &(0x7f0000001800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}}], 0x2, 0x2000, &(0x7f0000000740)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x6, 0x7, 0x2, 0x3, 0x0, 0x800, 0x40, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0xf8, 0x100000000}, 0x0, 0x8, 0x4, 0x2, 0x1, 0x9, 0x81, 0x0, 0x6, 0x0, 0x5}, r2, 0xffffffffffffffff, r1, 0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x800}}, './file0\x00'}) 13:13:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 26) 13:13:44 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8f", 0x22, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4a01000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1159.936643] FAULT_INJECTION: forcing a failure. [ 1159.936643] name failslab, interval 1, probability 0, space 0, times 0 [ 1159.938087] CPU: 0 PID: 8132 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1159.939092] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1159.940097] Call Trace: [ 1159.940438] [ 1159.940747] dump_stack_lvl+0x8f/0xb7 [ 1159.941273] should_fail_ex.cold+0x5/0xa [ 1159.941832] should_failslab+0x9/0x20 [ 1159.942341] __kmem_cache_alloc_node+0x5b/0x400 [ 1159.942956] ? assoc_array_insert+0x3cb/0x2b70 [ 1159.943588] kmalloc_trace+0x26/0x60 [ 1159.944092] assoc_array_insert+0x3cb/0x2b70 [ 1159.944693] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1159.945348] ? rcu_read_lock_sched_held+0x42/0x80 [ 1159.945993] ? trace_lock_acquire+0x14c/0x1c0 [ 1159.946597] ? __key_link_lock+0x50/0xd0 [ 1159.947163] ? lock_acquire+0x32/0xc0 [ 1159.947690] ? __pfx_assoc_array_insert+0x10/0x10 [ 1159.948344] ? down_write+0x157/0x220 [ 1159.948874] ? __pfx_down_write+0x10/0x10 [ 1159.949434] ? __pfx_key_alloc+0x10/0x10 [ 1159.949987] ? search_cred_keyrings_rcu+0x93/0x2e0 [ 1159.950664] __key_link_begin+0xf0/0x250 [ 1159.951234] request_key_and_link+0x744/0x1210 [ 1159.951872] ? __pfx_request_key_and_link+0x10/0x10 [ 1159.952518] ? lock_acquire+0x32/0xc0 [ 1159.953034] ? key_type_lookup+0x1e/0x100 [ 1159.953610] ? __pfx_key_default_cmp+0x10/0x10 [ 1159.954236] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1159.954961] ? _copy_from_user+0xf6/0x180 [ 1159.955544] __do_sys_request_key+0x21f/0x3b0 [ 1159.956177] ? __pfx___do_sys_request_key+0x10/0x10 [ 1159.956861] ? syscall_enter_from_user_mode+0x21/0x50 [ 1159.957545] ? syscall_enter_from_user_mode+0x21/0x50 [ 1159.958256] do_syscall_64+0x3f/0x90 [ 1159.958771] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1159.959458] RIP: 0033:0x7f1da7f6db19 [ 1159.959953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1159.962199] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1159.963194] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1159.964100] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1159.965007] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1159.965908] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1159.966808] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1159.967787] [ 1160.009708] FAULT_INJECTION: forcing a failure. [ 1160.009708] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.011185] CPU: 0 PID: 8133 Comm: syz-executor.0 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1160.012229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1160.013270] Call Trace: [ 1160.013620] [ 1160.013931] dump_stack_lvl+0x8f/0xb7 [ 1160.014473] should_fail_ex.cold+0x5/0xa [ 1160.015032] ? prepare_creds+0x2f/0x6f0 [ 1160.015619] should_failslab+0x9/0x20 [ 1160.016213] kmem_cache_alloc+0x5a/0x410 [ 1160.016868] prepare_creds+0x2f/0x6f0 [ 1160.017456] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1160.018254] lookup_user_key+0x387/0x1260 [ 1160.018900] ? lock_release+0x3b6/0x750 [ 1160.019541] ? __pfx_lookup_user_key+0x10/0x10 [ 1160.020233] ? __pfx_lock_release+0x10/0x10 [ 1160.020853] ? trace_lock_acquire+0x14c/0x1c0 [ 1160.021573] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1160.022427] ? _copy_from_user+0xf6/0x180 [ 1160.023085] ? memdup_user+0x89/0xd0 [ 1160.023656] __do_sys_request_key+0x1a4/0x3b0 [ 1160.024275] ? __pfx___do_sys_request_key+0x10/0x10 [ 1160.024948] ? syscall_enter_from_user_mode+0x21/0x50 [ 1160.025644] ? syscall_enter_from_user_mode+0x21/0x50 [ 1160.026355] do_syscall_64+0x3f/0x90 [ 1160.026882] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1160.027560] RIP: 0033:0x7f7242783b19 [ 1160.028062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1160.030333] RSP: 002b:00007f723fcf9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1160.031297] RAX: ffffffffffffffda RBX: 00007f7242896f60 RCX: 00007f7242783b19 [ 1160.032205] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1160.033117] RBP: 00007f723fcf91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1160.034029] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1160.034950] R13: 00007ffdee4f6d4f R14: 00007f723fcf9300 R15: 0000000000022000 [ 1160.035920] 13:13:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x6, 0x2, 0xc1, 0x0, 0x33, 0x140, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x11, 0x10000, 0x80000000, 0x5, 0x1, 0x80000001, 0x5, 0x0, 0x7, 0x0, 0x101}, 0x0, 0x10, r2, 0xa) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x1000, 0x0, 0x0, 0x0, 0x10, "ddab93e1adcbd470"}) ioctl$VT_DISALLOCATE(r3, 0x5608) io_submit(0x0, 0x4, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="666fd6fb7c4c8e8bf4059397e83e5ca7e7a13e2dbc3057", 0x17, 0x0, 0x0, 0x3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x1000, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x1, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000004c0)="457e9ecce6f0e6267ca821ea89e945294a9d2c204cfc7e6ab54c19988716", 0x1e, 0xffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0xffffffffffffffff, 0x0, 0x1, r0}]) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) r4 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x8}) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x4, 0x8, 0xff, 0x1f, 0x0, 0xad, 0x44, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_config_ext={0x3f}, 0x41200, 0xfffffffffffffc01, 0x81, 0x7, 0x8, 0x9, 0xb4, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000500)={{}, r5, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000f40)={{r0}, 0x0, 0x0, @inherit={0x68, &(0x7f0000000600)={0x0, 0x4, 0x9bc, 0x4, {0x11, 0x0, 0x1, 0x0, 0x4}, [0xa086, 0x0, 0x5, 0x0]}}, @name="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"}) 13:13:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xa}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:44 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x2, 0xc7, 0x0, 0x0, 0x0, 0x7, 0xa841, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0x65b4}, 0x2, 0x6, 0x1, 0x1, 0x1000, 0x1, 0xd0, 0x0, 0xfffffffc, 0x0, 0x100000000}, r3, 0xc, r0, 0x1) fallocate(r2, 0x0, 0x0, 0x87ffffc) r4 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r4, 0x0, r1, 0x8) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x6, 0xa5, 0x0, 0x1, 0x0, 0x4, 0x8d0a26b2e150e615, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x101, 0x2, @perf_config_ext={0x1, 0xadf}, 0x50262, 0x3, 0x1d, 0x2, 0x8, 0xff, 0xc848, 0x0, 0x28d, 0x0, 0x9}, r4, 0xd, r0, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:13:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x5}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8f", 0x22, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x418300, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x8, 0x80, 0x2, 0x3f, 0x0, 0x401, 0xe00, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7c, 0x1, @perf_config_ext={0x3ff, 0x4}, 0x4000, 0x7, 0x1, 0x6, 0x400, 0x4, 0x1, 0x0, 0x8, 0x0, 0x8}, 0xffffffffffffffff, 0x1, r0, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}], 0x0, &(0x7f0000013e00)=ANY=[@ANYBLOB]) 13:13:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x6e00000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 27) 13:13:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xf}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0x0, r0, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000100)={r2, 0x9, 0x5, 0x1}) 13:13:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 28) 13:13:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b8e, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0xff, 0x80, 0x0, 0x3, 0x4000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3239, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x9}, 0x40590, 0x1, 0x5, 0x5, 0x81, 0x7, 0x101, 0x0, 0xd8, 0x0, 0xb01}, 0x0, 0x6, r1, 0xa) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) [ 1175.135743] FAULT_INJECTION: forcing a failure. [ 1175.135743] name failslab, interval 1, probability 0, space 0, times 0 [ 1175.136809] CPU: 0 PID: 8335 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1175.137377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1175.137960] Call Trace: [ 1175.138153] [ 1175.138326] dump_stack_lvl+0x8f/0xb7 [ 1175.138629] should_fail_ex.cold+0x5/0xa [ 1175.138945] should_failslab+0x9/0x20 [ 1175.139246] __kmem_cache_alloc_node+0x5b/0x400 [ 1175.139598] ? request_key_auth_new+0xe4/0x940 [ 1175.139952] kmalloc_trace+0x26/0x60 [ 1175.140240] request_key_auth_new+0xe4/0x940 [ 1175.140573] ? __pfx_request_key_auth_new+0x10/0x10 [ 1175.140954] ? refcount_dec_and_lock+0x36/0x150 [ 1175.141306] request_key_and_link+0xd5d/0x1210 [ 1175.141657] ? __pfx_request_key_and_link+0x10/0x10 [ 1175.141995] ? lock_acquire+0x32/0xc0 [ 1175.142287] ? key_type_lookup+0x1e/0x100 [ 1175.142604] ? __pfx_key_default_cmp+0x10/0x10 [ 1175.142953] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1175.143349] ? _copy_from_user+0xf6/0x180 [ 1175.143669] __do_sys_request_key+0x21f/0x3b0 [ 1175.144013] ? __pfx___do_sys_request_key+0x10/0x10 [ 1175.144393] ? syscall_enter_from_user_mode+0x21/0x50 [ 1175.144772] ? syscall_enter_from_user_mode+0x21/0x50 [ 1175.145161] do_syscall_64+0x3f/0x90 [ 1175.145453] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1175.145836] RIP: 0033:0x7f1da7f6db19 [ 1175.146111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1175.147377] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1175.147922] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1175.148430] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1175.148930] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1175.149431] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1175.149933] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1175.150469] 13:13:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:13:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:13:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xa}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:13:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 29) 13:13:59 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0xae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x0, r1, 0x8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000011c0000f7005229", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB="2e2f66696c65310056efc0f38bb8add12af28601df25faa50f76c6c8daf43c77979877628d31075cc018dc28b0af01c06fb6959c552bc1243191ba1cd47996a69309c35040fce4ab15b7b39fc4e58d93f3d252c1e23f133abd3b527fa10bd002b177aa27070e593968f953e306954c8e4505c848e1e40bb7a9fe8d2b83d21ba89a9d06124580d6e4f301d27b780f6c644f63223d13299225"]) r5 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0xb3, 0x1f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x30}, 0xffffffffffffffff, 0x4, r4, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x4, 0x80, 0x3f, 0x6a, 0x2, 0x7, 0x0, 0x4, 0x4000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x2c80, 0x800, 0x10000, 0x5, 0x6, 0x3, 0x8, 0x0, 0x0, 0x0, 0x800000000}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fstatfs(r5, &(0x7f0000000000)=""/132) openat(r7, &(0x7f0000000180)='./file1\x00', 0x80000, 0x88) vmsplice(r7, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) fcntl$setpipe(r6, 0x407, 0x10001) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000000480)={{0x9, 0x1}, 0x100, './file1\x00'}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r8, 0x0, 0x220) write(r8, &(0x7f00000002c0)="2b7de26de8622fc1271ac7f7a260b17901e13fa094eb243ca10215cf66303246983b44460f15e5c99c8079dff3a09249ca357639bdea9fafa4116b2f64a78303e4e2a0483b41d9034afe0bb8e3806748cd932627a2f01225203888e3393cd9d7fb7f2422455dd67610eb430847d08b4d9487d87afcedea9368e38b0c97c5b3236581765fad25824a5d52d79a47529c7ea77d965062d81892d73bb378f6368b2e76e533324b0615ec307b3a0c37e2e813b5820e654b7cef17f04552966d50cfd910d662bcc0e04453fc60846e87b32c794ef2387457dfc7833af1d3c175c4743aa459db5d2e778f6a5b", 0xe9) ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="19f3ce703ac35debefd82d3408103f13ec2e", 0x12) 13:14:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x48}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:14:14 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:14:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xf}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 30) 13:14:14 executing program 4: io_setup(0x6, &(0x7f0000000040)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105241, 0x0) io_submit(r0, 0x1, &(0x7f0000000680)=[&(0x7f0000000200)={0xeffdffff, 0x8008, 0x10, 0x1, 0x0, r1, 0x0, 0x0, 0xfffffffffffffffd}]) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f0000000000)={0x0, 0x6}) ioctl$AUTOFS_IOC_SETTIMEOUT(r1, 0x80049367, &(0x7f0000000080)=0x100000000) 13:14:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty, 0x10001}, 0x1c) [ 1190.027040] FAULT_INJECTION: forcing a failure. [ 1190.027040] name failslab, interval 1, probability 0, space 0, times 0 [ 1190.028083] CPU: 1 PID: 8444 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1190.028778] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1190.029484] Call Trace: [ 1190.029713] [ 1190.029927] dump_stack_lvl+0x8f/0xb7 [ 1190.030285] should_fail_ex.cold+0x5/0xa [ 1190.030659] ? request_key_auth_new+0x107/0x940 [ 1190.031071] should_failslab+0x9/0x20 [ 1190.031424] __kmem_cache_alloc_node+0x5b/0x400 [ 1190.031846] ? request_key_auth_new+0x107/0x940 [ 1190.032245] ? request_key_auth_new+0x107/0x940 [ 1190.032674] __kmalloc_node_track_caller+0x43/0xb0 [ 1190.033120] kmemdup+0x2c/0x60 [ 1190.033431] request_key_auth_new+0x107/0x940 [ 1190.033841] ? __pfx_request_key_auth_new+0x10/0x10 [ 1190.034288] ? refcount_dec_and_lock+0x36/0x150 [ 1190.034702] request_key_and_link+0xd5d/0x1210 [ 1190.035114] ? __pfx_request_key_and_link+0x10/0x10 [ 1190.035561] ? lock_acquire+0x32/0xc0 [ 1190.035915] ? key_type_lookup+0x1e/0x100 [ 1190.036285] ? __pfx_key_default_cmp+0x10/0x10 [ 1190.036714] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1190.037173] ? _copy_from_user+0xf6/0x180 [ 1190.037569] __do_sys_request_key+0x21f/0x3b0 [ 1190.037983] ? __pfx___do_sys_request_key+0x10/0x10 [ 1190.038437] ? trace_rcu_dyntick+0x1a7/0x250 [ 1190.038845] ? syscall_enter_from_user_mode+0x21/0x50 [ 1190.039305] ? syscall_enter_from_user_mode+0x21/0x50 [ 1190.039786] do_syscall_64+0x3f/0x90 [ 1190.040119] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1190.040585] RIP: 0033:0x7f1da7f6db19 [ 1190.040937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1190.042462] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1190.043093] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1190.043706] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1190.044309] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1190.044933] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1190.045569] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1190.046185] 13:14:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=@getpolicy={0x1ac, 0x15, 0x4, 0x70bd29, 0x25dfdbfc, {{@in=@broadcast, @in6=@empty, 0x4e22, 0x2e, 0x4e20, 0x7, 0x2, 0x0, 0x20, 0x3b, 0x0, 0xffffffffffffffff}, 0x6e6bc0, 0x1}, [@replay_val={0x10, 0xa, {0x70bd2a, 0x70bd2c, 0x5}}, @algo_aead={0x14b, 0x12, {{'rfc4106-gcm-aesni\x00'}, 0x7f8, 0x3e0, "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"}}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x40000}, 0x4851) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@getpolicy={0x5c, 0x15, 0x1, 0x0, 0x0, {{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, [@mark={0xc}]}, 0x5c}}, 0x0) [ 1190.063363] cgroup: fork rejected by pids controller in /syz0 13:14:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x48}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') getpeername(0xffffffffffffffff, &(0x7f0000000000)=@nfc, &(0x7f00000000c0)=0x80) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) 13:14:33 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 31) 13:14:33 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:14:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x3}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd}, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:14:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:14:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:33 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xcd, 0x1f, 0x1f, 0xf4, 0x0, 0x1000, 0x40, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x5, 0xecd0}, 0x4200, 0x20, 0x0, 0x7, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) socket$inet6_icmp(0xa, 0x2, 0x3a) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r5, 0x0, 0x220) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000000380)=ANY=[]) write$binfmt_aout(r2, 0x0, 0x220) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3, 0x0, 0x7, 0x0, 0x0, 0x3ff, 0x50200, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2ca, 0x0, @perf_config_ext={0x4}, 0x2, 0x1, 0x54, 0x5, 0x80000001, 0x4, 0x2, 0x0, 0x8, 0x0, 0x8800}, 0x0, 0x6, r2, 0x9) capset(&(0x7f0000000280)={0x19980330, 0xffffffffffffffff}, &(0x7f00000002c0)={0x5, 0x8ae, 0x8001, 0x5, 0x4, 0x80000001}) capset(&(0x7f0000000300)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000340)={0xf52e, 0x2, 0x4, 0x6, 0xc07, 0x10001}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0xf50f, 0x0) 13:14:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x65}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:33 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 32) 13:14:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:14:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:33 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) [ 1209.225340] FAULT_INJECTION: forcing a failure. [ 1209.225340] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.226820] CPU: 0 PID: 8904 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1209.227835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.228842] Call Trace: [ 1209.229186] [ 1209.229506] dump_stack_lvl+0x8f/0xb7 [ 1209.230047] should_fail_ex.cold+0x5/0xa [ 1209.230616] ? key_alloc+0xd20/0x1280 [ 1209.231125] should_failslab+0x9/0x20 [ 1209.231651] kmem_cache_alloc+0x5a/0x410 [ 1209.232193] ? __pfx_vsnprintf+0x10/0x10 [ 1209.232740] key_alloc+0xd20/0x1280 [ 1209.233242] ? sprintf+0xc4/0x100 [ 1209.233729] ? __pfx_key_alloc+0x10/0x10 [ 1209.234269] ? request_key_auth_new+0x107/0x940 [ 1209.235182] ? rcu_read_lock_sched_held+0x42/0x80 [ 1209.235988] ? trace_kmalloc+0x2d/0xe0 [ 1209.236654] request_key_auth_new+0x6a3/0x940 [ 1209.237398] ? __pfx_request_key_auth_new+0x10/0x10 [ 1209.238235] ? refcount_dec_and_lock+0x36/0x150 [ 1209.239016] request_key_and_link+0xd5d/0x1210 [ 1209.239787] ? __pfx_request_key_and_link+0x10/0x10 [ 1209.240595] ? lock_acquire+0x32/0xc0 [ 1209.241238] ? key_type_lookup+0x1e/0x100 [ 1209.241940] ? __pfx_key_default_cmp+0x10/0x10 [ 1209.242667] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1209.243513] ? _copy_from_user+0xf6/0x180 [ 1209.244197] __do_sys_request_key+0x21f/0x3b0 [ 1209.244810] ? __pfx___do_sys_request_key+0x10/0x10 [ 1209.245471] ? syscall_enter_from_user_mode+0x21/0x50 [ 1209.246166] ? syscall_enter_from_user_mode+0x21/0x50 [ 1209.246857] do_syscall_64+0x3f/0x90 [ 1209.247370] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1209.248067] RIP: 0033:0x7f1da7f6db19 [ 1209.248555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.250738] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1209.251701] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1209.252589] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1209.253480] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.254366] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1209.255254] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1209.256231] 13:14:52 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:14:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x68}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:14:52 executing program 5: rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:14:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x5}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 33) 13:14:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x65}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:52 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYRES32]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000380)={r0, 0x8, 0x1, 0x400}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e21, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1200}, 0x1c) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, 0x0, 0x2, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}}, 0x40091) fallocate(r2, 0x0, 0x0, 0x87ffffc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r4, &(0x7f0000000080)="01", 0x292e9) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001440)=ANY=[@ANYRES32=r5, @ANYRESHEX]) 13:14:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x68}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 34) 13:14:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:14:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f00000003c0)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x3b}, &(0x7f0000000280)=""/12, 0xc, &(0x7f00000002c0)=""/164, &(0x7f0000000380)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x6, 0x0, 0x53, 0x91, 0x0, 0xfffffffffffff001, 0x5, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100)}, 0x2000, 0x80000001, 0x2, 0x5, 0x6, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1ff}, r1, 0x2, r0, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) capget(&(0x7f00000004c0)={0x20071026, r2}, &(0x7f0000000500)={0x0, 0x4, 0x100, 0xac, 0xf100, 0x4}) 13:14:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1228.593481] FAULT_INJECTION: forcing a failure. [ 1228.593481] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.594752] CPU: 0 PID: 9130 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1228.595528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1228.596306] Call Trace: [ 1228.596571] [ 1228.596810] dump_stack_lvl+0x8f/0xb7 [ 1228.597223] should_fail_ex.cold+0x5/0xa [ 1228.597653] ? key_alloc+0x433/0x1280 [ 1228.598049] should_failslab+0x9/0x20 [ 1228.598438] __kmem_cache_alloc_node+0x5b/0x400 [ 1228.598908] ? key_alloc+0x433/0x1280 [ 1228.599311] ? key_alloc+0x433/0x1280 [ 1228.599692] __kmalloc_node_track_caller+0x43/0xb0 [ 1228.600210] kmemdup+0x2c/0x60 [ 1228.600549] key_alloc+0x433/0x1280 [ 1228.600931] ? sprintf+0xc4/0x100 [ 1228.601308] ? __pfx_key_alloc+0x10/0x10 [ 1228.601715] ? request_key_auth_new+0x107/0x940 [ 1228.602181] ? rcu_read_lock_sched_held+0x42/0x80 [ 1228.602670] ? trace_kmalloc+0x2d/0xe0 [ 1228.603081] request_key_auth_new+0x6a3/0x940 [ 1228.603551] ? __pfx_request_key_auth_new+0x10/0x10 [ 1228.604068] ? refcount_dec_and_lock+0x36/0x150 [ 1228.604539] request_key_and_link+0xd5d/0x1210 [ 1228.605013] ? __pfx_request_key_and_link+0x10/0x10 [ 1228.605501] ? lock_acquire+0x32/0xc0 [ 1228.605895] ? key_type_lookup+0x1e/0x100 [ 1228.606319] ? __pfx_key_default_cmp+0x10/0x10 [ 1228.606796] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1228.607320] ? _copy_from_user+0xf6/0x180 [ 1228.607762] __do_sys_request_key+0x21f/0x3b0 [ 1228.608248] ? __pfx___do_sys_request_key+0x10/0x10 [ 1228.608748] ? trace_rcu_dyntick+0x1a7/0x250 [ 1228.609208] ? syscall_enter_from_user_mode+0x21/0x50 [ 1228.609725] ? syscall_enter_from_user_mode+0x21/0x50 [ 1228.610257] do_syscall_64+0x3f/0x90 [ 1228.610655] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1228.611176] RIP: 0033:0x7f1da7f6db19 [ 1228.611540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1228.613228] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1228.613952] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1228.614634] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1228.615314] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1228.616005] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1228.616682] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1228.617397] 13:14:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 35) 13:14:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xffffffff00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:14:53 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:14:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x74}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:14:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x74}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = syz_open_dev$vcsu(&(0x7f0000000100), 0x8, 0x200) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000140)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 13:15:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) perf_event_open(&(0x7f00000011c0)={0x5, 0x80, 0x8, 0x3, 0x6, 0x7, 0x0, 0x8, 0x104, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x4, 0x6e95}, 0x808, 0x6, 0x9, 0x2, 0x9, 0x6, 0x5, 0x0, 0xffff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, r1, 0x1) 13:15:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 36) 13:15:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:15:09 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:15:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7a}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1245.076379] FAULT_INJECTION: forcing a failure. [ 1245.076379] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.077248] CPU: 0 PID: 9508 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1245.077843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1245.078458] Call Trace: [ 1245.078663] [ 1245.078841] dump_stack_lvl+0x8f/0xb7 [ 1245.079155] should_fail_ex.cold+0x5/0xa [ 1245.079488] should_failslab+0x9/0x20 [ 1245.079794] __kmem_cache_alloc_node+0x5b/0x400 [ 1245.080167] ? selinux_key_alloc+0x4a/0x1b0 [ 1245.080504] ? memcpy+0x3d/0x60 [ 1245.080790] kmalloc_trace+0x26/0x60 [ 1245.081098] selinux_key_alloc+0x4a/0x1b0 [ 1245.081435] security_key_alloc+0x5a/0xb0 [ 1245.081762] key_alloc+0x8a7/0x1280 [ 1245.082065] ? sprintf+0xc4/0x100 [ 1245.082352] ? __pfx_key_alloc+0x10/0x10 [ 1245.082667] ? request_key_auth_new+0x107/0x940 [ 1245.083034] ? rcu_read_lock_sched_held+0x42/0x80 [ 1245.083417] ? trace_kmalloc+0x2d/0xe0 [ 1245.083743] request_key_auth_new+0x6a3/0x940 [ 1245.084107] ? __pfx_request_key_auth_new+0x10/0x10 [ 1245.084508] ? refcount_dec_and_lock+0x36/0x150 [ 1245.084868] request_key_and_link+0xd5d/0x1210 [ 1245.085239] ? __pfx_request_key_and_link+0x10/0x10 [ 1245.085616] ? lock_acquire+0x32/0xc0 [ 1245.085912] ? key_type_lookup+0x1e/0x100 [ 1245.086250] ? __pfx_key_default_cmp+0x10/0x10 [ 1245.086608] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1245.087039] ? _copy_from_user+0xf6/0x180 [ 1245.087369] __do_sys_request_key+0x21f/0x3b0 [ 1245.087728] ? __pfx___do_sys_request_key+0x10/0x10 [ 1245.088122] ? syscall_enter_from_user_mode+0x21/0x50 [ 1245.088528] ? syscall_enter_from_user_mode+0x21/0x50 [ 1245.088945] do_syscall_64+0x3f/0x90 [ 1245.089260] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1245.089652] RIP: 0033:0x7f1da7f6db19 [ 1245.089938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1245.091217] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1245.091794] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1245.092360] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1245.092888] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1245.093429] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1245.093957] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1245.094585] 13:15:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7a}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:09 executing program 4: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9baf) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x45, 0x8, 0x54, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x2}, 0x0, 0x8, 0x2, 0x7, 0x2, 0x200, 0x8000, 0x0, 0x1d7, 0x0, 0x100}, 0x0, 0xb, 0xffffffffffffffff, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)=0x80, &(0x7f0000000300)=@isdn, 0x0, 0x80800}, 0x3) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x39a}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002abd7000ffdbdf0008007f00000108000100242f4000000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x90c4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) r2 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1800) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000003c0)={'ipvlan1\x00'}) syz_io_uring_setup(0x1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0xa, &(0x7f0000000640), 0x1, 0x1}, 0xd1) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x80081270, &(0x7f0000000000)) syz_open_dev$vcsn(&(0x7f0000000200), 0x4e6, 0x80840) 13:15:09 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:15:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:15:28 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:15:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xa}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:28 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x6, 0xffffffff}) 13:15:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:15:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[\x00 ', 0xffffffffffffffff) 13:15:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 37) 13:15:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[\x00 ', 0xffffffffffffffff) [ 1264.186819] cgroup: fork rejected by pids controller in /syz2 13:15:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x02', 0xffffffffffffffff) 13:15:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:15:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 38) 13:15:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) fstat(r0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:15:28 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0), 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:15:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x02', 0xffffffffffffffff) [ 1264.355148] FAULT_INJECTION: forcing a failure. [ 1264.355148] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.356005] CPU: 0 PID: 9900 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1264.356597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.357174] Call Trace: [ 1264.357368] [ 1264.357550] dump_stack_lvl+0x8f/0xb7 [ 1264.357856] should_fail_ex.cold+0x5/0xa [ 1264.358173] ? key_alloc+0x3d5/0x1280 [ 1264.358466] should_failslab+0x9/0x20 [ 1264.358764] kmem_cache_alloc+0x5a/0x410 [ 1264.359095] key_alloc+0x3d5/0x1280 [ 1264.359395] ? __pfx_key_alloc+0x10/0x10 [ 1264.359703] ? __pfx_sprintf+0x10/0x10 [ 1264.360009] ? lock_is_held_type+0xdb/0x130 [ 1264.360354] keyring_alloc+0x46/0xc0 [ 1264.360647] call_sbin_request_key+0x26d/0xc60 [ 1264.360994] ? __key_instantiate_and_link+0xfa/0x3f0 [ 1264.361385] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1264.361764] ? __pfx_request_key_auth_free_preparse+0x10/0x10 [ 1264.362200] ? key_instantiate_and_link+0x38d/0x4a0 [ 1264.362579] ? _raw_spin_unlock+0x28/0x50 [ 1264.362893] ? key_alloc+0xad0/0x1280 [ 1264.363190] ? __pfx_key_instantiate_and_link+0x10/0x10 [ 1264.363590] ? sprintf+0xc4/0x100 [ 1264.363870] ? rcu_read_lock_sched_held+0x42/0x80 [ 1264.364239] ? trace_kmalloc+0x2d/0xe0 [ 1264.364566] ? request_key_auth_new+0x6ef/0x940 [ 1264.364926] ? __pfx_request_key_auth_new+0x10/0x10 [ 1264.365310] ? refcount_dec_and_lock+0x36/0x150 [ 1264.365677] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1264.366062] request_key_and_link+0xdef/0x1210 [ 1264.366417] ? __pfx_request_key_and_link+0x10/0x10 [ 1264.366792] ? lock_acquire+0x32/0xc0 [ 1264.367093] ? key_type_lookup+0x1e/0x100 [ 1264.367418] ? __pfx_key_default_cmp+0x10/0x10 [ 1264.367772] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1264.368165] ? _copy_from_user+0xf6/0x180 [ 1264.368500] __do_sys_request_key+0x21f/0x3b0 [ 1264.368855] ? __pfx___do_sys_request_key+0x10/0x10 [ 1264.369257] ? syscall_enter_from_user_mode+0x21/0x50 [ 1264.369651] ? syscall_enter_from_user_mode+0x21/0x50 [ 1264.370058] do_syscall_64+0x3f/0x90 [ 1264.370347] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1264.370736] RIP: 0033:0x7f1da7f6db19 [ 1264.371017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1264.372315] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1264.372876] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1264.373400] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1264.373914] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.374443] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1264.374954] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1264.375500] 13:15:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x03', 0xffffffffffffffff) 13:15:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:15:28 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:15:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xf}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x103}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:15:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 39) 13:15:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x48}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:43 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0), 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:15:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'veth0_virt_wifi\x00', 0x4}, 0x18) setsockopt$sock_timeval(r0, 0x1, 0x1d, &(0x7f0000000000)={0x77359400}, 0xffffffffffffff9f) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x228a41, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f00000000c0)={r1, r2/1000+60000}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pwritev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="b40d887cfe724a858c3eff438bb7c4ed9f4f3b74d5d8bb283de1", 0x1a}, {&(0x7f00000001c0)="f1ff94cb39346b8fbe278fe2bb69aafe6d00c8db3776ccc0ca5d6f0a9dca4ac5f525d42cd855a5c72cc71ff24cafa072186d6a3105d3e4a22a7cb386392ccd9e8dd917a6c51385e6d0b34a8ea60e40edab949d55eb7fa4fcaf6b7609298f9e3269c9baeef33baa185beb33e5123f91cf1b895d0b4cda52c70f45a23ad6a3bf62495ab29864580b1527325e9d6d3ecc293519fccb3237133b437c0f188cb2f22252c6f1131f24d87edb6e0e6a8d2842c19fee9c30ad442c61f0a233ec967357729bc9bd99bd32449aab8c4f3fd7bd27dd19ef69bae414ebe913bc6e47e3a4e0cdddba50369e7d132b9b21ff1042852bdfa16875492c822291221f", 0xfa}, {&(0x7f00000002c0)="dfe096afa5fef76a30242e710a8ff61e2c8aa90e41a6fd60a7b95d114fa719d39b559e8c4f39fd325ad7d865a2329e6a270237bac8411ab588c542fbdf505a26ab10e73764c88d4de5e9eef2928b5da0294daa5d46f060d16931247233f06716ce770b27093c1773f3d0d997753d62e485853cf68ef28f4ace16c3e93fd7201da21d2b650737c3035d2ca5d9111a7463862361d5c33cc1a5820b07f22381616cd116226815769e891a108fbdae78847217b7d206f869d56a9b1ca95cdd9eb4a4d30dabc5ef30015cabd44b07535f1ccb9bfd4f499291d1f345512f2e9a81f9ef52451f36f74fab5636e2dfbafec5330887", 0xf1}], 0x3, 0x8, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000440)={@rand_addr=0x64010101, @rand_addr=0x64010101}, 0xc) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) 13:15:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x04', 0xffffffffffffffff) 13:15:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 40) 13:15:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x03', 0xffffffffffffffff) 13:15:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x14a}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:15:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1f, 0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:15:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x8, 0x2, 0x7, 0x0, 0x4, 0x4000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4e, 0x2, @perf_config_ext={0x40, 0x800}, 0x88, 0x5f8, 0x9, 0x0, 0xffffffffffffffff, 0x200, 0x400, 0x0, 0xfffffff8, 0x0, 0x10000}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) [ 1278.714972] FAULT_INJECTION: forcing a failure. [ 1278.714972] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.716480] CPU: 0 PID: 10277 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1278.717512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1278.718526] Call Trace: [ 1278.718876] [ 1278.719184] dump_stack_lvl+0x8f/0xb7 [ 1278.719725] should_fail_ex.cold+0x5/0xa [ 1278.720284] ? key_alloc+0x433/0x1280 [ 1278.720822] should_failslab+0x9/0x20 [ 1278.721332] __kmem_cache_alloc_node+0x5b/0x400 [ 1278.721939] ? key_alloc+0x433/0x1280 [ 1278.722467] ? key_alloc+0x433/0x1280 [ 1278.722965] __kmalloc_node_track_caller+0x43/0xb0 [ 1278.723621] kmemdup+0x2c/0x60 [ 1278.724068] key_alloc+0x433/0x1280 [ 1278.724620] ? __pfx_key_alloc+0x10/0x10 [ 1278.725180] ? __pfx_sprintf+0x10/0x10 [ 1278.725740] ? lock_is_held_type+0xdb/0x130 [ 1278.726536] keyring_alloc+0x46/0xc0 [ 1278.727252] call_sbin_request_key+0x26d/0xc60 [ 1278.728121] ? __key_instantiate_and_link+0xfa/0x3f0 [ 1278.728957] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1278.729656] ? __pfx_request_key_auth_free_preparse+0x10/0x10 [ 1278.730470] ? key_instantiate_and_link+0x38d/0x4a0 [ 1278.731138] ? _raw_spin_unlock+0x28/0x50 [ 1278.731721] ? key_alloc+0xad0/0x1280 [ 1278.732268] ? __pfx_key_instantiate_and_link+0x10/0x10 [ 1278.733074] ? sprintf+0xc4/0x100 [ 1278.733597] ? rcu_read_lock_sched_held+0x42/0x80 [ 1278.734259] ? trace_kmalloc+0x2d/0xe0 [ 1278.734820] ? request_key_auth_new+0x6ef/0x940 [ 1278.735454] ? __pfx_request_key_auth_new+0x10/0x10 [ 1278.736156] ? refcount_dec_and_lock+0x36/0x150 [ 1278.736814] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1278.737491] request_key_and_link+0xdef/0x1210 [ 1278.738127] ? __pfx_request_key_and_link+0x10/0x10 [ 1278.738802] ? lock_acquire+0x32/0xc0 [ 1278.739334] ? key_type_lookup+0x1e/0x100 [ 1278.739918] ? __pfx_key_default_cmp+0x10/0x10 [ 1278.740567] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1278.741288] ? _copy_from_user+0xf6/0x180 [ 1278.741879] __do_sys_request_key+0x21f/0x3b0 [ 1278.742500] ? __pfx___do_sys_request_key+0x10/0x10 [ 1278.743185] ? syscall_enter_from_user_mode+0x21/0x50 [ 1278.743891] ? syscall_enter_from_user_mode+0x21/0x50 [ 1278.744622] do_syscall_64+0x3f/0x90 [ 1278.745158] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1278.745868] RIP: 0033:0x7f1da7f6db19 [ 1278.746373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.748708] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1278.749706] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1278.750643] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1278.751606] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1278.752563] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1278.753484] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1278.754486] 13:15:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x04', 0xffffffffffffffff) 13:15:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x301}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:15:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x05', 0xffffffffffffffff) 13:15:43 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0), 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:15:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = syz_open_dev$vcsn(&(0x7f0000000180), 0x88b, 0x608040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0xdd, 0x5, 0x7, 0x0, 0x3, 0x78400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x4}, 0x14410, 0x4a, 0x80, 0x9, 0x4, 0x0, 0x1, 0x0, 0x81d1, 0x0, 0xba}, 0x0, 0xd, r0, 0x18) r1 = clone3(&(0x7f0000000480)={0x100048000, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), {0x2c}, &(0x7f0000000340)=""/20, 0x14, &(0x7f0000000380)=""/150, &(0x7f0000000440)=[0xffffffffffffffff], 0x1, {r0}}, 0x58) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500), 0x40002, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x40, 0x7f, 0xec, 0x1, 0x0, 0x7, 0x200, 0xf, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0x42904, 0xbd, 0x2ff0, 0x2, 0x2, 0x2, 0x2, 0x0, 0x401, 0x0, 0x9}, r1, 0x4, r2, 0x2) 13:15:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x06', 0xffffffffffffffff) 13:15:59 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x410, &(0x7f0000000140)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000000fcc949db1c534e0defba2f1c04759997d605f837fd301a1abe82bca597f27a69cd8719b4840cc70fc2477cdd2cdb40d786e77ad55fc5935853ffb958dd521cb527ccc75a9e6f49e7bc29e5c3f411d4dfe3e325b231d13bbdf9951d4c11363aa20e5a", @ANYRES32=r2, @ANYBLOB="02000100", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000020000000000"], 0x3c, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getuid() fsetxattr$system_posix_acl(r4, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r5}, {0x2, 0x1, r6}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x2, &(0x7f0000000480)=[{&(0x7f00000002c0)="ab0c36532c541728af9121c8fca41a974e00ba3f167c8a2044783fcf8c3a19114e7bdf07442f42f429fb780ad633f674c61f2208c1206a1a7c422b5651f3a950ea740d477a013ee9e54dca6879c2de90cf3a5696ccc0f452b59cb9699db3eb95b56ae7704c9cdc2b1e90d1a568d86d9a12e6514d116773deb1cc76af318360fea82ca8ab64ad133abe4e5e7d9de520ffbd34b6b7919400f775f3d1166bfc53956aa27b940e4cb0f71b0a02d5c2e1bc4f68a53998d776c4ef0fa3e2adc5bbf7b6b7bc8c07bed11ffbca88fb88fa7c3c47296a3fd005f8e0f3e91ff3f9195ce50554cb46f05d237b8b5ab5278a4d", 0xed, 0x9}, {&(0x7f00000003c0)="796272f8df302965b786f5a1b260eb35f21ed322932733e01eb88e9c2d5e62213ab3b999a585ccdc312c36ac9fcc9af3db19c8ab152df72844c9eb26cbb48024d018a07b51aa81163b3369fa28c7f3cbc4401859d60e6ffa19d433d7e66a69379e0a7d0587ba03410f0791f02f659422cbb177f74586a654bf887f76c15f18470ec29b32073dcc71f6383242e4cdcfa8ddceb1ec30687adcc654e3aef61a5937", 0xa0, 0x2}], 0x8080, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, '\xd9\x00\x00\x00$\''}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_gt={'uid>', r5}}, {@smackfshat}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@hash}]}) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000040)='fsname', &(0x7f0000000140)='./file0/file0\x00', r0) chdir(&(0x7f0000000580)='.\x00') r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, 0x0, 0x220) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r7, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r7, {0x2}}, './file1\x00'}) openat(r8, &(0x7f00000001c0)='./file0\x00', 0x200080, 0x180) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r7}, './file1\x00'}) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r9, &(0x7f0000001180)=ANY=[], 0x220) ftruncate(r9, 0x7f) 13:15:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:15:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8a", 0x72, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:15:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 41) 13:15:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x05', 0xffffffffffffffff) 13:15:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 42) 13:15:59 executing program 5: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x20, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:15:59 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x60d00, 0x0) r3 = accept$unix(r2, 0x0, &(0x7f0000000000)) fcntl$setflags(r3, 0x2, 0x1) write(r1, &(0x7f0000000200)='E', 0x140000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r4, 0xe, 0xffffffffffffffff, 0xb) r5 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x9, 0x3, 0x1, 0x99, 0x0, 0x8, 0x85020, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0x1f}, 0x14020, 0x9, 0x5, 0x2, 0xfff, 0x90da, 0x9, 0x0, 0xb4a80000, 0x0, 0x81}, r4, 0x4, r0, 0x6) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x20, 0x9, 0x8, 0x0, 0x93a, 0x16308, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000140), 0x9}, 0x40100, 0x9, 0x0, 0x7, 0xfffffffffffffffd, 0x3a19, 0x5, 0x0, 0x7, 0x0, 0x3}, 0xffffffffffffffff, 0x3, r5, 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x302e1cec00cdaec6, 0x0) 13:15:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e80}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:15:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x06', 0xffffffffffffffff) [ 1294.920297] FAULT_INJECTION: forcing a failure. [ 1294.920297] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.922188] CPU: 1 PID: 10890 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1294.923388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1294.924593] Call Trace: [ 1294.924998] 13:15:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\a', 0xffffffffffffffff) [ 1294.925359] dump_stack_lvl+0x8f/0xb7 [ 1294.926123] should_fail_ex.cold+0x5/0xa [ 1294.926742] should_failslab+0x9/0x20 [ 1294.927333] __kmem_cache_alloc_node+0x5b/0x400 [ 1294.928014] ? selinux_key_alloc+0x4a/0x1b0 [ 1294.928655] ? memcpy+0x3d/0x60 [ 1294.929183] kmalloc_trace+0x26/0x60 [ 1294.929747] selinux_key_alloc+0x4a/0x1b0 [ 1294.930364] security_key_alloc+0x5a/0xb0 [ 1294.930986] key_alloc+0x8a7/0x1280 [ 1294.931557] ? __pfx_key_alloc+0x10/0x10 [ 1294.932160] ? __pfx_sprintf+0x10/0x10 [ 1294.932763] ? lock_is_held_type+0xdb/0x130 [ 1294.933411] keyring_alloc+0x46/0xc0 [ 1294.933984] call_sbin_request_key+0x26d/0xc60 [ 1294.934672] ? __key_instantiate_and_link+0xfa/0x3f0 [ 1294.935424] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1294.936159] ? __pfx_request_key_auth_free_preparse+0x10/0x10 [ 1294.937009] ? key_instantiate_and_link+0x38d/0x4a0 [ 1294.937757] ? _raw_spin_unlock+0x28/0x50 [ 1294.938372] ? key_alloc+0xad0/0x1280 [ 1294.938937] ? __pfx_key_instantiate_and_link+0x10/0x10 [ 1294.939716] ? sprintf+0xc4/0x100 [ 1294.940291] ? rcu_read_lock_sched_held+0x42/0x80 [ 1294.941062] ? trace_kmalloc+0x2d/0xe0 [ 1294.941695] ? request_key_auth_new+0x6ef/0x940 [ 1294.942338] ? __pfx_request_key_auth_new+0x10/0x10 [ 1294.943056] ? refcount_dec_and_lock+0x36/0x150 [ 1294.943706] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1294.944391] request_key_and_link+0xdef/0x1210 [ 1294.945043] ? __pfx_request_key_and_link+0x10/0x10 13:15:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8a", 0x72, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) [ 1294.945725] ? lock_acquire+0x32/0xc0 [ 1294.946337] ? key_type_lookup+0x1e/0x100 [ 1294.946903] ? __pfx_key_default_cmp+0x10/0x10 [ 1294.947559] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1294.948317] ? _copy_from_user+0xf6/0x180 [ 1294.948913] __do_sys_request_key+0x21f/0x3b0 [ 1294.949535] ? __pfx___do_sys_request_key+0x10/0x10 [ 1294.950269] ? syscall_enter_from_user_mode+0x21/0x50 [ 1294.950981] ? syscall_enter_from_user_mode+0x21/0x50 [ 1294.951706] do_syscall_64+0x3f/0x90 [ 1294.952242] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1294.952987] RIP: 0033:0x7f1da7f6db19 [ 1294.953520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.956007] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1294.957034] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1294.958028] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1294.958994] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1294.959948] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1294.960899] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1294.961960] 13:15:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x65}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:15:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\b', 0xffffffffffffffff) 13:16:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3ec0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:16:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x68}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:16:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 43) 13:16:16 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8a", 0x72, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:16:16 executing program 4: r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@loopback, @remote, @remote}, &(0x7f0000000040)=0xc) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) syz_io_uring_setup(0x5ce2, &(0x7f0000000a00)={0x0, 0x0, 0x10, 0x0, 0x10a, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f0000000a80), &(0x7f0000000ac0)) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) socket(0x0, 0x6, 0x80) 13:16:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\n', 0xffffffffffffffff) 13:16:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c000000b0acb50a15c55e069fff47fbee7550950e915ec9f3bc444347195ec276a423dc6015126ee7052300000800ba080000000000000022f44464681d56cd19ef2ab68f3c", @ANYRES16=r1, @ANYBLOB="0508000000f9ffffffff01000000180001801400020067656e65766530000000000000000000"], 0x2c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0x2a, 0x4, 0x200, 0xd, @private0, @local, 0x1, 0x8000, 0x9}}) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r1, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x2000c871}, 0x4040000) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xff, 0x63, 0x1f, 0x2, 0x0, 0x9, 0x0, 0x5, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x2}, 0x220, 0x1, 0x3, 0x3, 0x10001, 0x8, 0x1, 0x0, 0xc, 0x0, 0x9c000000}, 0xffffffffffffffff, 0x8, r3, 0x2) 13:16:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\a', 0xffffffffffffffff) 13:16:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 44) 13:16:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:16:16 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0xc002, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x2) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffff7ffe}) capget(&(0x7f0000000100)={0x20080522}, &(0x7f0000000140)={0x9, 0x80000001, 0x2, 0x4, 0x80000000, 0x5}) capget(&(0x7f00000001c0)={0x19980330}, &(0x7f0000000200)={0x3, 0x7, 0xe496, 0x0, 0x401, 0x100}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000240)={r0, 0x40, 0x1, 0x7}) [ 1312.249756] FAULT_INJECTION: forcing a failure. [ 1312.249756] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.251686] CPU: 0 PID: 11589 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1312.252794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1312.253905] Call Trace: [ 1312.254275] [ 1312.254613] dump_stack_lvl+0x8f/0xb7 [ 1312.255193] should_fail_ex.cold+0x5/0xa [ 1312.255806] should_failslab+0x9/0x20 [ 1312.256376] __kmem_cache_alloc_node+0x5b/0x400 [ 1312.257067] ? assoc_array_insert+0xe2/0x2b70 [ 1312.257715] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 1312.258413] ? keyring_instantiate+0x1d3/0x2b0 [ 1312.259099] kmalloc_trace+0x26/0x60 [ 1312.259671] assoc_array_insert+0xe2/0x2b70 [ 1312.260322] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1312.261056] ? rcu_read_lock_sched_held+0x42/0x80 [ 1312.261771] ? trace_lock_acquire+0x14c/0x1c0 [ 1312.262435] ? __pfx_assoc_array_insert+0x10/0x10 [ 1312.263131] ? lock_acquire+0x32/0xc0 [ 1312.263699] ? key_link+0xb5/0x350 [ 1312.264265] ? down_write+0x157/0x220 [ 1312.264850] ? __pfx_down_write+0x10/0x10 [ 1312.265520] __key_link_begin+0xf0/0x250 [ 1312.266156] key_link+0x107/0x350 [ 1312.266701] ? lock_is_held_type+0xdb/0x130 [ 1312.267342] ? __pfx_key_link+0x10/0x10 [ 1312.267968] ? keyring_alloc+0x90/0xc0 [ 1312.268574] call_sbin_request_key+0x2ca/0xc60 [ 1312.269267] ? __key_instantiate_and_link+0xfa/0x3f0 [ 1312.270020] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1312.270761] ? __pfx_request_key_auth_free_preparse+0x10/0x10 [ 1312.271613] ? key_instantiate_and_link+0x38d/0x4a0 [ 1312.272339] ? _raw_spin_unlock+0x28/0x50 [ 1312.272961] ? key_alloc+0xad0/0x1280 [ 1312.273534] ? __pfx_key_instantiate_and_link+0x10/0x10 [ 1312.274305] ? sprintf+0xc4/0x100 [ 1312.274869] ? trace_kmalloc+0x2d/0xe0 [ 1312.275484] ? request_key_auth_new+0x6ef/0x940 [ 1312.276171] ? __pfx_request_key_auth_new+0x10/0x10 [ 1312.276951] ? refcount_dec_and_lock+0x36/0x150 [ 1312.277659] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1312.278391] request_key_and_link+0xdef/0x1210 [ 1312.279092] ? __pfx_request_key_and_link+0x10/0x10 [ 1312.279829] ? lock_acquire+0x32/0xc0 [ 1312.280409] ? key_type_lookup+0x1e/0x100 [ 1312.281059] ? __pfx_key_default_cmp+0x10/0x10 [ 1312.281737] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1312.282492] ? _copy_from_user+0xf6/0x180 [ 1312.283108] __do_sys_request_key+0x21f/0x3b0 [ 1312.283778] ? __pfx___do_sys_request_key+0x10/0x10 [ 1312.284486] ? trace_rcu_dyntick+0x1a7/0x250 [ 1312.285175] ? syscall_enter_from_user_mode+0x21/0x50 [ 1312.285917] ? syscall_enter_from_user_mode+0x21/0x50 [ 1312.286674] do_syscall_64+0x3f/0x90 [ 1312.287255] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1312.287996] RIP: 0033:0x7f1da7f6db19 [ 1312.288522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1312.290933] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1312.291974] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1312.292947] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1312.293914] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1312.294893] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1312.295878] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1312.296942] 13:16:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x0f', 0xffffffffffffffff) 13:16:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\b', 0xffffffffffffffff) 13:16:16 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c00"/171, 0xab, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:16:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:16:37 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c00"/171, 0xab, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:16:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,H', 0xffffffffffffffff) 13:16:37 executing program 4: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8a", 0x72, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:16:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6e00}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:16:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:16:37 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 45) 13:16:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\n', 0xffffffffffffffff) 13:16:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 46) 13:16:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x77, 0x0, 0x0, 0x40, 0x0, 0x0, 0x30880, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x4002, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x340, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) ioctl$CDROMEJECT(r0, 0x5309) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0xfffffffb, 0x1, 0xfffff001, 0x9, 0x401, 0x8}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000240)) capset(&(0x7f00000001c0)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000200)={0x2, 0x401, 0xfffffd56, 0x6, 0xfffffffc}) [ 1333.663340] FAULT_INJECTION: forcing a failure. [ 1333.663340] name failslab, interval 1, probability 0, space 0, times 0 [ 1333.664767] CPU: 1 PID: 12087 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1333.664812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1333.664827] Call Trace: [ 1333.664835] [ 1333.664845] dump_stack_lvl+0x8f/0xb7 [ 1333.664893] should_fail_ex.cold+0x5/0xa [ 1333.664935] should_failslab+0x9/0x20 [ 1333.664968] __kmem_cache_alloc_node+0x5b/0x400 [ 1333.665001] ? assoc_array_insert+0x3cb/0x2b70 [ 1333.665046] kmalloc_trace+0x26/0x60 [ 1333.665078] assoc_array_insert+0x3cb/0x2b70 [ 1333.665121] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1333.665161] ? rcu_read_lock_sched_held+0x42/0x80 [ 1333.665221] ? trace_lock_acquire+0x14c/0x1c0 [ 1333.665257] ? __pfx_assoc_array_insert+0x10/0x10 [ 1333.665288] ? lock_acquire+0x32/0xc0 [ 1333.665317] ? key_link+0xb5/0x350 [ 1333.665358] ? down_write+0x157/0x220 [ 1333.665393] ? __pfx_down_write+0x10/0x10 [ 1333.665437] __key_link_begin+0xf0/0x250 [ 1333.665472] key_link+0x107/0x350 [ 1333.665508] ? lock_is_held_type+0xdb/0x130 [ 1333.665543] ? __pfx_key_link+0x10/0x10 [ 1333.665580] ? keyring_alloc+0x90/0xc0 [ 1333.665617] call_sbin_request_key+0x2ca/0xc60 [ 1333.665645] ? __key_instantiate_and_link+0xfa/0x3f0 [ 1333.665678] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1333.665704] ? __pfx_request_key_auth_free_preparse+0x10/0x10 [ 1333.665730] ? key_instantiate_and_link+0x38d/0x4a0 [ 1333.665757] ? _raw_spin_unlock+0x28/0x50 [ 1333.665784] ? key_alloc+0xad0/0x1280 [ 1333.665811] ? __pfx_key_instantiate_and_link+0x10/0x10 [ 1333.665842] ? sprintf+0xc4/0x100 [ 1333.665881] ? rcu_read_lock_sched_held+0x42/0x80 [ 1333.665917] ? trace_kmalloc+0x2d/0xe0 [ 1333.665957] ? request_key_auth_new+0x6ef/0x940 [ 1333.665987] ? __pfx_request_key_auth_new+0x10/0x10 [ 1333.666027] ? refcount_dec_and_lock+0x36/0x150 [ 1333.666058] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1333.666083] request_key_and_link+0xdef/0x1210 [ 1333.666118] ? __pfx_request_key_and_link+0x10/0x10 [ 1333.666144] ? lock_acquire+0x32/0xc0 [ 1333.666173] ? key_type_lookup+0x1e/0x100 [ 1333.666208] ? __pfx_key_default_cmp+0x10/0x10 [ 1333.666241] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1333.666278] ? _copy_from_user+0xf6/0x180 [ 1333.666315] __do_sys_request_key+0x21f/0x3b0 [ 1333.666354] ? __pfx___do_sys_request_key+0x10/0x10 [ 1333.666387] ? trace_rcu_dyntick+0x1a7/0x250 [ 1333.666431] ? syscall_enter_from_user_mode+0x21/0x50 [ 1333.666467] ? syscall_enter_from_user_mode+0x21/0x50 [ 1333.666512] do_syscall_64+0x3f/0x90 [ 1333.666551] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1333.666591] RIP: 0033:0x7f1da7f6db19 [ 1333.666608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1333.666632] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1333.666657] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1333.666674] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1333.666690] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1333.666705] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1333.666721] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1333.666765] 13:16:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x0f', 0xffffffffffffffff) 13:16:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x74}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:16:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x803e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:16:38 executing program 5: sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x1c}}, 0x44) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x9, 0x0, 0xdc08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x8000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:16:38 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c00"/171, 0xab, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:16:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 47) 13:16:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,L', 0xffffffffffffffff) 13:16:38 executing program 4: r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000002880)=ANY=[]) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000000c0)=0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'veth0_to_hsr\x00'}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000040)={'tunl0\x00', 0xeb}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x400002, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r6, 0x0, 0x220) r7 = eventfd2(0x100, 0x80400) r8 = syz_open_dev$loop(&(0x7f0000002500), 0x2, 0x468a00) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002600)={0x3, &(0x7f00000025c0)=[{0x0, 0x8a, 0x9, 0xf3}, {0x100, 0x7, 0x81, 0x2}, {0x7, 0x20, 0x40, 0x480000}]}) io_submit(0x0, 0x8, &(0x7f0000002840)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x40, r4, &(0x7f0000000280)="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", 0x1000, 0x5, 0x0, 0x3}, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x1, 0x7, r5, &(0x7f0000001280)="d0c409de2b9a586792a77e037e09a3c3014885361c84cb027e848626e43e49bf0c8ac416a2153a3d2f5c9f374483c8362bb4211bda92736039a80e6847eac62ca37261b95212696d5dc578bbcb8e4f0f3018e42a53e836", 0x57, 0x8, 0x0, 0x0, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x6, 0xffffffffffffffff, &(0x7f0000001340), 0x0, 0xfffffffffffff001, 0x0, 0x2}, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x7, r0, &(0x7f00000013c0)="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", 0x1000, 0xfffffffffffffffa, 0x0, 0x1, r6}, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x4, r7, &(0x7f0000002400)="e4815140fd10cddf0ef5def079d5b5da3164aeb05d26f6b52ae411edf7967324477f0c46afd0c1d43e4df9cda90e3ef1d5bc7312412105074cfcf1c3f10eebdd8cf3a325a26d139537df2be6940131e50ee8f3448844402819735b419e14edad5a0272a30e5af8e87410e912d62b4f2710e3ced760522d5bbb11a158f6e1d116efd1579675d1", 0x86, 0x2, 0x0, 0x3, r3}, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x8, 0x400, r8, &(0x7f0000002540)="fecda9796f25fa34d4e2681bde30dbcd98d1c5b14c", 0x15, 0x101, 0x0, 0x1}, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x1, 0x8000, r9, &(0x7f0000002640)="ad10d08df5bed6151d15d9da3a7833b451ed2a93f30d189568dfee36e325f7a01fd8580e818b0bb393b85efb5befb316a07ada7b6e6a306e36b9f3002edafc5155fb2584d8f7aa06e0ff643aa7940a5bbcf57ad0f56b828a98317f609a6c03753c51be4a4a43f067ecf9e733f075bad7bc3a6f4cd71a4f9ab9f9203d6ff3db556efab410834e485daaff", 0x8a, 0x6, 0x0, 0x1}, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x8, 0x6, r2, &(0x7f0000002740)="dacc7502a6321f160bafbabc9c7941125a00db4196e9040e93dea6017ce678f50319226809b2e7bdffe93890af242f834ebafc06c75656ac54de301fee8ef0ba120b882636d02773b2a13ddc2619dea34295ff2fb8e483ec9e73d6a96718924f2c87bdddaf9cea9cc68ff3cab30b9e26e31178e3dfbdd81f058dff52137e62313d50f0992c4cce85d85ca1f650d11863c558c180e2c86a", 0x97, 0x1, 0x0, 0x2, r3}]) 13:16:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:16:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc03e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:16:53 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000002100)={0x24, @short}, 0x14) sendmsg$802154_raw(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x24, @short={0x2, 0x2}}, 0x14, &(0x7f00000000c0)={&(0x7f0000000040)="d65c602c25e46d64928c4b617f96ca9f981b07f88555a9af7031e488c386258fd5379d9f2b12e7bc977af116b5ff936d63ea516d85664b2ca9ff0ae3a09044e3f51504e1aaa4341cd0eacbb62f17c00a8a041e5b74b8a49cefdd37a7e0b58c97245b044c31c8b6", 0x67}, 0x1, 0x0, 0x0, 0x20000080}, 0x20004000) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x5, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r2, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x4, r4}, 0x80, 0x0}}], 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f00000001c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000000200)="d6343857f261839bf81129919f6df0c49a3bd9f040ab56aa0d47851fb2522b39c2c449922f48f5ccd58f4ca3479b6a377825f7a142b51d3676edea3b8804d428db17f5277ec49df068cb57ed8bb923ad7f7fa5b88100f408fd2ae3438685f4d2e2ff8f95fb700e82b4cd52631784619d0d00418d7b4303d1f0dc080cb1fec62c57afeb424d5ae7af60feaa", 0x8b}, {&(0x7f00000002c0)="f6957d72727e301386e232a59f0324050899f7cbb215ed1a3b53584c533985b236de16613659fd8c93a7328ca9ef423006eb5cbf980ea68a0deecf83d2b7d4e26099e04989a8ef3afba990491ea534e91073ecef16585d337028c809e95f555120ed5102d0078c30f52b616484f08dee1809f299b7a36b60b1eee4bc61bc43a68df453408f2cb7370654281a8f4b84627cab80525e6a8b22dca0f29ccfd403b288ce242b8b0dbadc672387726ef327dee411f6d351f9e05aff2c794a317c73976c9f30c5d39db71a8fd41da915c9b7cb7c67dc69e051abf166a884c12040f4f0534c98e996a60b67ab31cbe3d89c1004b2", 0xf1}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="558e965b183025800ffec4edf7270b174327fff0a68b8f1b2a7740f504a6eed90009371f60fc48bc54badff516b2017f5b941b46e7315deb91983317b8e0be90594f1a3d32785843803355feeed4016a5548e95313139bd4f8db82cf69de9e4767df8d2574e3636512fe7814220422ed7c88783f9b1c417164ff9639a0aeb83011b3c89069ad4210899ab04dcc10a384b63d09d4f3ead95d5957b2352e38c51c6ff9f1c0e2b72919a9093b4ee54118726c14de0e7fd83212ac82b6cb667229b3876b0a52c783458377d528d61cc5767ea15a6076639c04152f88a15a55f232e97adfd812be57ca89d96ead9155c3e60723", 0xf1}, {&(0x7f00000014c0)="d51eaf7a08eb46a7ca8c", 0xa}, {&(0x7f0000001500)="7fae9385fe380d4859e07a7727eb692e462d5a50bc8f754d604e1f11b6199adfaf689381130c8d7c4e66dc444926ba60cfd17c976803e39f258948b685ee3f11012ae73d26636f937f294b6937f3a35511521876027879b93d66594235a3ffda3a551b01b683b299f54174061f721bc88572292d7baaead5b5", 0x79}, {&(0x7f0000001580)="5bab386537c41c06295bfaca1791de711258bc2cec9f686ab2dad2cbaeb3d5098f9761f486b04cb8c7fc696b2793", 0x2e}], 0x7, &(0x7f0000001640)=[@ip_ttl={{0x14, 0x0, 0x2, 0x48ec}}, @ip_retopts={{0x70, 0x0, 0x7, {[@noop, @ssrr={0x89, 0x1b, 0x30, [@local, @empty, @local, @local, @rand_addr=0x64010102, @empty]}, @cipso={0x86, 0x44, 0xffffffffffffffff, [{0x6, 0xc, "65e92e5bd6cbf2ec0de7"}, {0x5, 0x2}, {0x0, 0x11, "cba15e8b66df2bebe991ecebe856d2"}, {0x2, 0x8, "37d033eb957f"}, {0x5, 0xa, "3c05680cdb36db67"}, {0x5, 0xd, "6a24dd5dfdfdc88e77bbf5"}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @local, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xbd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3ff}}], 0xf0}, 0x881) 13:16:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,e', 0xffffffffffffffff) 13:16:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 48) 13:16:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,H', 0xffffffffffffffff) 13:16:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7a}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:16:53 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362", 0xc7, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:16:53 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x8}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = dup(r1) sendmsg$NL80211_CMD_SET_NOACK_MAP(r2, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x7, 0x2f}}}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x20}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) [ 1349.239413] FAULT_INJECTION: forcing a failure. [ 1349.239413] name failslab, interval 1, probability 0, space 0, times 0 [ 1349.240290] CPU: 0 PID: 12595 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1349.240858] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1349.241427] Call Trace: [ 1349.241621] [ 1349.241791] dump_stack_lvl+0x8f/0xb7 [ 1349.242091] should_fail_ex.cold+0x5/0xa [ 1349.242402] should_failslab+0x9/0x20 [ 1349.242690] __kmem_cache_alloc_node+0x5b/0x400 [ 1349.243033] ? call_usermodehelper_setup+0xa9/0x330 [ 1349.243408] ? __pfx_sprintf+0x10/0x10 [ 1349.243709] kmalloc_trace+0x26/0x60 [ 1349.243997] call_usermodehelper_setup+0xa9/0x330 [ 1349.244364] ? __pfx_umh_keys_init+0x10/0x10 [ 1349.244683] ? __pfx_umh_keys_cleanup+0x10/0x10 [ 1349.245034] call_sbin_request_key+0x632/0xc60 [ 1349.245403] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1349.245774] ? __pfx_request_key_auth_free_preparse+0x10/0x10 [ 1349.246200] ? key_instantiate_and_link+0x38d/0x4a0 [ 1349.246579] ? __pfx_key_instantiate_and_link+0x10/0x10 [ 1349.246973] ? sprintf+0xc4/0x100 [ 1349.247274] ? request_key_auth_new+0x6ef/0x940 [ 1349.247631] ? __pfx_request_key_auth_new+0x10/0x10 [ 1349.248014] ? refcount_dec_and_lock+0x36/0x150 [ 1349.248364] ? __pfx_call_sbin_request_key+0x10/0x10 [ 1349.248736] request_key_and_link+0xdef/0x1210 [ 1349.249090] ? __pfx_request_key_and_link+0x10/0x10 [ 1349.249476] ? lock_acquire+0x32/0xc0 [ 1349.249767] ? key_type_lookup+0x1e/0x100 [ 1349.250087] ? __pfx_key_default_cmp+0x10/0x10 [ 1349.250436] ? __pfx_keyring_search_iterator+0x10/0x10 [ 1349.250830] ? _copy_from_user+0xf6/0x180 [ 1349.251155] __do_sys_request_key+0x21f/0x3b0 [ 1349.251500] ? __pfx___do_sys_request_key+0x10/0x10 [ 1349.251890] ? syscall_enter_from_user_mode+0x21/0x50 [ 1349.252275] ? syscall_enter_from_user_mode+0x21/0x50 [ 1349.252669] do_syscall_64+0x3f/0x90 [ 1349.252962] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1349.253350] RIP: 0033:0x7f1da7f6db19 [ 1349.253638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1349.254898] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 1349.255444] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19 [ 1349.255954] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1349.256453] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1349.256949] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1349.257470] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1349.258008] 13:16:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) capget(&(0x7f0000000100)={0x20071026, r2}, &(0x7f0000000140)={0x8136, 0x3, 0x9, 0x8, 0x1, 0xffff}) 13:16:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[\x00 ', 0xffffffffffffffff) 13:16:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x33fe0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:16:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 49) 13:16:53 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x20200, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x101, 0x6, 0x4, 0x52b, 0xfffffffe}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:16:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,h', 0xffffffffffffffff) 13:16:53 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362", 0xc7, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:16:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,L', 0xffffffffffffffff) 13:16:54 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000380)='./file0\x00', 0x0) r4 = getuid() fsetxattr$system_posix_acl(r3, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{}, {0x2, 0x0, r4}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') pread64(r5, &(0x7f00000000c0)=""/94, 0x5e, 0x2) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000240)=0x6e, 0x80000) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x161010, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@fscache}, {@dfltgid}], [{@permit_directio}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt}, {@measure}, {@subj_role={'subj_role', 0x3d, 'hugetlbfs\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'hugetlbfs\x00'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fowner_gt}]}}) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000006440)=0x0) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000006480)=0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0xa}, [{0x2, 0x6}, {0x2, 0x1}, {}], {}, [{0x8, 0x2, r9}, {0x8, 0x4}, {0x8, 0x2, r9}, {0x8, 0x1, r9}, {0x8, 0x2, r9}, {0x8, 0x4}, {0x8, 0x0, r9}, {0x8, 0x5, r9}, {0x8, 0x7, r9}], {0x10, 0x7}, {0x20, 0x4}}, 0x84, 0x2) sendmmsg$unix(r3, &(0x7f0000006600)=[{{&(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000580)="db48846ff800763563d8504ffb55d85f710b162398babd5f97018c09470fee7378f7daff2fbe766e8c037e0116d4285e953c668e7e3195931a9a4f2a8f9bf9a6d839b762a5e2e3a0004ba6c6a7ceb6010b289b7596441ffb2e8f1cfe7f53a120fc079ab4807c45c6f744", 0x6a}, {&(0x7f0000000600)="f30ce259ceea367172952bf74c1c38fe5238a51511f09602a8d6dbcbd2eedbc03a16994e44967bf302d13398f86c3820b2d6b48eb95c8b0915a64531b3220a0f7092430af55f297d07733ceb1c4807b2e5709511610d6429b2299299d0c60a7de0a867ed1a5c453151b3241dbee3339b12ff2bd26807e0ea4d99a0b11e9b1e134f6823c95bc0ec3407af5ac847b92f60724cba1e567d21d2bc4ea298e3274aa25dbe692aed541d61b08f72c6e8c0a686ea", 0xb1}, {&(0x7f00000006c0)="bf7026c6e0d05b7610a099a74ca745c7ab560b28ba964d7285a8e7d1a2a2f1c71b203e2a1696536b57d93f34cf2d67c00db7f0191c7de0ea1ac7c70bda020a7bb7a7cc0d5c00e50deb0aac3aa6e783a37332d5b2cce8299f6e48ce64d485e7e4dc9de7eef469ee4a6fc7f465d4a47969ffa747c975933a526a25057d648a087b0da43851", 0x84}, {&(0x7f0000000780)="6ce7965cd84ba9e9893d0f930bb9c57df0e030992a4bf51c7b2939e55348ea4e2f517ee779a9fffe8b6518e6a8f1f455143a6541a3e9a2a2d925f8c1a50b490a5e3cb620ebe40ca47d180c8b648abdf52d1c1929023e6ffcc8ab762880b323655a3723c4dea0a7cb1ae1e1bb1d94830b4153556ed3d741ee371c34af", 0x7c}, {&(0x7f00000001c0)="83a677220af9960423c6a3f4e3aad4a82c798d4fd59e92ad46576dafdf5134cd559b73b0fcb9e9fd", 0x28}, {&(0x7f0000000440)="62846ec9db0c42a035f651d63a08af447db0f08f52e0b93b69c31ce339731692", 0x20}, {&(0x7f0000000880)="cabc98e79af552bc28195f7a7d726293293a742d1e6f5fa28c321a234a6b1c18838883889a9956905e7b7cb220614d29ad169386f930ccd33366963016833b7d70b65c0b89e615b0796ca5f123f28f0f5080bdc1a1bfe28c372e4fea6660aa57e873e29b4c8a7c39b14f140f7cfb1a8e7ecdc0270216257cba82f1e66fa0ecc4773fe203cb75", 0x86}], 0x7, &(0x7f0000000a00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, r0, 0xffffffffffffffff, r5, r5]}}], 0x50, 0x1}}, {{&(0x7f0000000a80)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000b00)="b5080c97fdb96fc424e147a56dac3e7b0e11fb1d3f13e9d0f3443b8417400f355ee21e88af9aace474562802ccf7460278c85848d2641f1016db2a8721f86f327605ecafe61cc5612e68cbfd6f6f070272341af08797499810f6784363ed673cfee7", 0x62}, {&(0x7f0000000b80)="ebeff13554624bbf", 0x8}, {&(0x7f0000000bc0)="cdc681026333e44ed7147729ffed91e1158f95d5d970c313f5c9d74e5d162d1aea9b5341019850bfa10dd908351a7703eeb391d1c27b20a3b8f8c2c0330d3ec9be79aca80b71abec70457bd4f1df3d574cba78204a8f6e78042e16bbedeba3c7eae6e3b8bc74e03cdff8b0d6b7ae5930e675210a4bd12c1857489202d2b7f1040003a67d7c100f40a77a38aa969ddfc8feac3977cd17e2b69e674358a67d4e4bed02ae7150f0902781f0667fe6ae2cecf087dbf4069170ff81cef1ad6d8e9778726b8160bd0423e1cd4b1568", 0xcc}, {&(0x7f0000000cc0)="443ca7b86ecc4a69717abf146df1f7c6589e021a74fcf081802e04b5af5eec5bd500b84ece57cb65d96b0d4e465398ab6557eb8a65f6ea42eea7715264c158ac44b7a2eb9f492686339e7c270e0716830c4ebbd4d5ee0cc448cc19f58773c5d06239569b1281681dbef61067f0429ff20f13f30cadff3f55b7daf0b0f5cf41fdd42631a8f5507615d9f4b4213804360505ea44e3eb2254863e35c91cd550310855879cc2041cc1cdb4d83433f0ea9ab2b4a13a7418c3994dadc38e7efff2693246101e262b959b3b902be0efd2ce771a2af6431f2aa2ba70b47553d42efe4c8be3e0db094fa8dd", 0xe7}, {&(0x7f0000000dc0)="7876a8ee9685a6363bd59679f4d0b5e29d51d7e0d1c4a356909013ce420378fedc1dd5f3d59c423120b174358f8abd25c6567b52325a7c60ab99172e6cb5a56275aa235b9c676ae7fcd58ee1419c581da792668763ce094875733a00a2ceb645d0731f5c085a250d0feabd0469369c0ec80449067648fa113b6bbaf1b36df3b0981664f77bc84397534622aaca012db56e54cbdda9dbf1f77f711498ee318b0b3d3b6fc5df0dca9ba7340b2934c5eded6cde212595181a95801abc5be5677c070c187aec7e4bf3f1dadec49c6d806fc2b23d680b629da167320c3693e33c06a6854fb20d3132f0bfbd", 0xe9}], 0x5, 0x0, 0x0, 0x20008000}}, {{&(0x7f0000000f40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000010c0)=[{&(0x7f0000000fc0)="19a11475cac493c5c3881965dd994e2d5648c66c1c58452168a60d28fe75a0238fd1d6c5a6fc0d0c24de82abf33787b373d29d9aee6a987f8b18462925681efcf9a07e477e0f1cea07be943696c9f590d1888958f1c3f1dc1f52401d270f5500f41edc4175c9d6313e23849b025a3836a9444d97ccc57eb7086ddab15c2236f641cccee7fc2cb067aa72349bf7664774515351c8fbe6219eee0fa46c3b03b5a864890f32dc81e567fedbddd9fc5ea1fdc87224c46d87477d31af67636a157ae637a9", 0xc2}], 0x1, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4}}}], 0xd8, 0x80}}, {{&(0x7f00000013c0)=@file={0x1}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001440)="9a376948d2500d662969fc4331d91160b3e96920bfe4f03e34932528a497353dc5ed117714e51436107f11785c17a7d5f651de43a3aa9b3a39e84a8f2c8c174dcd752aa689b618a29803ca44aacb87b4f992e4673b1afee2ccbf84dcb86bf5", 0x5f}, {&(0x7f00000014c0)="1c18319f4f9cc259883ad017c99438498aa9f2891f2c12f1629d77bef98e92dfc30e3858992d80ed4918fc7b104ad7fb923636b632aab5adcc8eb9c7ddd421a2954b2b6fcf460855c11e6c535d51b6ba39404ab00328cf4d08794bdbeb001f81219ffecfde566d52169ea5301bf36affce98f4e6d50d5b594e085f53796bc29005c05f7cc3ad2fab7f810357", 0x8c}, {&(0x7f0000001580)="e1974c3d6a94e807a1d7b5c441754fd41cdf0fbed98614f6755bff6d65820710ee234fac42dfef0f63ef867718aa85cefdaf1eea1b9c81302c123339a2b36c603e4dd130b79540cfcccdaf9426f4b367b9ee55e58c042a0234a5aa5edc1c92fba9240632ca2642252c71004e258b67be61ea25c468b1e9712c09ec05fdd19495cbad6dd8b1ab998f01fb3a9bf2ab3e5eb10909de47c2d34f7c895813d49aaa9b79db3157630c25c1ccaa11f4145c09bc0a1a80d4970fc7c343f6f196d0e9bb84e21f184165d9d9a066956a25ff1dbea5d5cae3443c1874e3f1deb0f065e12f7184f6", 0xe2}, {&(0x7f0000001680)="65c17966f387c3db206d7138b04c475f4817c9a6f7dfa9e2669a748a144a56e5872c2827a41af47011c4ad1ee33feda7605998", 0x33}, {&(0x7f00000016c0)="8728f0ea4baeca1bc7e80d436e91a503dd454e631993d124718b5e983f3171271948ca19e639bf9649580edfeba8a4ed0529dbd68c29229f7c6543e4d12c4c6cc64bd693f98051097d2ad7c92a4cd8d40e203bb6c964f1f7573f3150ac2270a2da5f853f512882aa0ab5a7e57c9654ae833a3b9782a742c252ede8bb18a0795752", 0x81}, {&(0x7f0000001780)="8f3df4acb37981fcbc9a0bb5e42b22681fc51f65e87006a5288b1154dd7cc9559ba071559bd37adb874820af5c8cbb2a47a1fa50b891029c3229a16582ef9456082f7ebc6d64682b65458e556ee9f4740f35932fa3ad60e5afc27ef003d425f868036fe702790afec59635b1a686b6873d0ad540b9252c9081ea46106e52c1c77fe75e2df0f0cf30a6a174755d72290f6c6c4dc8eba53e7a95842f4b34f938b963e8", 0xa2}, {&(0x7f0000001840)="4799b9f18e3ad07a93b48c", 0xb}, {&(0x7f0000001940)="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", 0xfa}], 0x8, 0x0, 0x0, 0x4000080}}, {{&(0x7f0000001a40)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001ac0)="557a40dc9b6362076a6ae647b02a693a9e26e5587af557f8", 0x18}, {&(0x7f0000001b00)="5fe4892a8b89f541e07611252a98cf6e7124c3c230849eca8efd9790c4d486217fb67ccfb82c0e33c5f86ff5d8beccffe4d552165953daefb1ad870f041181cfd10936538acdb88782033b2391605e5e4e423c66beffa835af3931d0eb643239815d3eb860e8c4a3f838b861c1ea1f42321784b67f20d0bc2ffcbdecd6862bf452b3a381cd4c72b3550e4f4e5b9956fcadc4aeb1efceb4798274d71f17f8edc815626ce4583dba89db65addba7", 0xad}, {&(0x7f0000001bc0)="f6977dd75ba4e219971b063808d234caf7b0dac04fcfb2b1d027935c0f5d37167a5f790fc74b4dcead61fc36ee2f5224f9", 0x31}, {&(0x7f0000001c00)="6a69696b33eb00f076312abb19ac3ff470d91cf9", 0x14}, {&(0x7f0000001c40)="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", 0x1000}], 0x5, &(0x7f0000002dc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r4}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x88, 0x48000}}, {{&(0x7f0000002e80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003280)=[{&(0x7f0000002f00)="86491fca54a8333c117483aa8a25ea6ace040bf5939f56910cc03efcda75d13bf563b736492a3b8007c960ea61b662da54a45f2173390f85fe93544b172f4c32f3048dabc7bca833da491cdfa89a349854754b8de624bc41fe104331aa7c583c73856ab8d40f41d6123c66b51565b2ade7359aad556367d83ea345f063f7b7f75442d13a8fbce277ca5b71b44ab1b17dbb346458afce193cee2c321df6ea93fd9c29b04d0c482a0ba37a2a322318c6d9f947c0470feeca6f8eaa95241bcb4e1dc53aef843dd4c18dec", 0xc9}, {&(0x7f0000003000)="c20991070d85db68ff0def13c794974b95f57ec0c625fa1256716e0859ad6327d2b69adc0ca2e8e290bb6685ab40c604ed46d4a9967877f791f7834704c6168c48b4b0941ab5dde0e8d9730026ac4d23a8e35753c140b50e023b7832a96354debffd65fdd589b26158c3218230b0e87e33b525dbf66e6840a548591e39c9563a377902688f6720f605c4c5a803c5918cda5510b846f29b2eee4dc4ba228f54f967069c48376aa982a1c3b2bf42fff0b631fc99c639043f68687d6c1ea6b1380482ca86b089835bc280135665a1ea5d973ed7b774", 0xd4}, {&(0x7f0000003100)="acbdc8aa4c485ba1332ee8d36ea2c9e58149fe95152c0bf0", 0x18}, {&(0x7f0000003140)="3f17bf21fd996c7cd0bc63c6c9b9d0ef8934f4f3b1fb5f0e68507098b08389", 0x1f}, {&(0x7f0000003180)="47c88376ba63c088ab0efa0c7b9d5967655d68b4004d1b2801fc4f2b256e546684729917a11b05b81cbdd7294a47bc945fac2a29a04602dbe2785b0d1b1dcc50bb178f688154fee858c4d0aeb64a99228970925668ff314e022387d3b9cca3b09ea3f0dc2ae8cb2b95e921b0b62c74085b7d8290bc5b6e43b47badde5bce4289b1ae31759e3801d71d86701bb2c4c0debd52e82fcd44ded17b608c2e6f394291abeea1f3addd44ba88a3e9516c93d6ed6a9926b3a177036bb1fafd4f33cefc79b5", 0xc1}], 0x5, &(0x7f0000003500)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, 0xee01}}}], 0x60, 0x4000001}}, {{&(0x7f0000003580)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000003a40)=[{&(0x7f0000003600)="a6d87c8e40072268dd70f805f440a552393ee68ad68d939babc4bf91303ee39d2bb22dab07e35b6d72776f4e6bcc434fa8e0090424757184dc7137a614f04492e012c743f63ce9275632d1cb63d577d0edcb2f850a9ea40eccfe14db259a868e5872fd5903db4225d25bdaf8a5b8925d7bf5f92dc5d18c324eb547bf97d23857c6a6b7fd8c8f40a4188249d48d05a65422b0c9daa2946bcba2cce04004fb60bd4a07d4", 0xa3}, {&(0x7f00000036c0)="b3678c4de24bf086df13e8681357be9bcdf935fd83044533cc682a08627b05e4c9de1698ed05422459c99ef9c039024e016e06a4c0491d48348c6a0282f193356fd4a99ca23f8973a5448c93927e288913022a2bbba7ff7902f036973a7bac4409451840da72c47b241c6119c2cde9205e0f84053368ffbca36dbd5d79f412061b3963d1874708ee44f9289d029fe886a45601845d7c05f9805534a46ae2cadb11d3f3f303dc97567f1090246f27a24ca586120d95e745b7c3874a1c759c5500516d698549d678b3ce568603827d1ef22a415638f829ddb5a06aaa60", 0xdc}, {&(0x7f00000037c0)="1735b931334d9ef8e3b18634860c00111fb505430166b014c3055e369002aa1bfdf125729975defc69f49e831fa86f10691d8797ccb162316ef6604a4f29cb61f603cd70a92de43dac13e0b5f5a7e00d994cd67912a54029ff710ff077573fb099ff84747e7d67affb7a4edb5081aa00bd30b9b006e07e12c653a4cbaf2f274eaaf40593815cc319cfd1bab2794ba21fbf0737120effd671d1c3240b720488a6367185c607", 0xa5}, {&(0x7f0000003880)="b891d6875df2ba17249834b3c6aea0303e21cee267c4c9b27f1b592fd75f267ee79d8c295fbefd5dff7a72db67c216fa05f925e80db3af2fc5b483f70a138a28ea0afcc531a64c29e99cfd3129167a145c50fa08b3ae8960795f9cb8c68764f62005484bb46431b0179b112b68da628e3c759298fcc9023dfb470b3815cdca858b93f32966150c49c00bbe2487749a7982f84d108079ab4a538ef0e271c4571ac3cb7155437cee9ced285183b869c4b77604d9866df3336f4e3e6458c2e63246d05394c0b952fad31c64a2", 0xcb}, {&(0x7f0000003980)="82630fb9c556b0b4fe86b325bc079251d005f2da3b0dde07edc31ba32a031786a2f7e538fcc314f45087e89e1dcfff1442fbca9b611dcbac06d7a7a4772a87519fa2ff45fcd90a4e86ef86f942d056053814d582ae6274e5ec52c5824684eb7f5f9f80d7d42364db6b41674592b3b6d987911e225b3fabda9dd08dd438892a731247cb58c75a3e26b9524522ffcfb9711f69595578970a53970f05d0612116438d5d767639edb6972f0dc2ea8f052e4572b80d4d06b708236b4ee2825919ce", 0xbf}], 0x5, &(0x7f0000003dc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r1, r0, 0xffffffffffffffff, r6]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r3, r5, 0xffffffffffffffff, 0xffffffffffffffff, r0, r6, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x118, 0x4000}}, {{0x0, 0x0, &(0x7f0000004080)=[{&(0x7f0000003f00)="f9d06fd0b350d63af2a282ba73a635cae04a101d109a17414104c1a86df8fae9fd419649604fac0f702a1219b6c3f9b8de1b580eb7f36a27a200eee822e1c5d6183e845717df73cee48cb16037d3b763595e818d46a9caf3b23c469d77f4bfe74d4ed4e3e14e723c2a410a02492f43d46b12b7a1cfc1fde945e970404c2269594973826577651371f7b6d92cde0f3d1d5b19576644b4fbee19933246df667986b8626bb06416dcf839c2ddb0a7d0070b2a8691dd16ed525b9fc6cc", 0xbb}, {&(0x7f0000003fc0)="7af49fca5b34516a5e64c37dbe101a372a1dab18a85a042e98a6cb68d0fbc52124d3d6259ba4f25556222d4f2e8f822cf76c513ea752172a76395f424711d78caa8a135fbdcb91c64cd344b0eb9e43057bc1991f91ada034e33787d3a177ff2ce7bb906db16a9f2d29e17e1dccff0e2da2941fe7bea035c3c026a887c7e08c7c60484d4df8bdab9fb350d8c04acb335d5777c2d3cae4b7b798a12098ab", 0x9d}], 0x2, &(0x7f00000064c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, r4}}}, @cred={{0x1c, 0x1, 0x2, {r8, r4, r9}}}], 0x128, 0x200000c5}}], 0x8, 0x40800) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000001900)={{}, {0x1, 0x4}, [{}, {0x2, 0x5}], {}, [{}], {0x10, 0x4}, {0x20, 0x5}}, 0x3c, 0x0) 13:16:54 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 50) [ 1349.725652] FAULT_INJECTION: forcing a failure. [ 1349.725652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1349.727299] CPU: 0 PID: 13030 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1349.728357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1349.729381] Call Trace: [ 1349.729755] [ 1349.730072] dump_stack_lvl+0x8f/0xb7 [ 1349.730627] should_fail_ex.cold+0x5/0xa [ 1349.731212] _copy_to_user+0x2e/0x150 [ 1349.731744] simple_read_from_buffer+0xd0/0x170 [ 1349.732415] proc_fail_nth_read+0x19c/0x230 [ 1349.733010] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1349.733687] ? security_file_permission+0xb5/0xe0 [ 1349.734373] vfs_read+0x257/0x940 [ 1349.734879] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1349.735540] ? __pfx_vfs_read+0x10/0x10 [ 1349.736116] ? __fget_files+0x270/0x450 [ 1349.736700] ksys_read+0x12b/0x260 [ 1349.737199] ? __pfx_ksys_read+0x10/0x10 [ 1349.737765] ? syscall_enter_from_user_mode+0x21/0x50 [ 1349.738451] ? syscall_enter_from_user_mode+0x21/0x50 [ 1349.739182] do_syscall_64+0x3f/0x90 [ 1349.739720] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1349.740415] RIP: 0033:0x7f1da7f2069c [ 1349.740923] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1349.743226] RSP: 002b:00007f1da54e3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1349.744239] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f1da7f2069c [ 1349.745196] RDX: 000000000000000f RSI: 00007f1da54e31e0 RDI: 0000000000000004 [ 1349.746165] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1349.747116] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1349.748039] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000 [ 1349.749029] 13:17:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x15f) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xa4) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 13:17:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x02', 0xffffffffffffffff) 13:17:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:17:11 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362", 0xc7, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:17:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,l', 0xffffffffffffffff) 13:17:11 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:17:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,e', 0xffffffffffffffff) 13:17:11 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x8001, 0x3}) 13:17:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:17:11 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000003d40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004ec0)=ANY=[@ANYBLOB='nfs=nostYle_ro,\x00']) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_WRITEV={0x2, 0x3, 0x4004, @fd_index, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="b37fe1ba63b4cd868d7e18f71429cf6a69ee3868932c0f3049b51765abbb8e0892b4d6e9fe85f8e603d49e7ecf05d14e49e4a9764fee5a5d50430ca1b15f0215b752c652a3b41901eb096bae2dcb5723961745ef5f055b8f7a017e3ef8cacd33c59d9afaef81882e69a095c639b4b3ffec04678520b340a550448105d61db059f07a21248fd6b066f3aa54c92c183453b7bcf59e44bbbc290fe8595ee64f83f3ce3ccf3979d35f", 0xa7}, {&(0x7f0000000140)="aef84baf6bb7bc4019b51dec68219888659e4db9790e47e4c90d628ab285b9bfb4185038b465ea2e1325bbb781e04279fb5b", 0x32}, {&(0x7f0000000180)="f61078f4dfd8a18c343a77a043a2d58a9daff7528379ae0426", 0x19}, {&(0x7f00000001c0)="99b3a71c5cfa48468cbe0e9273bcc2e3e6db667ec2a69cfefc6c2a", 0x1b}, {&(0x7f0000000200)="dfba20d4a7b0cae988bc661584e00f432ff64e805ecb2bac8a837e24628e112ff491d263eec820d903aa5782f7057db82f44bf1bfb52c2ff2a84abd640fd0fbe9eb542409ff7918bf65c1318b11a4cd0f05dbdc7f093e578d4c5354a4a442fcbfee887dec69e24a24a53d5db1cb2e1fd7bf1e3517c5610ff36f063457a1a91e006ea5b29adeb556dd63efd2e095e0da269882110fdcadadf86c4ab8a244add9eca926e1be201221b4a600b6544fea70b1b81c7b0e8934bbff40b4a5e068df0142c2713c531b3df19a8467e88a7190d41", 0xd0}], 0x5, 0x0, 0xa1817c9ad9627c3e, {0x2}}, 0x9) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) openat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x100) 13:17:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,h', 0xffffffffffffffff) 13:17:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,l', 0xffffffffffffffff) 13:17:29 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000100), &(0x7f0000000140)=ANY=[@ANYBLOB="00fb150323c7e18b5bddd800"/21], 0x15, 0x2) 13:17:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x03', 0xffffffffffffffff) 13:17:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:17:30 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c34", 0xd5, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:17:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:17:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2c, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x1}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x2b}, 0x0, @in6=@empty, 0x3507, 0x2}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffff}}, './file0\x00'}) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000100), 0x42100, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000001300)={0x0, 0x79e, 0x5}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x20010, r1, 0x0) sendto(r1, &(0x7f0000000300)="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", 0x1000, 0x20041000, &(0x7f0000000080)=@ethernet={0x306, @random="9bd94d503c0f"}, 0x80) 13:17:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,t', 0xffffffffffffffff) 13:17:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) clone3(&(0x7f0000001340)={0x80020080, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x30}, &(0x7f00000002c0)=""/44, 0x2c, &(0x7f0000000300)=""/4096, &(0x7f0000001300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0], 0x7, {r0}}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000013c0), 0x40a00, 0x0) syz_mount_image$vfat(&(0x7f0000001400), &(0x7f0000001440)='./file0\x00', 0xffffffff, 0x8, &(0x7f0000001ac0)=[{&(0x7f0000001480)="c368e68019fcf57574c7fda148e037df64a6d76da34c4ac59661c0c22356c834bae15dae1617528fd23a738a990f00babcaacb575cf3788f29392c074737fdf6c6fa4506035614bc0e39f97242a7ff4819cc67472b69a7738cad89364713fbd5bac0102af9b6296a06168a2ab256449de4b23cfaae4a3b627224942e6b3d6486330a67351b64a38afe1361fd9a1c49759082679a106966d1177f7113e36257071280555d611276110809b3c41b4eea305354883cee34b87e6b524c036c4db2616ce210cf8b2b8eb74837055f7e7229ae7827ed364f", 0xd5, 0x100}, {&(0x7f0000001580)="7b5fb535a15b369571ab7a9db46e759b", 0x10, 0x9}, {&(0x7f00000015c0)="ac4fbe36f7fb83ae1ed95d2dcc956ad8df33235d2b9c8a2d73df33ad1fd6e7f05c9bb81761ebf5323200c506867841aed5ebf5b2cf1e409a33c12d72f1f6f0623223350fd7ec7b17c109302ce3f1191fd74fca1438f52b6db157676ccdc6d033e853dacc71157cd74bf56f89ea860576aaaf0a190ab0591e8b03fc4b2e1f48f8e44f6a004ede4bd9ab638a1cd212aebbc52f686eaa5680d0a9f7d33d1df0cdd530c4a9a5b064ad910330db67dde3c5f4790fdeb9c97e4b8985c452fd385a47d44a3b71f383e79bd0e58175289cd7bd910ab8b00582f4a53599ad2e984a3a0a6b9e17367476a459ca6321", 0xea, 0x1}, {&(0x7f00000016c0)="354e2b5477538ff1199093258ea8bcc35a5e98b54947ddd3", 0x18, 0x5}, {&(0x7f0000001700)="60144b0ebb7ad22e1b61a15f7a44537f5958e0ba0341f8c3e529c4146f00317b05c9f7ec95450701c4be91d514ea54ea90459a71c3f6819257febc19eeb226fb85d70fba4896e4c852a5203e0459a53c1a14e2e87451db5b9e861bd0524de0cd295ec7a2ca125e5c0f2b5a1660572a51c070466cd9cdd4afe6c0bedea8dd35604b7421a574d9775ada652034e8296ea2335458a19ab29db8ce9fbece8323f424e9edd2e39e23a654904b4aa8cf240f2e9bec9b8b42ffc65e855a7e120e6254fefdb442877dad9af11482652865978508cc6c2ad599b05fe39920e139ff80566e0f281649d5743e7514d8b1", 0xeb, 0x401}, {&(0x7f0000001800)="9c675bb5e6f92c11e983efbb33d563684c796595c8030c06ed194bb4a3df7f9e5abfe720e07ccd83704ad07f0e11a118bf62c06bed93a1ec01a55091d698ac1efe396f187d2473c7767021e95c3cc03726316b1cc151fbac10cb9dd34b440e07b6cb4402a2afd3ecd46f32846f3e710e84ff7f4e3bd1343ba6393e3d68e275298dc044915dd531e08fa106ff3db522168a1a6708711432afd5994067838083f991eff038640a920325014846f2fd689097c61f4f0f350b8c955457dd78c3b944f81afbf24a00d4342ed49ab9dda6", 0xce, 0xffff}, {&(0x7f0000001900)="ad32575b384d68b59066c88745559e9f373a14524b3735dbd42b198108db6d5eff29cd568733b9cec6ae830542a6f0408e50edacc6e898a2164ce8f1e07a38f7646b30583af7a4c8e74fe7494b173d2ca9deaaaa556c54e4029200f481cd0f1518be7ab56e96448517bc192d238cd754bf2870f868c725c3009651c861320db899551f2ce544bad475816d0f3fd573b6d70990b6fde89752ca8189f95f63430f4e3128ee8c", 0xa5, 0x3}, {&(0x7f00000019c0)="6478ffe5a33bd8b4430660ce0a6e95c1094fefaa46cbe38c9645d727e50c0badbf062e2d2062fb94c63f933bcc9076b843de8449965dca3e635ad4e6dde27221bdd62b065dd97521803b4065835657770a1da417348c58255b292412df730f4c041220604e8b67b7a6ad6f0e2969de2361aa75d38861a9b7869f8fd77687c9d150a79a3be1231ef13f74069c6de954d8968df0990fb35f1c48b28323e5151246763bf84b05c7c02f55ee392c4694e9d95ece7c65914064b277c297297db3f2e38ea1", 0xc2, 0x1}], 0xe0484, &(0x7f0000001b80)={[{@nonumtail}, {@shortname_win95}, {@shortname_mixed}, {@iocharset={'iocharset', 0x3d, 'cp865'}}, {@fat=@time_offset={'time_offset', 0x3d, 0x22b}}], [{@subj_type={'subj_type', 0x3d, '/dev/snapshot\x00'}}, {@dont_measure}]}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000001c0)={r2, 0x10000008000002, 0x40000000003, 0x75}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) capset(&(0x7f0000000140)={0x20071026, r3}, &(0x7f0000000180)={0x0, 0x3, 0x80000001, 0x9, 0x20, 0x80000000}) 13:17:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:17:30 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r2 = socket$unix(0x1, 0x5, 0x0) connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 13:17:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:17:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,z', 0xffffffffffffffff) 13:17:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,t', 0xffffffffffffffff) 13:17:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x04', 0xffffffffffffffff) 13:17:30 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/i8042', 0x410201, 0x146) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3f2, 0x1, 0x70bd27, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x90) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:17:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:17:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x3}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:17:30 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c34", 0xd5, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:17:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:17:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3010000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:17:46 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) ioctl$sock_netdev_private(r5, 0x89f0, &(0x7f00000017c0)="33a9a38919044b4ea4821e4925af8f6a949d97e720f4c061d86d2e180688ac16c7e57743decf2e2ac49cad466ebabb184809dd3360bc2b98a5e813743ca486bed2bf70c4d4acca31380f28a02f715327638ede1a6bf95477ac3ee33242a8fbe543d24e5ed446") setsockopt$inet_tcp_int(r4, 0x6, 0x1, &(0x7f0000000140), 0x4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000180)) getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000100)={@local, @empty}, &(0x7f0000000140)=0xc) socket$packet(0x11, 0x3, 0x300) accept$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000200)=0x10) 13:17:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x05', 0xffffffffffffffff) 13:17:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,z', 0xffffffffffffffff) 13:17:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:17:46 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c34", 0xd5, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:17:46 executing program 5: capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:17:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7, 0x80, 0x80, 0x3, 0x0, 0x0, 0xf1406, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x9, 0x100}, 0x10108, 0x0, 0x2, 0x9, 0xffff, 0x1ff, 0x401, 0x0, 0xc2, 0x0, 0x10000}, r2, 0xb, 0xffffffffffffffff, 0x2) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r4 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x8000) ftruncate(0xffffffffffffffff, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000001c0)={r4, 0x9, 0xa5, 0x4}) syncfs(r3) 13:17:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x5}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:17:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:17:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:17:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xbe', 0xffffffffffffffff) 13:18:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:18:02 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:02 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0/file0\x00', 0xffdffffffffffff8, 0x0, &(0x7f0000000200), 0x6004000, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_setup(0x3ff, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', 0x100, 0x60) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) r4 = pidfd_open(0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r5, 0x0, 0x220) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r6, 0x0, 0x220) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r3, r1, r4, r0, r5, r6, r2], 0x8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x80, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r1, 0x0, 0xfffffdef) 13:18:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x06', 0xffffffffffffffff) 13:18:02 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e5101", 0xdc, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:18:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:02 executing program 5: syz_usb_connect$hid(0x1, 0x3f, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x458, 0x5015, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x7f, 0x40, 0x40, [{{0x9, 0x4, 0x0, 0xff, 0x2, 0x3, 0x1, 0x1, 0x2, {0x9, 0x21, 0x8, 0x8, 0x1, {0x22, 0x2f9}}, {{{0x9, 0x5, 0x81, 0x3, 0x250, 0x54, 0x9, 0xfd}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x1f, 0xff, 0x8}}]}}}]}}]}}, &(0x7f0000000440)={0xa, &(0x7f00000001c0)={0xa, 0x6, 0x110, 0x5, 0xfc, 0x7f, 0x40, 0xab}, 0x4d, &(0x7f0000000200)={0x5, 0xf, 0x4d, 0x5, [@wireless={0xb, 0x10, 0x1, 0xc, 0xb2, 0x40, 0x2, 0x8}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x7, 0x3, 0xda, 0x6}, @ss_container_id={0x14, 0x10, 0x4, 0x8, "81263d311cebc00e27a57c89acde2148"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "72c679e66824b41f29715e63a737146e"}, @wireless={0xb, 0x10, 0x1, 0x4, 0xc2, 0xff, 0x6, 0xfff, 0x2}]}, 0x4, [{0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x418}}, {0xeb, &(0x7f00000002c0)=@string={0xeb, 0x3, "a6ab5ad4c9c8b8697ce0b7ca334b740e5a73e3d0df6cd605ccafd7c13acbf4a4542833fcced952029ee16cdd28a3b87fa16de900ef3e642fc58b982cad55ce61ff96b2bff9dd5733d0010a756354073d68adb4d5cdf18fc427332e0b6258f865774bb41ca3fcebfc7b0de80eaa1f72241a74e6122821ec2059776805ce5a30498a2bfeb7986785a0883b0dff5f14d8dad922694d8601422d2908cbd5fe297d61b555e9c4132614175070277d4643d17d94015250d62a7e6904e412db1d2b9b7753e24c6cd25d90515d500c1d0705053e7ce9d6ba8a796dd1e4da49db431391f9ce432cb53a5bf42339"}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x83e}}, {0x4, &(0x7f0000000400)=@lang_id={0x4, 0x3, 0x300a}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) capget(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x9a0, 0x1002, 0x7, 0x8e3, 0x1, 0x7}) [ 1418.437642] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1418.445322] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:18:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4a010000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:18:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xa}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:03 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e5101", 0xdc, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:18:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xf}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6e000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:18:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\a', 0xffffffffffffffff) [ 1418.967681] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1418.969166] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:18:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,3', 0xffffffffffffffff) 13:18:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\b', 0xffffffffffffffff) 13:18:03 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x2000, 0x0) sendfile(r0, r1, &(0x7f0000000140)=0x8, 0x8000) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x82) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000040)={0x3, 0x8000}) 13:18:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x48}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x803e0000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:18:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:03 executing program 4: pipe2(&(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x81}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x5}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') syz_open_dev$tty20(0xc, 0x4, 0x0) 13:18:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:21 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e5101", 0xdc, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:18:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\n', 0xffffffffffffffff) 13:18:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:18:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:18:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000340), &(0x7f0000000380)='./file1\x00', 0x8, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18400110}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x44, r4, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x20044806) 13:18:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xd9', 0xffffffffffffffff) 13:18:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x7f, 0x5, 0x8, 0x18, 0x0, 0x101, 0x20040, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7c0, 0x1, @perf_bp={&(0x7f0000000100), 0x5}, 0x8, 0x2, 0x800, 0x1, 0x6, 0x8, 0x1, 0x0, 0xffffff0f, 0x0, 0x7fff}, 0x0, 0x5, 0xffffffffffffffff, 0x1) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:18:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc03e0000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1437.739289] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1437.873303] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 13:18:36 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x65}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:36 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255", 0xe0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:18:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x15f) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file1', [{0x20, '#! \xa1\xd3\xd2\x9b\x8a\x8f6J\xca\\~\x18\xa8\x98$\xe0`\x89\x8c\xfa\'\x89[i\x98\\\xe74\x14\xb3\x1b\x9f\xa0\xe0a\'\xd2\xbe\xda({\x02\x18\xae|\xec\xb2\'X\x882\xea\xfd\x8a\xc6\x8aP\x84\x93\f\xb3\xd49f\x01g\xa1F\xda\xf1t\x8d\x0e\x89{1\x1f\x87\xdb\xe6\xd8\xf24[\x02H\x8d\x11\x87\xef\xd9\xa1,\xbb\xe9+\x83~r\x9dHY!Tn\x119\x159 \xa0\xd5b;\xf1\x03\x1aifLa\xcd\xb4\x87\xeal\x00\x84m\x91\x8b72p\xe21+\"2\x8f\xae\x82v\xac\xc08A\x9b6'}]}, 0xa4) close(r0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000000)={0xbc61, 0x8}) execveat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0, 0x1000) 13:18:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x0f', 0xffffffffffffffff) 13:18:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) ioctl$KDDELIO(r0, 0x4b35, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:18:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x06', 0xffffffffffffffff) 13:18:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xe03f0300}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:18:36 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/dev\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) 13:18:36 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x68}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000980), &(0x7f00000009c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002e40), 0x0, &(0x7f0000002f40)) 13:18:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x20, r2, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="8c010000", @ANYRES16=r2, @ANYBLOB="00082cbd7000fcdbdf256b0000000a00060008021100000100000a001a0008021100000000000a00060008021100000100000a001a0008021100000000000a001a00ffffffffffff00000a001a0008021100000100000a000600ffffffffffff00000a00060008021100000000000a001a0008021100000000000a0006000802110000000000"], 0x8c}, 0x1, 0x0, 0x0, 0x48000}, 0x880) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x4, 0x64}}}}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040000) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x60171a62}, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x3, 0x6}) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={r3, 0x7, 0x0, 0x9e}) 13:18:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:36 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x101800) ioctl$HIDIOCGRDESCSIZE(0xffffffffffffffff, 0x80044801, &(0x7f0000000240)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_BT_POWER(r3, 0x112, 0xd, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000140)=0x8, 0x4) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x20, 0x2, 0x9, 0xe6, 0x0, 0x9d5, 0x10, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, @perf_bp={&(0x7f0000000180), 0x4}, 0x401, 0x3, 0xffffff81, 0xb, 0x9, 0x8, 0x0, 0x0, 0x8, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000001c0)={{r0}, 0x6, 0x4}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x87ffffc) io_uring_enter(0xffffffffffffffff, 0x30c9, 0x204d090, 0x2, 0x0, 0x0) syncfs(0xffffffffffffffff) [ 1452.148291] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1452.181361] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 13:18:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:18:52 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255", 0xe0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:18:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,H', 0xffffffffffffffff) 13:18:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:18:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x93', 0xffffffffffffffff) 13:18:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) r0 = syz_io_uring_setup(0x0, &(0x7f0000000200)={0x0, 0xdd89, 0x2, 0x2, 0x392}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000400)) clone3(&(0x7f0000000440)={0x80202800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000500), {0x3f}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000004c80)=""/102400, &(0x7f0000000100)}, 0x58) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_aout(r0, &(0x7f0000000540)={{0x10b, 0x80, 0x1, 0x380, 0x27d, 0x1, 0x1cd, 0x39f6}, "d130c4f232a886e5b28ff1391a08808fd9c6a11b9c78e297d6f7c54d76d6100aad7208761f15ff0fb7bc57bd16f6ecac769e767384ab42fb1c98d63d08a6956c0da279ebd6709e8216a497887fa1436970d012b741f0393c025e3f7e1a93df09c57039fdb6ac7304a1708b5d8fab64f24cb1e055bc93effb7074455c3fd237d1593dc6e2f3d0754412cb", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5aa) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:18:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:18:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x74}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:18:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,L', 0xffffffffffffffff) 13:18:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:18:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7a}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,e', 0xffffffffffffffff) 13:19:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9, 0x5, 0xc1, 0xff, 0x0, 0x1, 0x400, 0xb, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x37d972ea, 0x200}, 0x10110, 0x9, 0x0, 0x1, 0xa39, 0xc54, 0xe5, 0x0, 0x2, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x1) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r3, 0x0, 0x0, 0x87ffffc) r4 = fcntl$getown(r3, 0x9) perf_event_open(0x0, r4, 0x0, r2, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x8c, 0x7, 0x20, 0x20, 0x0, 0x2, 0x208a9, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000100), 0x6}, 0x1000, 0x6, 0x1000, 0x1, 0x6, 0x6, 0x8, 0x0, 0x8000, 0x0, 0x6}, r4, 0xf, r0, 0x9) 13:19:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:19:09 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255", 0xe0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:19:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[\x00 ', 0xffffffffffffffff) 13:19:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xfa, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000180)) socket$packet(0x11, 0x3, 0x300) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r6, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x5c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c0d5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0)={0x0}, &(0x7f0000002700)=0xc) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r8, 0x0, 0x220) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r9, 0x0, 0x220) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003ec0)={&(0x7f0000000400)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f0000003e00)=[{&(0x7f0000003f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08001300", @ANYRES32, @ANYBLOB="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"], 0x460}, {&(0x7f00000043c0)=ANY=[@ANYBLOB="94150000400000082dbd7000fbdbdf250400330021121d8008001500", @ANYRES32, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="ccfee73c36e1c2d49e928e27e0d49c82ed67d477d23cca4eeb7ad6fe660412c1d89b66b8113cc9430c40ec8b7575615873871f0aac0b6cc49e80824f0e57fb0b9c8d043eaf3eeabff7634c727efdb6c234f47d7576f4c46cc84ea2f5586fb089032d745ac1ce8939d486df8b3b4c706576f8e9fe9cc5bd65b09783f9bf972b935c3bf92a7f1aca1f664b877a3836d0fc865b750262ffda2c73bfc3e5d0289ab70eeb3bc448ee34d5e90afde379e9c082085d172678be819cafec9dcae90c0a2a7845ef3edfabe7d746d32ab04e9727f473825dccd2296bc12b5594b0c47e5f6001d9c81cc16583f107cc1fd1ecb6c926fe2523511c88cfa29d956449c3e2187bae64108db6481dfa518293981a93cdc805e70569b5d67fb43554a77108688d43293d8a1f4af2b9dd7c5055ae3dffcd6ad30192a8a1b98ec9d5f8a9a1937582b62230c3903ca6719b67c6c80814ede8a458441f18d1b9c0cff939299b95f28ffecbabf3d37241d9a005cf9321397e2084933be2b6db238c2aae548003836b35a2979d32f72cc541855f3a6b9e8626dc294f158580c95ad82698b49c522f814f410184b460dd78e6e925eb342b29b62cc650149ec35db1368b01ed6197d2e7b4830a5ae42af410f55650ae6f13640534c40bc1fefaa59ae219dcc22c38414e58b41c0c2ceed02cbc65a02425a5293e04b0c1844ea8982ca170d212f5c1f39bc57383cba25fe3bad2c745a265907f6a1a2aecbaf753e7acd49c2f7c9ae7686288a090d0b75245358be47ee1c68ed5ec2980bd3ac14fbe2a17e43933ffe0ce3b640ffe8d80bba0ae199e2de07536759c01c38ceae387ee66b27ce5a71e8dd512d425da3906f4b66448e8b0ced6ab88fdc607d0077541bfed18d7060ae254f9d5e5d995cf0426c31c10189f23b5d8760b8a404fa309f796ad489093b735773a132a1bd88dff45782da74aa4966b5f8723ffc4b8f54821282c1adc42959cbd2f572b87881f9ed897e390c1c64d5ec60dcad0b220d0174adb8c94ef15e7da02709fff5e44268b1d60f1215d52139229be9cc45a171ce7586190efa135c9beddb4147ac9f9afb92391a22a84eabcd378ca51b3ebec414d3e0fcf589cb151ad8f09c55958dd3183d6fecf841b6f5a2de97e9057fb23ee9d8a7cb0f6b73a13928a0d344d2a5a855682b5411c1fb05904ec979861623422de9d446f51b734912a39198e17b0279c779acf0b6104ff78403821a3dbd90cdfa3bbcb36197d3d5740de131640f0445b26bf3479ca94275bb92054c63fb8da2778a5df51e5e51048c4484ef9c2ad711234469e0748af565cc0496423b78360f7a5d1fe39fda084ce3200511621ca70abc8bb6201cc20abd6b6d53c4fdbbfc26ad57afb240e3e154750e231436d684f52c844101c11f429818661294dc84f74c9a654783817ba11ee65c1aa0ddec5dfcb7cc4d14879158c6af5e794e1dbcadd977316d5c72e2b724b53a55f7ed4be45d06c414f0425a94b206512953e8a6519db2c2870e1e961dd9c926e38d64573084fdc6db7381697db5fb8bbc912e50eafa82defae57b2ee31a61af7875c0ce42ed781c158163796599922aaa333b8046a1eef5f46a3a79181995fa99ba9436caac432e8f1561a975f04e515cb3c97fe2a06aae5ea4b5d04c8273c885bb8d63e455be31854f8f012c5867f3ae450bc4e98549a23ac50842e5774ea965c384991bd66eb5c364621ad6f5a79bafd181df2d1e5ed88a97ad9d32b8e2bb0aa2129708fc69098960c3cad62ca20c7edbc84bd0c594a5ef158ada5ab5ef8c1755469a0dc740e1f821f83bc507c4eece5a9d296ba28eda4f1ec24bcab2928243fbf6863e97c700afa6688f578d11261703031f48e5d1a48cee3f33b912623d6b1959cce8ba4f98d1a923e3b746fc5500bfc315c90efa73efea7da4b60993d6dd043dbdfbe69ccbf92d9db9daa051fe4483a47f9267b169191b0b2e8e807282b6ffd8b9535eef5ee2fcabe17ebae82de39f3a4675a474eae99e70d55aaf28ff34a1967f18481885f27066b0e5ecc13d321bc1b0b6024f82788a6af24a4f0bf98c8fb00e4eb0fef692e0d5583a698ad0b39371256716022b6934fc45e04af398dd13e09624df8a42101730f012ee4ae7f77ead90398076c70ea7cf14df627136fc1af6af5d0409fe8653a0703026ca85ce52cd7c99882460c587fc0088b827da0030773424183e44fa6bd0cd09262ff64741a7f2acebff66b2f08a59d3dc9b343a4de98804756a12a64e0d71dbc17874c237ae4119832f971c5324c4f2ada316f5de9c110270cb4788677bc67b65681d14eab0eb9763180a286c0044ee9fdaa7e631df88dc993bd6595b759fe094d19be69fa62a571621766cf182b9bb37d1dbab57e67adb637b506e6af7fe9b463ad58053028179ab27137b6d9f49cb478c49b302da149e2e2e6503dbf3c09bec69a63cb81ff6b03da6f350dd69fd61c064149b57da3bc1aa348130daee72363eac505ca683d3468f8de8e6d5e78d7286b6c09384d291f5f7c20c168db8fb7d37561f7c07efe024a6a634c39ea685f78ec0205952ebe943084df7c537a2d2f63053d7bb821fa45272e0b8dca7f91375ebd125ee10e33aa859e8b0ef15f588c786cb607685d91a100299ba5da91b492821285837bb5d9fca08c1bc185a6517c9049ee9dcc78c71719307f7c3914b1a565ab346890de7bc091b70ff835e73c7a080eb67d1ffb5e1aaf941187eae4db8b4889f2eb242d23cb5306c8ee4a6aef31f80e53a00b78cd28b7e6daf79c5e75b3adc0fbe082f2d07d9ce00fe6806671031092779ea1d45d0dd57726c8c5f8737701f0a82411e7f20a605717355af9c99e00ccee8a849fe57a3c59e4fe046951e1fb1b039215f2dd0f1e325ac2b5f1580595d86cd6a43c3e8dc65458894457a3a867180033a7930e2af3c063e91239d4925a8e6d0ff826f83c3ca7842ff4523b72cc17d932df9c930fbac284483ecc500c00da80c01c0c3d89945fa223155dcf420969b9ad2e7bcd52516a1e6be5797a1acc8a1588f02412be297756b343cbb3aafc515279204a18cb1e8d72c1001d645763717cc7ca8f42f0db10e1ddb72b526b83aeacf346d33f03f9481559dd8c0f406b20a7af02ab7947463718602044dbb563455d7e7b3de82b1278f7020351d7fc2b6a28b13604c31f29ab9986180009f7c414e1609c4c53c02ace05f05c825e092e5befb2722aa55c04c3fc8898716099b72c67a108a15a9af9a3079b35ba6f38917b04b8f5c34ae23f4749f47427280f048975214f68d76ebb689e3a6b2aa8e167a421befa41f6d9acf32c67c4816ee169f9648a16396fadb9e0639fd33d664820b33b3c1ca4a25e78f8f6ec401c5bbd6b79b2a92b891676d6bd7e019f351f381e98218d2290738dd04f6d68d649c6b30435ea8e74f229a7ede70c8638224806252980b57f5ec5d1ec18d39aef0baa2ed7f5a9db84dc39c78e661ed33d0fb8cad839b51451d7743f2c94edefea921f9253f1a42264dca819d461f89e0772c06cfe52e32af64254025c91f53017b5f73ca860d2b88fb1c555d638a3cf6d557b12067a92015cfa6702553c55f0d5380ea793204613df96f6f862cdb146f387a359a70bcd731ad6ca1180d39ba3f9ab6e1df98c5b87aac641e7c34e2eca5be62a39a2562817f5ad76ade6e2306333dfa1a9d210c932a5ec4b5731c32986608e206fad5783e929fbb4ac079ede6809241f62642345502efab3c090d2baacde9921f096d74f56e56a17dcca2e47c35843de86501ecbc82131ba674d333980a2aadb20427244e2b46c2f664e721701d87394141efe5b5f52126e8093706112664018ab0958b5c5e8c265ce26308a34310d52c13491e6e4901e29c5aa4b00d36965aceb1d69799447769bd1912a153c69ba1dbcbd51cc04740e0d7390cf52f54e7b0c5aad24279c48d2a1a065b8165bfac0c1fec0b26ed8d49bfe604a6a95337ce57979c83acf49be59dd3c307b2dd28bce3c069e058948b00301dc8978d59ff5d0a79a87213d918b6ee56a935dd546cb64deef4e83b7c463486da07cecd28de692e8cf04c1c33b5d4a48501a2d4cc2f8c027d79c15f88b8b8395ad500e391322795cb0dd68dc3b1479dcf308dac72fd306a8017a0bf99fbfbcd9d2446869b3ed0124462a72ddc50a180b675b7a9afe02108b4519a7fc5a1c241ae846b211eb3e3fbcb5c8593b7804f470e778895da22ec2fd8325bb01e04ffe393c8ca5312a6a50457059561f097404abf91518b4d61d2f18b12107f7ee87701e88b99eb04d5eb2c142e63e064b633adffa8b63694200f8aae34f5700ac7881993006848b536bb38b993776c7bfb049db2bf5385980c59b77cc6b6c5d34256773b19d291935444b3b3b59822f7f8b05055e6e7fa9ec54ec0c50fa59d9cd4351c3bba3362c429c4676e46ae08513bfca4bc3dcd1dca8c5f4397bf04bd4a2d15443ab1dcc743f499b19cfe26989136155951680ebb132bf9096563c38ef86025561a04236a52215fd3f4a57a223ee4c3569c0b575cc9c928eaaf656f3a582b2566f3c2a8501fa8c2280399c9d902655d0d12187251a1a105da120d90ea96a72b8b500b932353b3b50b2945b7412e74a66da036ad3688a6d49d6968f251f403b2f6cf92d4e985680f94f5b2465eaac5bb6d76cfad19f89c1f3c7df40429e585dd1ba726bed75d08219a4b33c051de86ede50c06090b9bc61bd74bf2b1e5a57ded90f8676f50bc2e572879535e501a4abc03804dcb36683f06108f88c2587a48d9978952dc174f7686047ba7421f5219fe5f12974b99227025d443796d8b85aafbe2b952d7205598d3e6e01b5c09493fcaf9074264b9e000e86a2b8d56bb2391663321e8f568aa703662a1d777aca7bf5e7c0f4fd177d7087f3ec8dce0f678637bad6e5ac8702b22e7a5eafb81a2f02cdfaa68a6a7747f9bbb4fa1c4e95281caaeb7e222fc0383c936d0e7e88b549bde34fabbddb81610842e4512c9f5414d1a324391f6cd387568b928f01086ceb29594697c774c74d9a670c3e690221bf06d1759f1d1f0cbcddc97da98f387cbaa24cceb832fbc98fa492809dc96e3de56ce7a71adc6692ba240da62ece164a28cf5c8ad3259f2acc28f2fe23a89d2dd38915c949f1a38d00c435b1a4ef369371eade6d9404f8960375f01244971275ce6da33915f8aeff0dfdda8df67cad5d9868a38be920ce87f3caf5050bd96e13f5bafa6f602e9e3f80e34b49c2fb3b05eb3d3e1bc1a09e3843de930fb6247650470eccb9a3632b295a19b6fed8566d53232751827db3b78930c7a668f64ffb8cbc005711a6c456dfb69195d584dd85d8a88a713f02fe0ee1f2f7cd29c34ab7783c4b1345efeef380a37706822ea9cfc24360070de4ee94397019e43689e6f5adee9d80c882c24d75c2d9bde745da06934715d7a39626423927cc3b6a9e829de2e62d5a02ce72653105caf44514f93e812530d2c2ab84b0cf1c286de43cbdf3358b63ffc883007337814c214159480d88d92f3fec3644c24216c2b8fc91e531d4eccfbc98dffff16e67868e94c6809c2f5e3c4bf4f9768967bc6ebb4e4d219a08b57742b3125f15d94ad83c7c9b40be6fb7a07a33743de104c3704554424e21c2a979d7b6b1ee61122fac3fdaca2b466b72e6f3bde2171cbd515c77fa356e2f26add2e57c18aa25bce3bd061469ac108f20b9b0e785cd0ff5dfc517378d59493711beeea45e91559988f55ef7473ac481f33133d339ec0671f02a6bf310fdb837497a1bddf3917696eb9f9443e6410024b0bc982753ed39946f7d8db804946f2faff10155c5c5e77b76bb3949e92737e7a0ca7c06bfaaf3c73947ae4672b44e5252c8550be118583725a8bafce54529de5ee4a99690f7c8c1d2e8585faa5c69cd8eaba4df0a55517f20e03f618cca61ec77389d75cbdbc88012f9062c5d35be829b45e466d06008448cc915e91c636cc3d7110115d8b18ae1023cd76025386d92f8cc69c42417cae2c9f822e94379e292ad88e66bbaa98564871fbe8471dca114d9161f09b590172abb2bea6e76e200000008000300815d9a5cc0b8", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x1594}, {&(0x7f00000025c0)={0xe8, 0x15, 0x100, 0x70bd25, 0x25dfdbfc, "", [@typed={0xc, 0x65, 0x0, 0x0, @u64=0x6}, @nested={0xca, 0x78, 0x0, 0x1, [@generic="51712eb20928fca5949d726fd317d5be74e5f7d450db40f4de268e7bd8714c1706", @generic="227bdc591f086206bcb60fbdc2b5c3bedf9d9d98dbb936e81f6de74604ee892252314dbd0e7000f59a7246add92a86d9d5e4fea609a88d9fe432464b71f20f1b499b73e7c91622c6dfc959dd7006144d7736a675464a46bf2e432ad0636c31199187891dfd5eaf80d9b370ece409f630a897bce2544edff2295d6bc70ef651d8c398f443b7a78bdbbea4e948d8f75e76a07c3fd9e184b45cc03598e2fc3490a6712c141624"]}]}, 0xe8}, {&(0x7f0000002740)={0x244, 0x27, 0x8, 0x70bd25, 0x25dfdbfb, "", [@generic="4792d6afbd4e5f9590041cd1d79a807dbcf00274b27ddfcff157bfb0c53f4a5580900f3f636190f22a6bc375b552c08c3fab5827338d1c595ae439d1a50ee5986cc305e9cc45193cc087ad744a478a7c1bbd5c898f954c76aa0ea01f51fb95c3e6d9accc575db5fe00a60b0e8f7b1a8286fb39215309bbbe6bced53e30517a3ca0d744b1fa618deb6cad7f1fe895f7c36ec9b9b04bc517eb1e4f6b2ddf2406f270a594b7eb4b5e0cae0fa218f09b", @typed={0x8, 0x37, 0x0, 0x0, @pid=r7}, @generic="96bb09a06b8b69288855efecebc0c8e1b9abb539637e69034f1fd4a6cfaae0319d883737e52bca7b8816a99ad21ac57ced1b7f112f0166d5db5ce234efa83aa10693c9ceaff6269b012a882d15d2cd2d609211fadf90e6851300a076dc0744625b003b59c53a42e13bc665a2773d4d5d913689b5d3f979c78a9973ee048dd9e538cb", @generic="3bdf29626ee444f04231b868d0d16bd3ebc94f591b26372d91c32622e28effe4f295390be5374ada7e6186b2a495437d7d6392f041fae031f6a4e5fbb34af564b909c3c653a67957561ddc6a458cb5e126a44c0780317e7d6e2b63b484f908a116ff92ee3974931dda3d7daccabc7fa30e8b0d167a8b0e1c7916ca24390bfaec0efcb45144be9fa916d9eaf67d841fc2326b328266c5f6003937ff872ff1007f23acac2d208241d7e83c68bbbb8595e666047eeb74fbb29003c35d38d070cdf1212bc441a26bd886c86bd2", @typed={0xa, 0x55, 0x0, 0x0, @str='wlan1\x00'}, @nested={0x22, 0x18, 0x0, 0x1, [@typed={0x8, 0x76, 0x0, 0x0, @uid=0xee00}, @typed={0x14, 0xb, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @generic="3ea2"]}]}, 0x244}, {&(0x7f00000029c0)={0x1440, 0x38, 0x400, 0x70bd27, 0x25dfdbfc, "", [@nested={0x121e, 0x95, 0x0, 0x1, [@generic="12fd40dfec1b9a739ea1308a5990459d705a9df1f2000028b12167c5ddbb0e12baa10dc324195a9cacc378c7e540eb7b8f3c7d52d6ca0e1e280d9311b3ad622635d436f30f4a2b3d8938542889709a0aa4c456a3fda40758292ea14b207541c650221dd69a1fdfa42a9f1cd3b4392c23474916ca5e9e868137d030cf0b9bf37629565f8a2edfe5722c2411ee3c6668d54b028d9feab6fcc3b43d1f7436ee40556d2cf52273d714183fa03af19bcc7fe7b516f9ada80bd2abd32f46ecaed102", @generic="908488da69badd594fafbe5165a4cfa7d57ee2822a2b461bb8f9225966cf6b02595a67cb3229f37e46adc0faa22e0ccd9352d36779070578b11f3e6cb4fb99a08a3ad33b037197c989468a9eb0eda44bc95636b7567a9c011014cf49d27755d82a6e5dc6ecc9780a3c8efc0a4dd239dd839bc2080befd6b7a8b012c0be4c0141e01295534871b1184f8ef2e5a3060c308880e973033401508bfaa2e0c7b7e70e09e359decbaca431afd3ca9de46d2905a717df3b35df3618d89166d2136aa0f313d24901ac118e4d4abcdd27150a414e8f6b841aede1267e69cf8ee57c42bf418011beace868f536a3e56a36277854f55be622f3fbc1c56dc0bd3373b5bc4f70d17f438f72d62abfa3419e3ed4c53b5b80005279fc947e1efcba88451ad17665f120ee3d0ddff6ca65bb79afe5d919d83ccdf01607834510744382c77e1a9f833fb8f9b4bf2037478caf06561377709e1735a1274282636453ec02f4cc502f595f9b8a3c6271080ef655a8d187753e9e451611a034570f85545929e6b4be64505725da872c48da90529e27c0fbcda0b25f481d8d24876183b4e9b106a4b6034c10749c83e6a1d631dae48ae87d37118400fce459077ccd0cf68c8ed8b09f0e37c9cb3039d7e1a2afe0bed1514ea3a61e45ea9d5820d41f225ffe6a404e4ade78419fb5af5877197ba6f24028f0200716e57db6c60512979782c35bacfd789b72cbf60602982560e24075f75f96fc05653b2f1dc911a9a75b8eafdc92b5fe1c9ae5afdf37ec28b98f0d3921f01a65d30304dbd7eb00c21c153f9ba9ba0453060efbb0a4052e47248002101002ae33309931e8c3cb60924f7d333b800834362700239f0f0ae120dcb213123d67989bf704d7411db467a88dc00719ae0fa0f37798f8ade244ca27d656331554cb15c18bf7a32b8d548f31c18baf900bdbbb946d2aec328320ffbb50ebc93e8861f34901cda3472cf3fd83a3e645a92e5d5fd3103cf35dc3d02380860a9bf397dcaae97c92d38bd43c29ae984b5ff27e8f9d50e58631db3de6cad2ed6eb151e40e465a7b67f82a12b8e459c7a57648d307e0d82f10f93e5c8173aa43466a4c614019277e4289ab313be1ce3d3973a6480ac937f019388531c9db9ff7f2186cd7f29cf74cac066ac9cd1913a6225f9b1f9d32d9a75415c388bf53f6f9c0fbaad2d032594862f51da39fc6f3b4e43d3583c5bffea40118747735a28a51f3bed27954ce6f91a80175190c9f603fd96d9c5758380e00e925c57e2b935d73f27b81c994e9baccb465e9c3eac80f384a9ab6dcd2e6b544cbb09de04c74c6794e3bb6e61e532c33855f8e59c6a36220a4d7cc3354b222a260682d838e640691993bee7ab6d29d71555205fef7273306db63c4d94c9a0f3ad4b8ae130084043eebe987b37a5d3e0244cf4e69626d2c56a157625788c44aa78cdb95aef95aba8ba18a0030503ff25c2f0ddd9863fe41b63ad3f92511df285f470dbae5091d847e1df744f896ae70563603d6dd519efac256f082ac253d7b6f8e4bbc192144328e4d159fc40fbe39f08cd1cc8a8dd1ea8d7b845656cf49cdcb1458fb203bc527d5f45a34951ac2c463df31363e88de4ae6e0a29b652f52ea0a7657e0ad053458f04c128f8c71bd0c1205c4fcb17fedb073b38e253ccee7efc8c7650aeef231ec903a5baab88a05164e76b3736940dfc443ac89bbbf1b547b2c56256f983be6801534b61534ccefaa267aa285e2ea37f1c699b3eafd1ba94a356a023449c81efe8939f0b890ee0d2607deff4502a3324690ee7cf4636f0fca68ee76526f681dbd1720e0dfc44ad2c6174ad30888ac7dfea1d14bb85e90234f2e508dd0adbbe4844b522d6ad5cffb5cbb32d3e2f60fb7b6cfde1076d496e693f6871141bca8248b6873a8d490f380b8e268b95e75fd7b0bd70496e9a7a5e8ed4ae9cb2d4dfe371531f8c7e59670f7c70f55bf8a37020a0260489ba33f5f52b2de9c6562ff1a28d63cfe4c798d01269f9610e021adc618db7b50e7322cbf4b656027c94cbc0475e6716e5d60f56e272f52bde509aab4e5e5d0cd70df6f7789aa1867eb2aa90ccb31b7027f03108d8ae6232dcc3e7b389c255983d00d6d6ddbf0934c3f21b17648abe4421b7c7fe6d576ff9b53c61e11d8574923efcc8a76a352f1b77cdf91766aab94cba56313b69b4250c87cd01912ca3e61efec1334766d752680785697ecb20e98ddbfc66e302d95a481558bc8d5efea5faf1606b770df353073e0e6e27b13f6a2b965c3f031d4e9d8c5d57aa329d47a2cc0d6005d553d2845befd6857cfb806ad6105c739e698451d58c764914c3fee4f05f1edf67699560e1d0fa4945486891f578d9339edcfa8e9e17242b49d14eb2c2c80f99fcb7d952ee1ccfa42f1f9a62891f0ac41ebf93bf232f354da8eef0362f5c4b4303e3cf243abb905456fdbbbd92b0206fa323cec8a4a9d29b38856b1115a9de4326278955d7b0e7a44b0918c726c125d7f2b79edf65748f1a09e26bb5e7267574a67d69e3d64a641b84ffd6891a4cea8578f8df2c9a42be520703aae581e86647e6831c8987538150cff93e073180421e0232094efc9065a41cfde79a84bc8bde1187b63ffa7b69f54e7d379235067a6f5c496e61430b8e28a15c1a3e51eadc832fffc3dd84f1844e2c1e7ec9a0da09a4b2f1b557218c78514d5ce59d7f81a63575d35c795aa29742075d08b407d70c7bdf2d25489e1ff06b44c0b56672fcd61292081c62ffa232febd8297d5ed50111ec208460fde73f41f8befdd1abbf7a97512ad94424bd5f415212a320fb29da5b2428054c480335f0074f723b0475ce42654ce51a89efac9d43dc5e92b05ed42be659020ea53e9cbb405c8c0ddc599e3f1cca90da15c0a405f516859829bbd35dc67296285c226d50f69e35ce3602833d20e03aa559b4cfd4f1eca1f2b0d72196f2094e55f565b3b34ea825ed634426728ebb14b3e02feab7d08a7ac2bcc3c747a3b78e7aff536dd4b12d3e1c9d131cf11d9817889e90104a59f4c0566f8a81c07ecd414c05551f3157adff49db8720d410b8a541d5ea6f5e71c7e3663696be889485f3da48eb36f14a0f60303b578327379c2803c869c8e281c742ad0fccf3be92fd09598c0575c659c052553d35d55f662a48c91ffa4f9711b0c4aa33b086b47ee96ff69ceb22f18d9200f326ed17d1d1be7e146957a8ca458ed891939208083035f4cefcfc31603a58c78bbf305774f664ee30f07238dfad3a03b49ecd06e02a1606820c09147f93e519e78dee6f039c0265dad31527b2c0d25a0ffa39097e705ccdc4eff6de835d479eb34d4dbc54f96a9eacd104dff864df34975976a1a59e08a80a0b29208a55f745d835241a12ae7a56cbdea5952524af96d0c16bbb7481aa8ae02dc97531bb94a21874f5ee0029b095dac13d6b2b31eb8e7361e0a800f8314c940bdb44b12d50408bb1ff53a0a10fe9f282fe8b8ad81e888480a2fe79ecce833c34814c52f7436b27cbbd9425bd8e3ae2a8a44a588741aced62ddcf218f817fbae1e680646ce00a9ca34d13de12b4b104a0c56042675e1d417196b4d4c3a41307f6695d5c1650e440c161f33128b1fb24c91f2b1d3864d52660c14243947ac4ec1730b4319dab0bae741965570a035a2a406c4a679137061511674a942ca24fadde09052f02320e5e84c87b6eca557757b39c93215fbbda4e112279a2adfb7844ea6ec02054f0ec11f1f8b5be702ee2bdcab02e16a1da8f6f930881e18445a3b2ed4cf68bc4597eccd245a9db54bc50e495fd9d671d5d8752f0968ce00977068b3f75f1b9d457d8f1b7885336bc0ce42cc3f592143ba712fd4f7946f7582f8ae945efd33db8163b25979d941b11045621cd44cba647b89adbb24d7e13f3fedb4037c8d6a206878a887583b2e0d934c355a55145f22b5046413261d6a864058ef9f0d6b7ab51c78f5898f5bdeb70eba7db71be4cdf2459fdf40cb51f862f320b872a3ee585dd8bba135b3620a86edc44e3e667c8c6e262563e5ffbcee34179faf716625dd8f9922a2c0328381c52aab6b90486d34abddbc4a2f18cd0aba4bf237353e5fcce7a2646997f68966f069b2b69b7234d6e5a58a58bdff7d9e0d476b1efc6df2fc1fbbbc11c5e030c1ee4e92076c715feb75e1e697806dbc31937228040da7380fbafbb10d4a0acea854aa723d78f1f6d569909ef3168582ef13f6417f056e380e80b818048216a8cf572aefb698edb15f8ec4ee6fc90521116c59ce484ea4375863ae9d10fd0a04da7c489d99c7da2f4078d94faec691e84aa1125c8ce31e90272426cdcf840860277b84df710f87b618fc9d94b0ffb966eaabaf327db5cbe1144229081c9b2a1dbdc156a14b42c75976dc689791df12b57af2aee9726ca66cc34a6ecfef98c73d9e097f27e9bbd77a4c43617d39bc2b8fcfcc065b2ac2262e3ea9ba21b8603e4bef95d9fe4ed937f0235324f4ca75ac1ac2aeacb8743996b54eb19660719a4444fe4e32fa1f15b1146c0f801d1d284a99738c03396ff80cc4400e96d7ded41814a8d6eaf7933dc6e95dfb6890a22f7194e9781c3ec0e45503fc246851be02a1d179e202122e2a084f921c29bf01350a34b103b1560e8b58567d9526b1ab942392d65d21580798188aa93e4c13cc2a55d81571fca1518126f5bc85f6586b274bc5540b6f6528bc3c3fe3d1a55692b71877e5aa642363d00ccb819a505ffe3ad90b180ae1015f420286459fcbc6b331730b5cedbf0aa4b7c02179df55012efa1a30b31e3ed433c770f58f885ed2d315a621b3ee525ec6e727423f68cc6706c9080a46de76841236b6e4107449997273b236bee2c68270e2b7804dfc1ec63a8de7b691a072eae6eab6132364e6fa566157327915ede26b854b9ea3f53232ed4fbbcc5e9e376ec9b85541702dcae0f6e7a122dee4d9222cc18d93c0f05fd23898a8d885533ad2ca33193be991bec11fad803fdeb15d110e9c1d046f5dc84b74f165dc12ffa5c8c27feb43cc5f8bbe420950553658753565bed01835a4ef495dc6e90e2cbff43a1a53880c5f4d14e97ee0aa3ae94a5cee7a96f44ac0abf9a9d8b95fd7cf008a1abc51815c4a5678c018f35bea7771c9394003796af9e42cecb3cd465d87958b48d28ed710aa532ef3d7b0d254d1d56acbc74267a819b6462e56eb85cdad38cdd36e4e9d303edcfd8d66b02fe2a5e610e449ee27db36398c56349c916008058401c5484c3e6ca693b0a54d3352a94089e5478d57796d9234d6831daef53be83dc79e330f97d215726bff18cf7b9854f95230efd693fb3a5f7341353390b8a8e317fb54b1b0f6f5f52a57e4a37b87320bbf1c60f867fd7002206b63e27e8e11bb7c36cfa07913ff7ad573bf8ae958162905b0cf443b5263275a925a2e093c114008632c982e13ae458168cf5bd28648feb51e7f577420c7aec2fc20c2141ceb5c7b0872e68656fa5b0aeee2ee10eb806698a604b7fef1610824544c96324798d9d0d1688e229935f7f90719955bdf7446dcda0984939690bb9a1b23763660414a937803825b79cf0ce8d57f537b78116c21b36b0a2eda9f2cfbb83fcb47ed86e760364c646d6af2003f97a7a7ee5db71038c99579b61db1b7b2aabf7df660e814cdacc872e701cc6517ec394f52d39e46f4aeb5853ef0ae7c79250723064a0ee91b98f7d3e71834c3d1f7036be2737f2b640ab2e4ffbd05cc2fa83fab451c0a2cf299c2841bccd47a5891b2965b946bf42701725e547e463258252f8be9879f84e2ce0610c", @generic="41e42337cfcee15437cd9f0b0691e73707e2a11a7e125b11bc8e827ab3115df88be607c6090d57a0c6b17158745e42f35dffc44bf0100814929189158845e7d2f4a3db4a1cc8accde3f8fa170c3c7888f55bfe017b21bc3ae51205205d3e0bb7a3a7ac55e6f70cd2fb52a6c4e52f77368d5a23557228c023c188344c75475535f45ff141a32b9b6c03763bfa75e4197eeb3fcde052f83e90fe2b7a0a614193cb58f638d045fdbdbb3dc1014609c9d47eacbf37206ec9b9161b5434bf5b41bfe2bd33954f9d8ec5af322f9b0c30a20949b087e886", @generic="780f0ac46e141a640b6616cdb924485a5ef747ff14be1be01aafd6630a7c243c223925a011a3069e0a22170e4ab144e70e1b5d294aa0bfec880955375c43595d13d4ed18ba1b75f039dd862dd8d3f2331702829e08f98a1180fe42252faeeb290f6333ab79e9b455f04b98f873e17173996f9f85cccaaf785d7b1a46bbddde", @typed={0x8, 0x18, 0x0, 0x0, @str='.&-\x00'}]}, @typed={0x58, 0x42, 0x0, 0x0, @binary="d527e47b8805632a2e29ad22d4b43b8c58d77b382854661db938791aff1d240844980e5dd9229d4a3cac5e9ec3c444cb4c4c6d0b2e9b37491167f2bdfa26fea5baa30b03b56ed8efdf7c325105d7ac04338e9d40"}, @nested={0x1b8, 0x1d, 0x0, 0x1, [@generic="6c12af8305a96160d0f035e035110ead2033caa739c3cf2d85dae23199736b5938b609ac6d247df400aded669d72893fae513279c8abdb67bb240c29a7798bf5847b4c1353801b68b5ebd2b3346080e22a939402409faae0c5c6d1b6091a6b8be8f4aa6b7f7b", @generic="cd177b729e91b70b5a6ac1c5500092125b83b9419f51158abf33147af221c80ee07e28b3409dd0ce85f16c360e47bb8ec16244deee2bbddcee547485f4dbf66e6c483226a9c778156c3ec1ba37375cf9235e4c7b5682451c12ea9c3173310b5a9c903af30d5e5543598522bf64bf21024f83eff419601492431c0dba9981df5675dc47fd2f5827969812a105669e7a1e013a27ed8f82d27669e201b2ee916ac6fc5fae4c0f0b545faba3aeae7fb4c3a163bb8ed76ee253aadeee08683a0ad8f7", @generic="f1d094d922f2cd2400a2e3d935c08fab9933c126ce740164a864b70c09c46dbcb09000c23404f35c1e18ef30831af638c90219a52a85f18b4a40b469fba5e1818d6c25e8af2516e3911f8cfb975fd83a9381e842fbf369851fef9aa152ffe38d0e78fc956fe7d2070193ad3c3efe195bafe01970c2029cf4efd51741469f416187041edaa805feb8a7316dc5aac3"]}]}, 0x1440}], 0x5, &(0x7f0000003e80)=ANY=[@ANYBLOB="70002a0100"/16, @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r5, @ANYRES32=r8, @ANYRES32, @ANYRES32=r9], 0x30, 0x4000}, 0x40000) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(r6, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r10, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x81, 0x1f}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x20}, @NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x40}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0xff}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1044}, 0x2000000) 13:19:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:19:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,h', 0xffffffffffffffff) 13:19:09 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b9", 0xe2, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:19:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x02', 0xffffffffffffffff) 13:19:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:19:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x3f, 0x3) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:19:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,l', 0xffffffffffffffff) 13:19:23 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b9", 0xe2, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:19:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x40, 0x7, 0xa5, 0x7f, 0x0, 0x5, 0x80642, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0x7fff, 0x1}, 0x40aa0, 0x100, 0x7, 0x5, 0x10001, 0x3, 0x5, 0x0, 0x4, 0x0, 0xfc}, r2, 0xf, r3, 0xa) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x10000001}) 13:19:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:19:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x03', 0xffffffffffffffff) 13:19:23 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x6004000, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_setup(0x3ff, &(0x7f0000000140)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', 0x100, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee00}}, './file0\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r5, 0x0, 0x220) r6 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000001500)=@abs, 0x10, &(0x7f0000000240)=[{&(0x7f0000002900)=""/4096, 0x1000}, {&(0x7f0000002500)=""/95, 0x5f}, {&(0x7f0000001580)=""/151, 0x97}, {&(0x7f00000001c0)=""/46, 0x2e}], 0x4, &(0x7f0000002640)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000002800000000000000010000000100000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xa0}, 0x12150) r8 = ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000027c0)={r1, 0x9, 0x9, 0x100000000}) r10 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002840), 0x400000, 0x0) io_submit(0x0, 0x4, &(0x7f00000028c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x1f, r4, &(0x7f0000000380)="fa50e5e58dcb990d1556b6d7818fb37e4c83d36e47ac08c6e2fc68559c91710519bcc78c4267ce274c50a54ad9a07555daccd4b13d288c685f2e3ef7b99b4b45b19605ab8217ece918b63fd87822b28c67bc239a55df4637711e0b2b3436e42f4d80945cb7f0775ca445615572a4a7f3e26822b7e078d085829c75fafc53c1176aa42ae7c1d0e29348fcb29bb79d1bc96a0c56191405e0fde114807a974fdd1f296056fe00a759f3552615f1972d5817018197e9f1d58490536a9b23bb401240c5", 0xc1, 0x4, 0x0, 0x2, r5}, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x2, 0x2, r6, &(0x7f0000000480)="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", 0x1000, 0x400, 0x0, 0x2, r7}, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x3, 0x8000, r8, &(0x7f0000002740)="71ec7f6921e8d858c8f6af43d7922c6a6f6fbf0f591e400fb6ffdc9453f7", 0x1e, 0x93, 0x0, 0x3}, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x8, 0x0, r9, &(0x7f0000002800)="2b4d1b749c90b305c75855a95c68dff4ec68f0500beb9aff15a36ffb378c57af101771c4ac0c501feb2cc8931e8920a0c6f90a1213", 0x35, 0x6, 0x0, 0x3, r10}]) r11 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r11, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r11, r1, 0x0, 0xfffffdef) 13:19:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:19:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x04', 0xffffffffffffffff) 13:19:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:24 executing program 5: r0 = socket$inet(0x2, 0x1, 0xffffff60) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000100)={0x7, {{0x2, 0x4e20, @empty}}, {{0x2, 0x4e22, @remote}}}, 0x108) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) sendfile(r1, r2, &(0x7f0000000240)=0x4, 0x7ff) write$binfmt_aout(r1, 0x0, 0x220) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0400000000000029652f7b30d2fa1219a049361b646c94d13bec08ac9fe79a1ea5916e4f3abee862127ca8af1d879d8f19e3a8d72e58034a6779c8d0ee3cf6e396dc6e049cef93edf7e7b06e6596742bb2a9ba04da57702f49cf32d422358e3bcb2275eeecd4279f003dad8fbe174d524e7e7e9943dd62af8d0ff2dcfe347df942c45f2b4c9a565fc22eba65ac0e2f5afa344aebf521201182c5c4a03bbc172c8bbc93801e98f4f6009f6cef5a731612d61d641d4a7580b2e58cf201d4e7f41d8b6b27a99f8ecf0697b0a960532f66d9ddaa00c7c6d0cc788950f700"/243]) setsockopt$inet_int(r3, 0x0, 0x13, &(0x7f0000000280)=0x101, 0x4) 13:19:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,t', 0xffffffffffffffff) 13:19:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x05', 0xffffffffffffffff) 13:19:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:19:24 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b9", 0xe2, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:19:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 13:19:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,z', 0xffffffffffffffff) 13:19:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:19:40 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:19:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:19:40 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={r1, 0x9c, 0x6b, 0x89c6}) 13:19:40 executing program 4: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x0, r1, 0x8) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x0, 0xff, 0x5, 0x2, 0x0, 0x0, 0x40, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x57fa, 0x4, @perf_config_ext={0x7, 0x5}, 0x11000, 0x1, 0x9, 0x3, 0x10000, 0xfffffff7, 0x5, 0x0, 0x0, 0x0, 0x4}, r3, 0xffffffffffffffff, r0, 0x0) gettid() r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000058da913047140000000100000000000000c521c7223a9da998cd4379197ece863630f9fcd0c9698f38295e907b72061f0007006273effec13edf64bded7bbf3e4dec3d0747bae0a845542cbe63a0b8563744a3c2e894e032ada40413a52aa38856d4f89f1ba61277a250933c6236ef7b9c2adc9e58dfedf7fb4292658bc5bcf483b81e071bd23c12d27f4a85a4db46f08a018be3bcbf120a0400000000000000c51c9814ed42732fe927b74b6e2b9adaeac2e4fa00026f60efdc2af69fe5ee4b21b58303000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000000000002e2f66692ca9bd2b"]) socket$inet_udp(0x2, 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r5, 0x0, 0x220) sendfile(r0, r5, &(0x7f0000000000)=0x1, 0x200) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') readv(r6, &(0x7f0000001740)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/75, 0x4b}, {&(0x7f00000016c0)=""/109, 0x6d}], 0x3) ioctl$BTRFS_IOC_SYNC(r5, 0x9408, 0x0) 13:19:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x04', 0xffffffffffffffff) 13:19:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x06', 0xffffffffffffffff) 13:19:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x301000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:19:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\a', 0xffffffffffffffff) 13:19:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x10002}) 13:20:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x03', 0xffffffffffffffff) 13:20:00 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:20:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\b', 0xffffffffffffffff) 13:20:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x10, 0x3, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77b8f249, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lseek(r1, 0x0, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f0000000200), 0x0, 0x8040000) r3 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440), &(0x7f0000000480)={0x0, 0xfb, 0x90, 0x4, 0x9, "e3f6b710311d9e50c047bf942dec4d91", "49c8536cc083318ed72f9df7180b0405a193ef57f7f460a0b769f6319575940563363b7da330fa7a9b77c1609c66324cbb0fd68f706c93df43b378d42657d77ed35dd9deb466d72fec54b05a1cabbd1ab9ca4b0334996ef5a940adc9745addfe41200a93d939f64ee271a56950a90247b75fc4a08d3e170767709b"}, 0x90, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400020, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7690}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r0, 0x0, 0xfffffdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) accept4$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e, 0x800) write$binfmt_aout(r4, 0x0, 0x220) openat(r2, &(0x7f0000000000)='./file0\x00', 0x311800, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000000000000000000000000000000000000000000000000009e44fb4f322ab274e9706ffe9f1d76330e27a8081092b79eebddb043237cd0ff7f00000000000054fdcbc875a4b7322d5784e4920b27f131d46dbba3acafdfbc56e448b005c4caa717afbde74c7f34bd14b6cd300640f3eb131c539242df738c7bd0a6a2e16daea5968a17e647a979e19842364731db0c0e5d6d7eb16c5e3f74dff9b5e370be980022467bdfee80f2e7317b8765d2b587f5afddb662579b98cfafa62dfbdd45ccf1f48fe5531194af99bf723222f4edf732db1ffd317c3c6448e50dc08cd560ded3d936aa5fcc7a84cbc36e398301c08ffae019c8d65f6a"]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r5, 0x2) setsockopt$packet_int(r3, 0x107, 0xb, &(0x7f0000000240)=0x6, 0x4) 13:20:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:00 executing program 4: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10001, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)="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", 0xfff, 0xc0}, 0x3) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3, r1}}, 0x40) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x20768bbd9b188b67) epoll_create(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$cgroup_ro(r2, &(0x7f0000000180)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x7, 0x6, 0x5c, 0x0, 0x81, 0x400, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x80, 0x2}, 0x2000, 0x1, 0x4, 0xa, 0x6, 0x101, 0x5, 0x0, 0x6, 0x0, 0x7ff}, r4, 0xe, r3, 0x1) 13:20:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x11', 0xffffffffffffffff) 13:20:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\n', 0xffffffffffffffff) 13:20:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\t', 0xffffffffffffffff) 13:20:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x0f', 0xffffffffffffffff) 13:20:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:00 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:20:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:00 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000001680)="880017000000001c001705f2d749a9e8be097f00080000000008d64cce78b6c14c95f796454d554aa1be5e4d4e2ef75c4c0695b55dcc7502ec7fe84f2ca355c031da6b9db153622ac36fe95ade925afb389a8c65c0962582c1b4551a441b79392f0357d728474b14774e846119f42b62b5", 0x71, 0xb800}], 0x0, &(0x7f0000011700)=ANY=[]) r1 = socket$unix(0x1, 0x2, 0x0) r2 = gettid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0xa}, [{0x2, 0x6}, {0x2, 0x1}, {}], {}, [{0x8, 0x2, r3}, {0x8, 0x4}, {0x8, 0x2, r3}, {0x8, 0x1, r3}, {0x8, 0x2, r3}, {0x8, 0x4}, {0x8, 0x0, r3}, {0x8, 0x5, r3}, {0x8, 0x7, r3}], {0x10, 0x7}, {0x20, 0x4}}, 0x84, 0x2) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0x14) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r5, 0x0, 0x220) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r6, 0x0, 0x220) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r8 = syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000300)='./file0\x00', 0x401, 0x3, &(0x7f0000000580)=[{&(0x7f0000000340)="d5ca25dc59c8ba9be4d4f3b27cb4c3e206b74d8e7fe008469e052ea395bee2b658fc75d36092c6d2ccccd0b147cfff6a1e55c956c267b504182666931aeab6f85d248e354a037245f5f56f5138c8cb55a7bb3fa0142507e1a8baae79e9316e99ca2b50444f0e66b50b8bb0d0903ddfafc8de6816dfd876b95c1d192911f322f4b7d5c88287e40a167d2c824864d81b483eb37b68ef7fb4a1929f151fac73e401777c9122b0bd1e9a1f19ed38da0218dad585a325ab4c0114729d2f339954176c84a7a10d8ce2a2ceadcabe83ffdc73a4800c382b267ac089b659202ec861fb305b73d0", 0xe3}, {&(0x7f0000000440)="2ff9ac79cf193ded557cb727f7f2ad34816ff9405e0ebcc4cc3f05d09dc8d5a1c90e2da4e017a9edbecb4cba174e9c1b491d20b39850f8d74d6f22f51aa461d0835922e47db48a52e6c15c1101fa2a04e34ee66750b6d54eb5833bb7c3dfe318f0681e0b8c92dbdf20d01e9c589cff71fb7f0f961bfb4bf7e2ca25b863aaf0a07186c96401b1e6255857a5362619d6b69e7a31ca3c6ea57d3ca5b4e817", 0x9d, 0x44a5}, {&(0x7f0000000500)="8c2d960596e55169bdea3a02bce1101c053c00dceb4465918017ac84a47d48b3c02201785f385eaefa53c81be491f5990e504e42db2f6e3d41e6035b185dca4d942171a9b97e2bd4be56f2555dacc4f77c35e91cdf842e64b3e3fda4df77590298d730fe65b76de39f90acbbb91a", 0x6e, 0x10000}], 0x2000, &(0x7f0000000600)={[{@dax}, {@data_journal}, {@mblk_io_submit}, {@grpid}, {@quota}, {@delalloc}, {@barrier}, {@minixdf}, {@bh}, {@journal_checksum}], [{@fsname={'fsname', 0x3d, '%'}}, {@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, 'iso9660\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@euid_lt={'euid<', 0xee00}}, {@dont_appraise}, {@smackfsdef={'smackfsdef', 0x3d, 'iso9660\x00'}}]}) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getuid() ioctl$AUTOFS_DEV_IOCTL_FAIL(r7, 0xc0189377, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x5, 0xffffffc1}}, './file0\x00'}) bind$unix(r12, &(0x7f0000000940)=@abs={0x0, 0x0, 0x4e24}, 0x6e) fsetxattr$system_posix_acl(r9, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r10}, {0x2, 0x1, r11}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) getresgid(&(0x7f0000000740), &(0x7f0000000780)=0x0, &(0x7f00000007c0)) sendmmsg$unix(r1, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="f4b73f7688a7f754af1a9e47dcb1229cc8e89f2b6cd4df3a6aa5f0a487e513c73170b1670ce5d74140d283fadd09c539cf8c544e265fadd3d17a4a5ce49623a0c6025a81418b6c81628dcfb4c3b30df479cda4158aefd744ead49911f0395d7e219dc6c3247aeb4bf0895aeb82921c6396f9d9620f454ef40e17dc1f0ee6fb7972c4d40c0689f9e43f1209c571c19a088b72e12b2be065f9f3b314d8ca6605d96043861b5f259c3267bc734755e9687079fe11de3ae79dd0921d85ef8d980193", 0xc0}], 0x1, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee00, r3}}}, @rights={{0x18, 0x1, 0x1, [r0, r4]}}, @rights={{0x34, 0x1, 0x1, [r5, r6, r0, r0, r0, r7, r8, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r11, r13}}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0xa8, 0x2004c050}}], 0x1, 0x40000) 13:20:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,H', 0xffffffffffffffff) 13:20:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x8f', 0xffffffffffffffff) 13:20:19 executing program 4: r0 = syz_mount_image$iso9660(0x0, 0x0, 0x8, 0x5, &(0x7f0000000380)=[{&(0x7f0000000000)="cdbdb7d974a652a65c5ea7c52c653b582b1ae393a513fed41c55f6cad6", 0x1d, 0x7ff}, {&(0x7f0000000040)="10d73c0d30cac96775be1353568531e5967487b4399e9ed0e22fc005f7aab3c526814807f048f4467702ff3f762d68f07036ccfea17239f34e1a1e2b33f5be493fdb25ce8ba089744d5378ec49740fcf8a71c0607760b94c9a32b171447036e4e913700d9b232196d092b46d0bcad5ec000a8a882a1a7b9cddb69b8a22bd8cffe424bbb2f800f92a6bdd0df7f35358c5260a560ee5441a9eda2f1ebeeb5af40a7d381a07aa58d570451a21156c6c68439b21455ae48add09c6544dec27def9bd0fd8db185de8884ac106ac7098305544a1eb99165022c7a534", 0xd9, 0x101}, {&(0x7f0000000140)="4b9640a0998efbc6cf2dd8cfcc73cc5788e6570c5c2c590b5519a48d1b076c872af14c9b65383369de96472dcaf8871931f4e2d503113f75b2c77d9e338732e00a0f977110dda71b7e657426922578f3268f67cb6d26ea9b32920c38bd73b3d70f801100ee151b03b09c76999ee50320180d48c094f44eaf54fe50f7b32e3e49992df3691060671827cf7cc4550e901c6eaf370ce965cf6c50135a421b6f368451d2956f93f6be7986fa650ebf0fc291841b7ede8070b1179dba619cf4a9136d11726052961a3e7d4c29db75a21677ebe526e711564db47a278be9ecaa1ffe52075b3a93bce0fa25d26c217675e8013c18e4e0549cf8d000f65868f1", 0xfc, 0xfd51}, {&(0x7f0000000240)="dba36984177aa9c19edf697ec83a8fdb6939d928b503908d77ab84c6094cfc17b9590f05b8940e7e209395b59f3ae45531da4f58963f265ea7983e600a84ba99933fab94280a357286931aa7891656fa75d9353fe9cce4cbd452ce549430a97e16b51525b14cbc47cf2c064ae7fac800af3f45dcd072afbc3f2e49d711270ab26203aa8381dc49a3c5fed2cc9239f28f281d1e7a30897c90d8235ff82b536067cfabc741c2328ca50283f344cf63e111dda4b9ef2457feeae76010bc0752cec32904e72e716b7f1ad3ce89d2199f314df0ef909911598b29e8f9804a09a827e068e83356bed9ab2a89da3276b52f9a9795aff429", 0xf4, 0x1}, {&(0x7f0000000340)="e5d97f07d6ddf7e9acc1b6aeb11c66626d", 0x11, 0x7fffffff}], 0x1a12c20, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000480)=0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0, {r1, 0xee00}}, './file1\x00'}) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x840008, &(0x7f0000000600)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache}, {@dfltuid={'dfltuid', 0x3d, r1}}, {@dfltgid}, {@fscache}, {@nodevmap}, {@nodevmap}, {@version_L}, {@access_uid={'access', 0x3d, 0xee00}}, {@cache_mmap}, {@cache_fscache}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, 'rootcontext'}}, {@hash}, {@subj_role={'subj_role', 0x3d, '#\'*{!#'}}, {@euid_eq={'euid', 0x3d, r3}}, {@fowner_lt={'fowner<', r3}}]}}) 13:20:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:19 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:20:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3e, 0x2, 0x3, 0x0, 0x40, 0x22200, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x192fa7f, 0x0, @perf_config_ext={0x2, 0x40}, 0x40010, 0xffffffff, 0x5, 0x3, 0xffff, 0x1, 0x20, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x10, r0, 0x9) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r3, 0x0, 0x0, 0x87ffffc) r4 = fcntl$getown(r3, 0x9) perf_event_open(0x0, r4, 0x0, r2, 0x8) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x40, 0x8, 0x6, 0x3, 0x0, 0x5, 0x8, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2984, 0x1, @perf_config_ext={0x7fff, 0x9}, 0x800, 0xfffffffffffffff7, 0x4, 0x3, 0x6, 0xf98, 0x3fd, 0x0, 0x7f1, 0x0, 0x100000001}, r4, 0xc, r0, 0x0) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)={0x14, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}]}, 0x14}], 0x1}, 0x0) 13:20:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x1a', 0xffffffffffffffff) 13:20:19 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,L', 0xffffffffffffffff) 13:20:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6e00000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() finit_module(r0, &(0x7f0000000000)='{}-\x00', 0x3) r2 = pidfd_open(r1, 0x0) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) 13:20:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xff', 0xffffffffffffffff) 13:20:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:19 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,e', 0xffffffffffffffff) 13:20:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,h', 0xffffffffffffffff) 13:20:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x7bb}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0x7}}, './file1\x00'}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, r4) llistxattr(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300)=""/72, 0x48) write(r4, &(0x7f0000000080)="01", 0x292e9) 13:20:34 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:20:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:34 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x121042, 0x21) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2001, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000300)=ANY=[@ANYBLOB="0c5b6bbf1ff2d5da79accdb8c4a9439602676b21", @ANYBLOB="81da2b483b7504668f9ae4c7038c9b18a1edfad1886a430fe33512374f37d9d8077618dc92f0b0f7f1bad8f522cc840d3723d1c7f864e877dfff3e19461a36bafce15b0a630854a03f00000000000000942b5b"]) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r6, 0x0, 0x0, 0x87ffffc) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="070106057a0300006c01000007000000710000000200000000000000000000009b9f624ea206caff7e00a5d2de34c8bb3995fe5de7983b9f93a12ddc52441ecba7afeaf3d8d48a00b788ca22072f2e3dce0c79360774039c2bee7cece42cb4a36d4f21c59cf618fc93f4766e4bd49d000826e857211b08d7586673543cbc806ebde1d62588968bc8a458e72d2a02901508270367ae65523ebc8c9f8efb9ae8a72c8034ec17200926d36b09512ee23cbcf6b53100416e23e3fdba"], 0xba) perf_event_open(0x0, 0x0, 0x0, r5, 0x8) syz_open_procfs(0x0, &(0x7f00000000c0)='net/rfcomm\x00') sendfile(r1, r1, 0x0, 0x100000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x87ffffc) r7 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(0x0, r7, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x4, 0x7, 0x81, 0x51, 0x0, 0x1f, 0x22e8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x5d, 0x3}, 0x1004, 0x1426cd2e, 0x4, 0x5, 0x5, 0x0, 0x101, 0x0, 0x8000, 0x0, 0x81}, r7, 0x2, r4, 0x0) 13:20:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xc0', 0xffffffffffffffff) 13:20:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,l', 0xffffffffffffffff) 13:20:34 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:20:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xff', 0xffffffffffffffff) 13:20:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,t', 0xffffffffffffffff) 13:20:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:50 executing program 4: pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2, 0x8001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp6\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000040)) r3 = openat2(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x0, 0x0) openat(r3, 0x0, 0x0, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x6, 0x2001b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000840), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) 13:20:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:50 executing program 5: openat$bsg(0xffffffffffffff9c, 0x0, 0x40001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = dup3(0xffffffffffffffff, r0, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0xa4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9b, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0/file0\x00', 0x200) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:20:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:50 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xa) 13:20:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:50 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xa) 13:20:50 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x7}, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000380)='./file0\x00', 0x0, 0x2, &(0x7f00000003c0)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x200000000010000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2}) r2 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fcntl$addseals(r2, 0x409, 0x7) r3 = syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='\x00', 0x2, 0x6, &(0x7f00000008c0)=[{&(0x7f00000001c0)="807ddd3590433307927acca7c153227caecc8529f3d04e8e3161b8ae9f36a298c32cd6f4f256d235bc60b72cff626e9d67117ff54b7f925728bf92d100609d05fbeb8b92119550ea772f55e80a56179e", 0x50, 0x5}, {&(0x7f0000000300)="e5cd747f4a242ecb77", 0x9, 0x524ce334}, {&(0x7f0000000680)="686bc376bdab9e74ccc4a3e998185f6b90164200295f7788d6769e000e4cc5b1240d47ee1952abeb0ea4bda6e50e769f8d85d41a220aa2a6d15f3265703980734672c1b63e730b88900f3df2e7ca9b08973339edb879a1f68f2220606df85a0a9f3c6683b9535201a715c5a9c33556fd30dc5aa2dfbe5f37a3ee89b043eab19717", 0x81, 0xcb3}, {&(0x7f00000017c0)="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", 0x1000, 0x9}, {&(0x7f0000000740)="48a899dc843b83321b3ea859a8795c1b3725f00a63322383917cf71c2e226a3240e575d94b3652151f1a1e7104e6c94d241b1153e7696175f2437b1cfaa6979c64592c8b150b9ebd745f556a30c70dc920583a2b9160ce24028e0dbf4ceda6e96f3e663f297def2ceb9b862c45c2ba25dc95c2467068b70896e6ba2c500042016dfa7c33722fdb09e47976cd2428405a5a32c904444a2ea267a84d5221cef82397cad58f4ce692c420676352b6bf5f3ff2dbcb81246afe183d5a70e137e4a6b5ce130b291a1f6fb01d490c6f3ba2b068f722cc2116363d94fa6901504474ba96244273f95d4489bbd4d10a25d49c", 0xee, 0x3}, {&(0x7f0000000840)="0cace9597eb3da23895f51e08f79e45a1e68cef46d25089c7f2eb74e3a8fc053fbd8267e246e53a7a6dd4ed8275fef8afaf5850fea0c383f1d5dd3f9a59b2dab200376bbab410c4fee0b59230b6ecf552200a14b96fe391d7ba1be035f5d3dd5c0ca8a98f76b8a985925303e17d83de4d765c3346d89de92aba1fc5cfe97", 0x7e, 0x7}], 0x111080, &(0x7f0000000980)={[{@mode={'mode', 0x3d, 0x2}}], [{@fowner_lt={'fowner<', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, 'vfat\x00'}}]}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000340)=0x10000, &(0x7f0000000a00)=0x4) write$binfmt_aout(r4, 0x0, 0x220) fcntl$dupfd(r3, 0x0, r4) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x87ffffc) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r5, 0x8040942d, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001740)={0x0, 0x80}}, 0x4) 13:20:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:20:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,z', 0xffffffffffffffff) 13:20:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='nfsd\x00', 0x20440, &(0x7f00000000c0)='\\,\x00') name_to_handle_at(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0) 13:20:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:51 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xa) 13:20:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:20:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1586.580729] ======================================================= [ 1586.580729] WARNING: The mand mount option has been deprecated and [ 1586.580729] and is ignored by this kernel. Remove the mand [ 1586.580729] option from the mount to silence this warning. [ 1586.580729] ======================================================= 13:21:08 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:21:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 13:21:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:08 executing program 4: r0 = syz_io_uring_setup(0x1260, &(0x7f0000000000), &(0x7f0000feb000/0x14000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0xd07, &(0x7f0000000080)={0x0, 0xee5, 0x20, 0x3, 0x266, 0x0, r0}, &(0x7f0000fe9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ftruncate(r0, 0x0) 13:21:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:21:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:21:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:08 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3ff}}, './file0\x00'}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x303}, "b7ffd3bd61f401fc", "272061bdcdcbec2cca258640d1e432ac", "76e6fc57", "4cbd1f38f44ad127"}, 0x28) clone3(&(0x7f0000000340)={0x50100100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:21:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:21:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:21:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)={{0xcc, 0x0, 0x7f, 0x1f1, 0x36, 0x9, 0xa2, 0xaf}, "6c968045a3609c747cc2761e935dee16bced0976a4befe4581e0ca8feb13df17d918df84ca1069af9308429c6692ec6446254332d7322cbe8c1eab945aaa71981664323fdb7601148dfc908d1e4ffc5107996dcc83a84543c3c85893cb50805f8ceefdc2b653e645040e1f9d85e844f60a39ce0f1c6f36fe199a9376343fe54263087723d3a2800fa9dcd1b16964931e823ace5b20", ['\x00', '\x00', '\x00']}, 0x3b5) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6174000007d0af9200000000000000000000000200"/72], 0x48) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'lo\x00'}) r3 = dup3(r0, r1, 0x80000) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000100)={{0x2, 0x4e22, @multicast2}, {0x306, @link_local}, 0x0, {0x2, 0x4e23, @multicast1}, 'macvlan1\x00'}) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') 13:21:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:21:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x06', 0xffffffffffffffff) 13:21:24 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:21:24 executing program 4: fremovexattr(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x2}}, './file0\x00'}) 13:21:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x1fc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800ece75d011080001080211"], 0x100}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x24, 0x0, 0x4, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x41881) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000008, 0x8010, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_setup(0x3a25, &(0x7f0000000080)={0x0, 0xffffffff, 0x10, 0x2, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000000300), &(0x7f0000000340)=0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000400)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, &(0x7f0000000540)="7768a4b4a0fe852864c4321e993f078c327a04fdca253b696c5823ca801ee45b02277f4672fbfed9edd0610279464a9f5b397dc79773107a2cf47c9c978ac1e1596bfec09de0f1be09fa477fc28524488543b46b754e43188e48e86f11c4d11f922dc707ffbc10d6ed2ec6074434caa0990d4d2a951eb13f6641370ff5eff1f9981b5ad9b370498a1926906f81154ff559e5ccdfb3c3e38930039068ffaac6a38252df74e6a4c2c7e29a30d84bc93e7588d6b92f90e5aa39edaf34469d5cdb643259ddfc2010c5d15c70a54ca22ea81819c5c63ba9a10c4ecb19b35d11ab706543b20d4050ed6da98ed5a8b3450810389566b0d4b28569a4d391ce4abf3c5c0a90162ab9477d91cf6972242575ab894c5f1c6d7f72f2cd2f91641d75e4621226847465a63814e9c9e46e99f6cfd3231fe0071a1c0b572a22a2fb0cbb00e7c6f487833bd3c3e4f24bd1e98c58f025164a2bbc126cd83f4b7789944ca6117facbc9401ac85e9fea9fa0cb07bf28111baacc38c4023618b7760c47679347a02ff4aedcf725a5dcd50498967fe200067ff06d5f37505d1cc4c34fd268736518311a44da454b97bcfca869fbd0a58c3dfb9c4a2d3e64e9af9f30dc547f4ee2c0ffedc58b4e9013fa1dc37df3b15cf62d0a26a22127f8afeef74e570759542ce77483f9f1df902c4894f981dfe2503ec49114c21eb8d4cdcb640388e3276f75259f5e75fedf3022c6affd3f8f7aaf758ac8c4f4111b58482656b49625096007776cd5e7f080a12f5d9aff02a1700f67205827ecbcd25253e7c4ef2c34a9977e7750d81cbf854038f33a26c3115ea9ec27a41071ecd8375e4a34cc3882409780b97cf8eb2d070b36b5d68b03bbbb2e6e6190bdf3698fe76ab256715532f7bfc10666dbcd342d3b21e5f6564312578f27ac4a15b846a9709cd6e487d3e060495aac1485871d4b413e5c28b552f45a649bb75cb97e70110c908bee758ce872c1c1c94fe4bf269dae60aabd0e03b8b4f3922f6b098eaa6df7e20f1e04279174b0abf53c93a867ceb32fa47798e0b00e416581d6da1256bfdadc5a713809cad6724adb2ed939f015f74f19e7d22d2bf0ac2c191cf7ebe191c83e8d7a4ec832c3e48533311bea91f0ed6944836c7ba089c382e1f8fe6244544b4b402277b0ade7412a1e26ac631d80e7513ab25dcc76cfedf7ff8ada3e87ccd0688f8d776fe005faada1e85d21d4887caf27672b635ac497e2395e42faa2050e2a6388df91459319649f83f90549b3e378b94ee4c83ec254ad033854ec4ee5fdf0a498208603de179da41b829dec03e5beec0b91966ca5ef4bbc10b731484418c53313a14e97cebb7c9683260989386f9c7b1b9f3094a7aae2ed741c1d8328d3b71820c9457b5bfc93c21419d685d003d4c713a6aaa77374b71be5a9f2dfb82bdfe467b77b59337359a69c1ba467a25787c8f2eb33ea7062a0367778f66864ffa6de4ac426ac7ad36d1c06d2733a71a5c24c40e832798fca018f59e33d128a90cc5092da73c4f4a6bb0765f2e041d48083e049b45792fe1605bb32f8bb1be25ea2b53e4b40f3e63503975e00d90db7ffa7088cccf6ea9f7b856676ec7e4d3cc092f5dbfd406ccacc0f5f1f36337b53345bc5629b711154fa39bcc770a5e79c07db3da86b2971d640dc0ddb5514718f2ee12adb5b31d4adba4f31c49d7f6613523ff3b83413d6f426a8c8b4fbd448537aceabbe176cf9c63d1d0d54868f8970a311e2fc70c2384468a149b941403ace5ac9bd7e63db9d0a83a8edd7cc607ff66ceab94ee7971af0ce10cb916cc73e20e6880899cabbc5bdcf3ab6600a9bb56442d3764e8fd3b6ac323bf01b269f9416c5aa53dc5e8ceba00cf2d825858cd12263b4d0507879b72a2bbf4e23024afbd5aa4533f9739a82166a2891d18849a01ca0db0528537f2e0538f134847ce8c10321689a975b674190125e108f39e26ac5e67d115744ffcacf14bec672617e7f2a96152662579dda305dbdf85d818a97c6ae747e4d133958527f1850692a8e36cefd329d9b64e1e95fde4066d819dce141e7ae7ea23b4b37df4b6c279ee661f7d2b289971f1b9ee86ee66ff70bafade9468dee577b5f5d00032acca10659c0437ce96c60d7b4af949ce17be9ae95803638ceff51ddf477a9b49837c47065b86455b558e65ad5443cfa3c7a3182d2b50b46e6199ba9d8527a813a65cddc6993d42500cdff058f147b519f1fa00c28b9c867ddedcb2d11c9d8e843cf16f1fc0b5ce4f72ac8870b2ffd2be14794e815e20327a59eacfb64ccce056000c4bd75effbf7a479dde05c3dff80b56f78bd8ae55dc0ba0fa35ebe07e2150d3e54f3026454108832ce0999ce8f84d0a408a9af74090fe6f6a800d62c9270eb5523fb3dc36f184a8ebe3294b6377e683a5b492446708561a270d8ec68d82e63759e67a11784d0f8f02b4b9915daa354b1d3141d339ec875b865946f8869b47e357f3d4f2b011da25340f2ec60a20a4ce78411bc316c5b482704cc013685d578ef573eb3071f5529e9dabd0fc91563f3d9fc51efdbdbc695a9012a7eac4853a3053f3d671b18861581d7a306d228b79e47ba446be3048746f3ca6fd7b758e402d8d8e15c637813318b6c3ef8bec45c9131a6e3526c01c9dfa069a01e1610bb4cacd8f1af5402f9afbe2867b73a8a9d402660df493b543ecb1ab85db412da21ccb58a9f5d1efc137b1dec01dba9b7ef07d553da8fe396b7c56893368340f8ab441ed70ae4ab49a3552ae02b9b68330ca98d36ac44dde01ff35fa701a1c2bb606facbec831f55991fdfc39dc302e08ea7c83f4d84a1bdd7b5e1a57704b63e4ff521b2434928c5e34dd9c2abd3239b8b7726692f0b7e6e1af9210a0543c44b321129d50be9ff300599dd5b279bdfa866415dfc7610ba4590703989c05f847a860c02b68e2c3e7ae9e402cc82cc9671b3ec3aa10dedb406196746cfd270006e543744f5e0414af6ffde3a7db8f1f6c443a5fec877e61829c3712835950a6a2736c8455a21c9bb6c1b712c60b4ef44b105d357e2fbbb6ba9ae9034b5800ca31bbb4f30df2ca632d6054fcca2037723f6479416cb1a3591586ca01363b0dcba481fbbe2ec74fe5ecd88de29def9e66706cd9e2d906ecfce7d2ff42022654e8696da31d7e3abc9c30d58489d140034fa15370dfd85a49bd8fc603a1a15af7d422330618d177074cae2c65be1c13e13ecae8b5a36ac4d3a89b9c452b759d00e9c4baa41c9651c0c4270f3c3e5053450a63b32b5b7de684f51088620c0eae9ed28618e9d9a4377878907541f73ee4252bd2fafd22933f761662a01446b5b127a5231b897432d76ff9ec6e03f9b55fe987a201223af8511a45810ab814f873dcb5a531cd29a71b4a7570e7b620ed306929cc06673680b791e8678d675013e079eb3caec36264ab96d6cf40a07aeafe6ee2e2e95a0cad525ebd67a4a758b729f7fecb1367521a4e1e16d138b8556d7523bc9001232d550229bbe7a6a83e4c3dfdb4873bb986cbdab640ffd172ad7a79dd8f62f6adc97e4d83e7f06fa0af423ef41629c310265a77b758b9a331118da336918c014aeb7cbc06ead365f1ce4152a72227662cc47a75a98ef24ee1700b9138692cc16431434296aea436f28bd5520507c5c422c81a46187a4ea2766e35daeebcdb60956dde8c8184561bd35c5eaf2f8900c25d1846c7c20274977db06162e3616dda9df007339f46eb9bf0249a098c3e4ac323bf9bb6f10d45da989dc76221d73c09579ce10826eede77eb5ebcf338a0c23cd682af637b7986f5cd841830b9e1067b626d734386d73865b51d7801fe75c8365d995ab1670e2d65984f2436495443057343d988bf90b3185b3baebe2bc62ffc9578df619dd07daeb96e398b2248d4d47137b6878160dbd8e4ce057b341f3b27e9abcc48b0b158456c6acf89a1337a93048ce80dd0dcef83b4774c8b6eeb2387cf69b2bca1e3c351488fbdefb9279f015905cb67629151f180e396608991c6cfeee26bffeed77438c0d3cbd8a1a66b46a40b2253f3a830424417c92dbf00ffd18976e4e5c93fb0cbc9ff703fedea71b665b7dd2a706d9eb9b2f35d725cb82c11e73451d7f7b64617ca4077df13eff1662e91a610ac0185b7d6a74c6644a7e015e30bd46970c764107f1a32e21f0b9bbf5f79b22589de19ab4c83454fe5dd0c8fefa534d34d73353c5f6a7d6189a086ea7155fa6506f808d57a90b300ebee96002f1a6f140e30786939487c07e7f7dc97331630615a056dd50edd5eb3766ef79846e5d34d5e50b18c53cfbc746e26f89524970e2b062865ffae2394c7787c46e1e52ecaf614a21597d911fc60480eec46a5146bdc68998a6b9f94cdbba44063488824d071a85272d4aefb5d73effc9874995d2fffe7df4714d80302cfeecb698b7cfe82e9bcad5b7163d1baffcf4b124accf622ebd09ca5b29a1b4217621550ae8ad03d86a972ac7029ce9485db798990433a86f876abfd48a39fa27ce6e9b4243e38e7ce8aeab40c261c723b1310188583b18865edd6d3377ccdc9627b1fdde8d7a6418427fe75975bbdf638b143b79a8fe6e8d42a290f3560f974099fd463aaaa0d0cfb625cc2a17331f2d4d827e7edad10228602dcb863c7f63bb4b8aa24b319d279abdad10b3b69271e08948cda59f5ca296a1496b676a9cbd1aaea266d563e7f587529338dfe3ed269de1bcb71ba35beb78a96c7ba60d377d01836780b71cf848609bce63843c9d92feff47924d4703eac61e2843b6792a47691832b24722065a5d0a13024a38fa78cb3f3695e7e0854fc53b69c210fe8a05d29daf2c2d1b47fb2c4cf93fdee42480b0b4ef116a9a45647a027fb643d63c02f1e27a2496872bf3a65cffad4be1c7f7844135220582f508cdb66cb3d0823ff4a214c12f191fc689741a5ae92ad26ed0db74cfcd643a0b4c0b1f1b6a8388aa92042f0ed65aeced1bed08a6040c975d8c897f9814a824c501db90cf814a948bf98378cc83dcae98179934d66fd277e0ae85ab04469742cdbf7f389f47c47bebe76f3e5911cba0f2a9d66dd59d315d1172d6b4b6110deac38e45f6d3218f89ef1d355bcb1cba0d494d2b5bb1f30f3a95f8fb800130f3e97ffe5d01f1acb4721288ca65eec016bba537c0ac2a4009f274f18e4c88bb049192e80bbf9073fc2d7146f05204a4b43acd35b1105cc33fa11d510a538c74977f6205c1b5e59ff8d830ff3af4ba249aede84c7e0029ac00338c1441f1ab016d2c5a2af1245071facb12f3f670f8cdd9d56b23a3988c24c90e9deef197c5e6dbe982f4467ee4b512cc879046fcc9d9b5123ee3b7a349e36d1f72f3efbbc7a7da8d945ca258c77b8e4591845bf71ada578cb241ea893c1044ab5baeabb57954dc18c61e7677a20ae69f5476d636a9e3d411a6e602fe20f8bd805a4f728479d3b9c90e80ec79fdc8f340f5510cd3fbf1bcaebb92456bc3fd38c3a81d6bb7d949f68c0f72ad592637308f9e504386234c6291101abc0b11a46346e3f2121233945f725e3cd9091891aba6af8fa031b25d1fec86193b9ff87056ea530e28ac0a2048102545df1e8c03d0771f1fd571d444908fc8c2a090196adc956b2fff8286086c9dd8af6ba643df262b7bf52c73a3f3237387b83505269ba9f444de332c05dfae5f25315f0c5b9c235313708ca0c3f30123e4af4140bdc399374d3745360e3474fb76b8e536598db9a92264d569df5e2e05813bb9a205125d563d16c6901a205d4d9480f8573c0c92839ffec26de49374a2a23b38d160", 0xfff, 0xc0, 0x0, {0x0, r5}}, 0x3) syz_io_uring_submit(r3, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}, 0x1, 0x0, 0x1, {0x0, r5}}, 0xd6b) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x4004, @fd_index=0x1, 0x8, 0x3f, 0x0, 0x1f, 0x0, {0x0, r7}}, 0xfef) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r8, 0xc400941d, 0x0) fallocate(r8, 0x0, 0x0, 0x87ffffc) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x119) 13:21:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:24 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:21:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:21:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:24 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x462003, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100), 0x42, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000340), &(0x7f0000000380)='./file1\x00', 0x8, 0x2) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f0000000100), &(0x7f0000000240), 0x2, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}, 0x1, 0x0, 0x1}, 0xd6b) syz_io_uring_setup(0x21b0, &(0x7f00000003c0)={0x0, 0x3, 0x4, 0x3, 0x1bd, 0x0, r3}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000440)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000480)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10004, 0x1, {0x1}}, 0xfffffc6e) vmsplice(r2, &(0x7f0000000100), 0x42, 0x0) write$binfmt_aout(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="070140ca94000000bb01000006000000810300000100000000000000000000003237fa6bdd16dc4affd27533847496b0a30fe799f73ccd5221ad5a85458ff48b4046f54b0d94e5995c50db000000002b0e4e618772c328590409ebb6c8a9119e008b72d9869ca5bb67b0aaecc3d61a940d1401abea5abd94da45b4213199dc8325f0dccc06152f9697b36c7af0dd13bb106af4a5a322bc76c95c18323cf2d6eb90611af700"/177], 0xa0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f00000000c0)) bind$inet6(0xffffffffffffffff, &(0x7f00000044c0)={0xa, 0xfc00, 0x0, @empty}, 0x1c) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, &(0x7f0000000140)=0x8) 13:21:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:24 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:21:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:21:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:43 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2) 13:21:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x4) r0 = epoll_create(0x4) r1 = syz_io_uring_setup(0x51dc, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) io_uring_enter(r1, 0x40b8, 0x393b, 0x1, &(0x7f0000000040)={[0x6]}, 0x8) syz_io_uring_setup(0x16ec, &(0x7f00000001c0)={0x0, 0x41b2, 0x20, 0x0, 0x2a5, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000240)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_setup(0x3a25, &(0x7f0000000080)={0x0, 0xffffffff, 0x10, 0x2, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000000300), &(0x7f0000000340)=0x0) syz_io_uring_submit(0x0, r7, &(0x7f0000000400)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r5, 0x0, &(0x7f0000000540)="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", 0xfff, 0xc0, 0x0, {0x0, r6}}, 0x3) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r7, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r8}}, 0x1f) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_setup(0x3a25, &(0x7f0000000080)={0x0, 0xffffffff, 0x10, 0x2, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000000300), &(0x7f0000000340)=0x0) syz_io_uring_submit(0x0, r10, &(0x7f0000000400)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)="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", 0xfff, 0xc0, 0x0, {0x0, r9}}, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}, 0x1, 0x0, 0x1, {0x0, r9}}, 0xd6b) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x2004, @fd, 0x10000, 0x8, 0x200, 0x14, 0x1, {0x8598, r9}}, 0x3a02) syz_io_uring_submit(r2, r3, &(0x7f0000000140)=@IORING_OP_SEND={0x1a, 0x5, 0x0, r0, 0x0, &(0x7f0000000380)="b3e98882a8a70438101592bbba398217cf71928179b97c7878027696020e4963", 0x20, 0x8090, 0x1, {0x0, r9}}, 0x0) io_uring_enter(r1, 0x64d0, 0x342e, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2) 13:21:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14a}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:21:43 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:21:43 executing program 5: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040}, 0x0) ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448cb, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002e40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)}}], 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) epoll_create(0x4) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400000, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000004b80)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @private}}}, 0x108) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(r1, r1, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) dup2(r1, r2) 13:21:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x301}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:21:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:21:43 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:22:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x844) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) syz_genetlink_get_family_id$fou(&(0x7f0000000480), r0) syz_genetlink_get_family_id$tipc(&(0x7f0000000940), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x1a340, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x109040, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) openat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x100) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=']p\"\xae\x06\xc40\x1a\x1a\\\x9e\x8a\x17@)#\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004I\x1c4P\x0e\xc4!\xc9\xece\x84\x85\xf2\xdb\xd3\xa7_\xe5\x95\x04\xdae\xca\xfd\xe2\xd1\xc5\x13\xf3u\xea\xc0\xb5b[\x9adH~\n\xe1\x86\x1f\xe7s\x04\xe8\xf2$\xae\xa8\xe7\xbd\x05\xb0B\xf2\x9cp\xc73\x9db\xc4\xe8EC\xbd\xc9\xf8\x0e\xd7\x1b\x11\xaf\xbf0xee00, 0xee00}}, './file0\x00'}) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3b6, 0x7, &(0x7f0000000600)=[{&(0x7f00000000c0)="2ff8fa77e3d846eb919077053f6b874694772a36c9f6e4cf4a104364a50a3c144867", 0x22, 0x200}, {&(0x7f0000000100)="ca040fd61bee401aa737b3b971ed6ca7a32b71b4712ba946a1e5ea88ef94f2bc1e5287c3adc1aa3162e767e80f9a9f7ba9eca203c23721d6e4a251fcf898923b7f07ba302d6717a1f91873e07028b9246b57bbb97f6149", 0x57, 0x1000}, {&(0x7f0000000340)="5570ce879274f2bd0c1627584e58afe7c83ff00dc1da97e89a3ed6102efbca91ed0105d4cfba54df480770f149fba538d8a037e327aa9978e7c1b52b35bde6b0f3be154af62c737f3ca54b2f580c8cb4ffe5c7ca95e6d49c0829c8e1373beab0898ec959382b770122e1597a421df89c88dd5b9d75b808131dc53a643eb870f4b47eab85a649f2b4fae262b7e1096bd2f6927923faedf8885bf0b5742163a1ccb6af8b51c130c3b48086e14239242cf148f598c5d0f85d913dab81bc59eda8d9398ed9e6c4a4bed3d23906228750", 0xce, 0x8}, {&(0x7f0000000180)="8ef83e55759d97ed3520c6b2bf5e9292393325", 0x13, 0x299}, {&(0x7f0000000440)="fc1d7bc1a2d20168bbc62756ad8af28eea2c665dcae63dc7af0784c2d556282057e29bfc4be956bca250845c6769c21643adc8120f2a6e9a5586b971b18f5ab6af006437149dbe25ab35fdbf905c08776993f3e8b35b2bbd5b5489f5725d429f533d4394bfff8fc845ec77ee5865411fe08434b69abe248bd270e66f4c0042444902db4ffae894a45a12f6ba95fb131edf6ae6d984f41655a8f3bf5241022fecb91b3100ed5e213e015d667aef5c2186d6cb67b120857a232466d604e70a1d1ef2b1", 0xc2, 0x3}, {&(0x7f0000000240)="f1aef11331c19cca8a58d2f4af5dd42badaa0fff8bdc519bfb16bd9e36b7ab80f2b318c8d2edd9e6030e8bb92e074c596ce2fd78856bbcfc72dbfacc62df8c1ac381285406f2859918", 0x49, 0x80000000000000}, {&(0x7f0000000540)="94fd51b564435c5810a46bcb274f9e9c767ef4a9b0e305a3452daed1bea5b2ea24d81156651906e5eae8f3ccbf964e1f4bac309614e6dd687bd90eb632051b5eb6e3fbb4c430e9f53cefa7bee6e4887969c3c7ce1027e6b13652cc16b720944427d620a4322da15fcc9e35fdfb9b006bb0013901481918bd2f2e42f00496a30d9cf36e9b4b02071480516bb5cb81deb0a50334c14436af47a47f2a046d6d5a69f22fef42e9506bb23c4d28af43055ba2c1b470", 0xb3, 0x3}], 0x0, &(0x7f00000006c0)={[{}, {'ext4\x00'}, {'ext4\x00'}], [{@fowner_lt={'fowner<', 0xee00}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_gt={'fowner>', r0}}, {@obj_type={'obj_type', 0x3d, '-\'{'}}, {@permit_directio}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@dont_appraise}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000014a00)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000009c0)='./file1\x00', 0x53a, 0x2, &(0x7f0000000b00)=[{&(0x7f0000000cc0)="c6d9ec7f3edc4b1b3f0d8189c3bd553617d0af47507a42992f2e6e2cbb46743012981721cacee1f9272783fbd05e0df3b24c1926f5b273dba5d6ebd98ee814d471c94e42598fe644d7a8c1cc0f495a10218363a0a2bd494ced3adecc054c91e1be700fc5eb0853d45c9b281c904d51c76b87e5b973eff18268a4935def772b3d8defaa4b44efc9f6499b", 0x8a, 0xfff}, {&(0x7f0000000ac0)="72de1f4bc2fdfe30d9948579ead78a72e0a6027e5d284b95cb282616ecfdb07dd98aba985dcdedf3409cc7385e48", 0x2e, 0x7}], 0x1820800, &(0x7f0000000b40)={[{@usrjquota}], [{@obj_role={'obj_role', 0x3d, 'dont_appraise'}}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x31, 0x39, 0x31, 0x63, 0x37, 0x66, 0x36], 0x2d, [0x39, 0x64, 0x33, 0x66], 0x2d, [0x65, 0x35, 0x35, 0x34], 0x2d, [0x7, 0x37, 0x32, 0x35], 0x2d, [0x32, 0x63, 0x32, 0x63, 0x33, 0x39, 0x64, 0x63]}}}, {@obj_user={'obj_user', 0x3d, '^MAY_APPEND'}}, {@uid_gt={'uid>', r0}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '*:):%^$'}}]}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000c40), 0x28000, 0x0) r4 = openat(r3, &(0x7f0000000a00)='./file0\x00', 0x2002, 0x11) mount_setattr(r2, &(0x7f0000000c00)='./file1\x00', 0x0, &(0x7f0000000c80)={0x72, 0x7f, 0x40000, {r3}}, 0x20) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000a40)) write$binfmt_aout(r1, 0x0, 0x220) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000780)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000d80)={0xf8, 0x14, 0x800, 0x70bd26, 0x25dfdbfd, {0x9, 0x1}, [@INET_DIAG_REQ_BYTECODE={0xe3, 0x1, "999cb54aa91c6f9127ef6c675f5800c26149ddd732caa93c9f7263903edbe6c467d52525f9b65143f3f0c44169f8b8913ce63607458aa7cf95b3323a9fa42e039d6c8e70289b8e15467d3e811c92600fa1c22785254714ab6b12d9f6d54285c8f25b3cb9b86dc940be4d183ba265f4531c1b42b62ccf88861040cf3cea60cea97c7d7d00fd93b113e54d36a05dafb7cbf5e2691144ce32455694a08bcdbdf42efeedce515c66b5d0393cc991f0b79d9ffa3a69b7b9522afd942d64b553ce41048073f3a0ef523a36115422fbd1d1049a08789b0de5784c462c674ffd48203c"}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 13:22:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e80}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000100)={0x5, 0x9, 0x2, 0x2, 0x4, [{0xffe, 0x1, 0x1, '\x00', 0x584}, {0x762, 0x5, 0x3, '\x00', 0x2000}, {0x3, 0x1, 0x29, '\x00', 0x1504}, {0x7, 0x7, 0x5, '\x00', 0xa}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) fsetxattr$security_evm(r1, &(0x7f0000000000), &(0x7f0000000300)=@v2={0x3, 0x2, 0x12, 0x7, 0xa6, "c8d502ff768b1af6dbc132740e0a061167b44b4a994758b34add9d97fb30b6fad3f82aa6424833e13d290234c5498488a22f768f53a0d6aeb1749f40cc5facf245fff5f8baf86dcb0570f6790804c76016066e214b889d1e8967cb6c52eaa75e91350cf6025f7d15dd01f8680aebcbb09b129bbc6134a606511c8a3e7aa0ff41725fca3c9ecd90f900a59d4d2da3c72e384c8cd11897bbdb1bf752ad214d480f793a44c2efcf"}, 0xaf, 0x2) ioctl$CDROM_LAST_WRITTEN(r0, 0x5395, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:22:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:19 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:19 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xa) 13:22:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ec0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:19 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x800) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000100)={0x3, 0xf, 0x5}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000001c0)='+.\x00', 0x0, r1) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x6cd, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000300)) syz_io_uring_setup(0xfa7, &(0x7f0000000080), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, &(0x7f0000000000)) socket$inet(0x2, 0xa, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) 13:22:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018d10000", @ANYRES32, @ANYBLOB="000000803d15a0040ba4602867b90400"]) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80044584, &(0x7f0000000180)=""/170) r3 = syz_open_dev$evdev(&(0x7f0000000480), 0x0, 0x0) ioctl$EVIOCGLED(r3, 0x80044584, &(0x7f0000000180)=""/170) r4 = socket$inet6_udp(0xa, 0x2, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000100)="625a9535e1fef030a8a13c77e6ee36224f22bb84631dbcdb06d461e58c6b7765a5046dd722c0d25d11f67f7c", 0x2c}, {&(0x7f0000000240)}], 0x2, 0x2, 0x8, 0x16) r5 = dup(r4) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000002880), 0x4000101, 0x0) sendmmsg$inet6(r4, &(0x7f00000089c0)=[{{&(0x7f0000000240)={0xa, 0x4e24, 0x7f, @private1, 0x3f}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000380)="0068374adf81cded4069a05bd814df55a6abdbefeb087eb363e40be4103eed2b9f5410d462115f71e41a97598587b42a6495dd6bafa6cb", 0x37}, {&(0x7f00000004c0)="110e1ceff9ec0b2a4643c17077cec94f91f24564fcc1f1709b83ef94aa7bce5c1dd55cc99d906d461faa869a8e687e75f8e24f5f45937054f84585dc8135a9c11cde03df4e19c57859b73cbc9f5eda1236bf4b5c6e088a19c107a63c9f154828069dd728c8aab2247e0b03c7d8bc0896ad36de1ac27769faa29561cee2253688d9ae79505ea06fccd6eb87a2a275d12ab6a48487856f66a788b39b2b98665f870879b16f284e441c5b035b4932349a8586c0f174f6f87b75941d752e0613149b189aa70030f2af199da5d7a6921972954778ad", 0xd3}], 0x2}}, {{&(0x7f0000000400)={0xa, 0x4e21, 0x3, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x31}}, 0xffff}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000005c0)="364dfe644624bb68a23a89fb1707cb3b448fdf4fe698ff69c6570e11e7b3e478f54bb3b8ea7fd390b0a7f9b386474a8e8f24ebba01fd6575bbaf0b68bf9ff0ea5bfcac7f0298544a2693f5ea1ca6c7175a49620f1afcd5a9028f3ecd1bece75671595dda09cd02a2406e0bd72e869f45f5dcfff9eac163903880d81bebb879c000f8031e1b4391ebe4a2201eb52d356c8da9d0dffee28fd3ea9d21d27f2e05333bb27b410621472f92cd81d9deb2d1c13dbe95991cc80e00c37f5f9fa54a9e66d8df6779060d3a6fe76c4d5cec5c9d80e26b40", 0xd3}, {&(0x7f00000006c0)="240a1a95348d8d171e85692114688006ae1ee8c3242d3cda2e1a4c4002e1309656b65e1c38d4cba0563b1fe9a55f797291cfc11420b8e1bb62353a8ccb23e2f915927d62c9e52bd8b9ea113d646f547b3aae417e2cf149e81c1cc3d4cd80a62ae973ec", 0x63}], 0x2, &(0x7f0000000740)=[@hopopts={{0xf0, 0x29, 0x36, {0x2c, 0x1b, '\x00', [@pad1, @calipso={0x7, 0x28, {0x2, 0x8, 0x7f, 0x3ff, [0x3, 0x10001, 0x2000000000000, 0x1]}}, @pad1, @enc_lim={0x4, 0x1, 0x2}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0xa5, 0x99, "1ff73bc9e471a975b81d8165944975ac58fe986b869291879ab88ace330166b125812db213865214a7a3acb1ed7c70eb44a65eeb786f1b9fe0337eeedd2af0e168cb93c9e3fb35af64f0159e9aa72849586e1c72dba63f360ea3e7a6c5870fd4565640154339235b37ecfdb994e5922dfce4f470f0c3b6dd523164c26c4aaa9da382b7cde76c9a47901d5e2f0f8b61230fbcb13f7b33d79414"}]}}}, @rthdrdstopts={{0x1068, 0x29, 0x37, {0x0, 0x209, '\x00', [@hao={0xc9, 0x10, @private2}, @hao={0xc9, 0x10, @empty}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @padn, @generic={0x7f, 0x1000, "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"}, @jumbo={0xc2, 0x4, 0x6}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x2b, 0x4, 0x0, 0x1, 0x0, [@dev={0xfe, 0x80, '\x00', 0x3d}, @empty]}}}, @rthdrdstopts={{0x138, 0x29, 0x37, {0x0, 0x23, '\x00', [@generic={0x2, 0xef, "cd8d5e1ccab0d3120efff83d447764fcc9b5e9a96681dd9b54a7692c71ef04c755dafcf1e1f15ef7c7a77212016495a6a7b80bbffc5b4e07662aee0566f0c077420311e1e61723df487b73624cff6cc46af30cbff9bdacb9b65a52d3bcb689d9c5d3b5cece85af1a728e9643d8b2ed020e04d4c59bf1882c6cf79272012a85d72d22f049a2d8e06e2a9418892588706a7b40ae7b1d2bc2123d99c276be8d691a18295ce87bc71a5a9d5140d34c4afb6b54642e655ee351749648e96ab0387057d7e57396a2cdb211cc351bf4c54c22333d808e2294deaba0bcf50610901755455922fe5f949e910d2b855c3affc903"}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @enc_lim={0x4, 0x1, 0x1}, @ra={0x5, 0x2, 0x200}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}]}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x2e, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0xec}]}}}, @tclass={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x13}}}}], 0x1340}}, {{0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000001a80)="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", 0x1000}, {&(0x7f0000002a80)="368c00d72e030d", 0x7}, {&(0x7f0000002ac0)="9f8133c63f0d01511172da226d9177b3a63174eab9900a02bffde1546defccb8268b35e35c5a163122bff77aa4d1f7", 0x2f}, {&(0x7f0000002b00)="dc2265b9f1b8ada3ec4cfe9f8c65cd26d9df5b15d99046cfe08b32526b54ed7f3b60a500dbb2308faf1047ce94c923578e1ffba1a3289b500b61cb50e9828c23779ac60a4eab127a4e2a202d761c172d3958a0c54864c3ad0479308fd180c903f66e73958aafae45fa5bdb3b118899b4d5bbdc6ce7972c0b21e0ab41007feef10a7b03a05a39e02a263068235dbad4c036af4d6aa84fab64369bfa98", 0x9c}, {&(0x7f0000002bc0)="ca0fa691c6d8c491cd1e3b45d433be1e475b00ba9bb6a87c16ce139ed34f4ecb48dfd3f5527379c6cbf6eb4ba23e2ecfb9d2b65cba2e070f3fc6102c6dad870ebea8d5a747c335f86d94ccc2e4d447d1fb04be63421ed4cf6511395c102a5584bc27620658aae40aa9de148a32fac258a23c442c8856396907c77939d660623bed0341af86a5929922e2f6cdb3c382a4f30d8389c3907e74d12eae960c", 0x9d}, {&(0x7f0000002c80)="18ed508fe1123071b5d3e2a62a883d2afab07ab19f43db74669e248606da830a9e8fbe01b3172ff53a1a59be0ae867cd13416ab874e394ba8eebecf93a623aaa0cc04ca8cac5b7da16b8449cd49f1ea16f719f31f0bd96940713de6997c0a0f3df5a401fb175fa750b48f472cddf0d70953329", 0x73}, {&(0x7f0000002d00)="f7fc5e6edb9cd5d40c750526348ae81dd6c220e022a061bddd78ad1c8b075425f7897e26a0282c451fb7bf02acbc38fcb577ac77d493fa2edd4b0b2bdcd9a9d57b1a4caed3a5f17e0c00b95d9a0b6c828a6c651602f19997547c80573ed977d81002650f91b4482b107f21e8644c63145711980bd5426706ff", 0x79}, {&(0x7f0000002d80)="424eb1d8b60573455087446769b319dec71393c54f7c56259b9e63c506bda9fc49aaa61234f0682f78b39e7b36da071c1534a258f07f61b39dc3136ba8aae37debd3db445efed5c54cac2a5fd5e60973e76a94261424699f32ba8d038591382bbbed4bf36108e678839486572b41190937aa7f9ccf10e231340ce0b3d8ce2c38fb06671639a779857984434ea8106704a7bedcf5273cf6b94916ae5d6ec04bc002a1717f4ae1e3018b64a1e1abce82281f2b628e", 0xb4}], 0x8, &(0x7f0000002ec0)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x6c, 0x2, 0x1, 0x0, 0x0, [@local]}}}, @hopopts={{0x30, 0x29, 0x36, {0x0, 0x2, '\x00', [@padn={0x1, 0x1, [0x0]}, @hao={0xc9, 0x10, @private0}]}}}], 0x58}}, {{&(0x7f0000002f40)={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, '\x00', 0x2a}, 0x7}, 0x1c, &(0x7f0000003200)=[{&(0x7f0000002f80)="76fbc952d8451e7a6b2496d8a93843f0ee15be8c455c8912e6d023994007345c8b3865b8d74209326795b48e8f81acc8b949c3e50c02a2558a1ddecf7dbaaaae60d3d9174c499d8bdcc1f847dbed742475a796ad252c72786edd81e1cc92006fac04c9f48cfcaafa129be65218353f9abf779e7f89bb9cff7c6416dcc81fad1dc48125f193bbd7ed5a1136af06b83ae664be765eeb3aaf1d960b73c1d344846caa1bbc52d1bc1ca271afb628e2b38479e8087a819768cd66295a609a279d6003bf831a40225910e9f8220d358f18268426d9f93a2e8e018c5efdb362a2bb3e4b15ad61db8403031ba96ac5b71524c97de525a1", 0xf3}, {&(0x7f0000003080)="005398d61f805d1916921e6010b9e75ca1b6447a1d0299798779122ebbccfe947d1a30e2d10dac3c3371cd3a20ea681f065e8d011dd16de5f8b2688cf2c352e2ae8bbc", 0x43}, {&(0x7f0000003100)="90801b431d36ca1b23e57a7b668d83ee603103d6bfe0f5c17b98acb2e2ee59031c1e547b2359164aef74de4a2e7451c63154d767d9601ea7bba08f6f4a8ff10beeb69904a17d219ac93462af346dcd46547cbd29539e894106c85e2fdeda73e94ccacba68f0ea1f44abe15f37c95e1390e7f6ee34291242f393b5142b79519555b9d4188fe7a41a63c84b4c1c73241d81dbb24b72e009c2478cdd8adb808043f6a9bf8da5cf506313534f517c5057738db27ff8df42514658342e0f943e6607f002cd227eba670627d31b5", 0xcb}], 0x3}}, {{&(0x7f0000003240)={0xa, 0x4e23, 0x8, @mcast2, 0x9}, 0x1c, &(0x7f0000003700)=[{&(0x7f0000003280)="2a1b15f906c24990197e1944703d7594d2a70ad174c5d53aa5c616be", 0x1c}, {&(0x7f00000032c0)="e7acdb88a4c38a5d0e738065c104a6ba921e68b5326b1a4286d449942579d18832cd06991317d678c6033b5f0f4290e2e55ca77986c51b510e91cd66b1639f3f18f5eac4d3f705ff1d818d9a7e524d64632d9d6b89eccc123c4b01ff2b1efd2cb6d58aa4533af1d6214ed6c1ee404d25bbc720bc3784d0fd76aecb0eef1be80b85b12ce33664de9de7318b9a3800ff9df9ca62d9843026de0f09f7cbd9e83954f230df4fba33beeeb80bf7a5825c98d353f16be4528c2338c74a7d5f", 0xbc}, {&(0x7f0000003380)="b078e6229fe451a8fa0e433284a5bb2f662707cb4b98dfdbfe14e1be6cc47a7b592e0691e9fcb652ca9cbae4b7e025468b2d4ab81ca1580375ab32d5bd65591e9f5118d6aa267ade8a8c4fca8f93a3cdf13777f0dbdc3d9aa9dd6b8d96f8e065b6737a7b0a6b76e638441f4dd00d38a78c55316284b443faa786733f6fd1dd7cb1cd4e7badd814c638237b77c5191aef92026bd8994f90cb00cbae01a9de9c881880871318e6ef7a", 0xa8}, {&(0x7f0000003440)="7c04d5eafff2ee326e375635294ada3d6d2a3c129a6470ab3bff0766f821c3a802a375c97b06b34052bc5381f3d0a9d6e7249eda7e2137c2fec488b89df4256386b5f52c87c295f9f83d7f990d32d705d6c24b116a3ac79eb081d7ce210571d5c9eb43d53bcde0b12173e29be6c2506ae1730da336700d648c7f0c60121cd6329ce224f27b177da6d36a97b4bf560a0655dd923d1b4dbd637fae3467", 0x9c}, {&(0x7f0000003500)="8759d44a597f3204d45bb6a36a603f098d7b9db67f493e53b5a9a55c7ab854c9ea2c488e37cd48ef4c8d393a28dc1105d67b4c3da02bc4b770465b8a768d8ac1048c83df0f52118374584c219ee901dde991356e68d6d63eddf47d5cd9edda734b14c3ae85561b36e83c4583013200234a30a27da67331c0f5cb814e2caef04d169c7c6cccf57fc01725c1c422b706b3900eb306150894fb9e0526b35881115137716677ec3fe14fd52e88b154cb", 0xae}, {&(0x7f00000035c0)="62b1d4f2593e98209d4b7870702e80adc6c40398372601e85ae805a8cb98b33de4b9072be1c1", 0x26}, {&(0x7f0000003600)="58d7c038cef3db0419740c412f3b6f3d10af333f2126cefe76cb5e466d485cf68e9e55a3786201abd8392a106e3f2847d13b589f25c42be6ed7ff30af71927733f084c646f833c122058e6e570451f0042853778cd358857f1c20990fb4f81358af08cf379cbe98e5c72842c580f708de8b38eec38bd96c2f1dcfdaea329591f7fc7ff287650a77924d93c590e4e2eb9d0baf783", 0x94}, {&(0x7f00000036c0)}], 0x8}}, {{&(0x7f0000003780)={0xa, 0x4e24, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80000000}, 0x1c, &(0x7f0000004880)=[{&(0x7f00000037c0)="856e59e87dc2cd3bc4fdd58a5adb822a5627cdf5a70bffd43755b67f584cbf53e050020005bf6862ed15782ba4cc76bc2b389cd3e448700658f481a1ba4b6cedd802d79dfca7d23de7614efeca8e41b6e0598282319501d2c8e8dacb90e2a5db00a3f3f22e79f23933c6c84d276485ac84f3a35221dc67409a7528ac887a7d38c4f7eaa464d70cf0aa1f9f5d5d", 0x8d}, {&(0x7f0000003880)="1729c3bac1eaa83b9a55daee0eb5d964af1fc48f56f3d5d19e0da398544fffd26a7be43d210ea222eccc3fb0e3fd8021c620998dd1e9bc8e1ec24f11099bbf176b0d4b5b30b2778410c2e9283f3204cc4430a3227aadc3f8d4154a724b4db673486f44715b2b1623eb2cd0987b3f4d9cbe58de06eaea39a97e05f651d39539f010657dabf901362688e59cbf8b37c51360c590a4cce6e8f351932fa45acc97d4168fd5591b3ba7a4a77116aa2cc717a75ea9df0f05a53d3b88a7212f920861096a44cfcc1dbdbff7feab8306047e1f4f6ae76f8b172d3306f87c405bdce2191641789033d37d4e20c2e51b9427668be75e59e5fc90b9fd048c12e598db092843fdc78f21ca66bf67d8afc86bf6114edf471e54a57b41f63d93721613bd0290de7e232c05be916212e24d40e2ba7a1efe4835da2bab696a99b18a22e22845ff2bf9004baafc1112035f5a1aef36cec7a604ea00555349daebc4180f4e98c26f17ed9d168993bfccc43b594dc33f80d50d640b79d56dabac4baddcb9c4124629dcf831dd0a5ff95bc7923193e38a912cfbe2ed622b4f235a55a650e5c536dcdf3f383901e9b31b14a2c40c8ab270a0cd79e1baa21122b1ee9a4c63db51214d3932e539ce12d868c7b8bb4cf0f563f696e777c32d4d8eebf983f5d436dee286a8767738dc179616026a5caffb99a89c35fa66447895f23bdf3b353a10bf619d23b61ffa2cca4500c055f90db4a0e347f70146d4658cc99da3a7c927ad92f937c72f39caa1863a7d13bf256d3ea7f562dd918272165b7eb1cb96d9aa9b67473f26a2f1eb88fb0712aa050ed937ab5da57ec322e3a4af810901bc23ffb77800315cdecfc8a5c23ffb8474419f071e0371261e37b12c6d7c68916ad1def2a1123f52408948499ae310cd9818ed8d9cc19267f0fc92bfaff31b877989e2439c7e4aa898092e4993dec7a86b18907824f73ba9246fdc5c7b977714e8b70f7fd6ff271416e9252cfe3d38d4d9c71dfc56906fe9f78ac33fb9fd111245bdb19ec38b9de7a64df46e274fc41282699194c216a79a093b07dda9fd7f0a54fe8b5455663f714b893c9d94d19ae086ad4ce53d877845815ffe09326f833c48fc1a3d46a94550614516a1824a8894a2524d2db21019863216a855b9b46e840c3b66c91b890f791f0913a5e9d8cdd18d7bf43fc2ced22785fbd7e819b505173717f37112b486e97c8bb2056f164171da6ceb6aad894f10a4fd246d2103363918e757b3c4209450a54264b7ebfedf7b73b811c1ac1c303d9b766373f5044ea97e233bd0b5e2c1bd61f0473cbcc0061fe7d4a3d17a6a45f0ad820a839cdcb8b26d8327de10e7665396c28565ef3b643b4f4205d2bf56d534792262fa9aa9e98482b680e20e9cba4be22867cd9eb258d8a57750942955b799c993af20bd4baa1ab8d24f56cb9ef5e6d2423cf191c41221cf60893dc5f633b952062b4dc045bf342dea889d068ac0aa2abb2e11e19b373bf795ed10a03c3f2dc72473632f6e430c8a77882b0f39b98ffe6af3c0ebd0b6d9e0bc370071b7be09df6382a89725b70906c88cb3a05ff189477f28a12d19755b1045cb945559ab872f51f13fcf0cbae83a011a7e64e4507e496f9faba89f17f55e8625fea927fe26d31759bf369cca75541e537908eb43d32f86fe5f7b07af53b7575ae72e5b6185e04594f7bec5c2c242e68b1bd2acc724c07528ccc398612df30c8a46e2820e858a48eff2e258cdcf0d2d34a7e5ffa915bec26bfddeaa76829d6f431da4a004aa4874e717c1ba3ad26187baed1373fd4fa2f8dc43ff85f41532484a744e07471a56af9eb88808d9fad9dee05f3dec0b4aa27832298af91a99fc4be6de2e7673b734edfbe70ff3ae7cf8a933b19b3e23e57abc939ab3f480c5761b0c4a41b7d3c2ca05489dbd6ada0ad86b108d66b1290a931b01177a32063eb653adca3a18a573e846895b11b056be582b82113d9baa0ccd46f2748957a05c3b872ecc8e7d6b8395f2c4585f17232431c54f4088b8a01d30e6bc4297036e57f1485e1648da12c8cf066f1714811fe76aabc96c9bb544de11934b040eff379c2e2e5039a521bd6c21e5e349d0fad179154bc04f6677d3b3c8eeffdbf1c1d441881eeee1c3153c448c223660022c53f5a5d940f900655e669a8fb1a3d7c7d921a6055834585864aad2ac7b791fb837619859275a5bb55adedcdb148ef4ed43283cdeb19fb61221846c0473ccd3747d9c507d2df47be8c155e09cbb999a68cb53f4493e5d0653d7ed792add51e65d0e3897c572d7e9379ea60407f6d962cf8caa6b61a9d6839a6a7b11be69c15d3a6733293ef0b354fac2cf2e16576bf648eb4e53453b234e7cc8723141aa22e2cc642ad4c3b33e05480d69ed89b2b02816f004e068c5c1f846c28081b38f54684f0c751f7efcfe7639645a47f7a89c318add302c363f1fc6463c742f02d21a10c8e8719d48acb41df5a007dcc1908ce8e8ef30003a4a6976659da6cb22ad3577bb372860dc98f7cc06e86ccb8a81b268b17f0b4d00c06e5461ea3fac2f876f69998a1b0732212ae0207c2520fb793f1181e62b6e239f09dd6a3be426cccef7e6c2bc50567186969e5f28df46d801517749f71b0c939bd194809209cac7b37d53d43b2ddaae3651d103a379e5566dddd6da724081e139c0de3152f455a3c07fe13bca65884bc0e6c28ee50cf443e8f4ba77d3637f0f1d1f29c8b2f7bd29fe675ea4c5e3f787f6d6617262432fc4dc5d166292da46e00ef5f5d90ad86f3526701b0320c86ff1f62c732250559c82ca09866f8ec2c8cc4837161bad4ca0d053b94d8849355baf487dba71530aba22765c72b12423f9cc153b31897836f9a019f0a30c0c21f5507bd2211783cd8c87654538e6132971bef2e0d2dfcfb8723aa296338799eab6176d5b23993ffbd2f733956fa136b94a576bc64c9d8d9e0a04454939e2fafb762e720680b01d04d225a7c0b9bb03446f45524aacdba4b4017c38047dca3f9cf54d8d9b37f2e62d997b6b8b442df6e13333e38faa35ae762661cf8d950d3b0a9aa83c9576380f2fd06a31b46c256307443aeb76f9e31351116710bb69381424e1ac049807eb1e929478c398cf2af7b92c36e4fc2a385fdc6e0c15c2ba259b29a0b8b8f82d937f0fdf650e8840a8ad8b2a18c77ac7de9d611405442743eda3b701b9809d31d9eadb63f83b490238d69c7b96d296fa83e3844b64445928d7dbf8e7ad0b1b833ff366c0ac5142079410ec8abb117418e49705801bdccd94455b33a76dbc681a363916b01bd6d42110b8c620f63634a2600e6ffea512445d5813d402f60b89bceda4695f9b902e312913fb36c097e96c1e56e826805b1f7cf0e36320083c1f5195476f3f822ea1b5fdd68c9db5bbe1fd2132935d21ebd525cf49fd14555ec4af275bcf719fa0e00e7b39a92e3ab219ffb11d35fb9e6118762976ba79cad08ad621c2592913b98805605321b77c7e98199af5e85a48f6176d0b58d2676388b600cdb24532dbeaeb9c2c651c0bda79962a7f88d4b2a0e5f0c30a0d36d7ebff8a09aceb92a5fdfafe9f175122c71ed8aa65e4d0a705625f9aeec71ccd24716d34095dc6124827c25bbbbab122d8f6a200f48e17629ce61d6d46275d80de80e88596693a33884b25633c23082300f0a5d383c783dae703d5245c6a4613756874f0a5f66ac992740184f5827b0ca017313d1335239e09798c333a3d4a094bb292b900f0ebe2708bc594058f1a552213e80fff204dbaa9e21962294fe78da30a11df7b3c1d048a91b65a765c8893557f1caa623cc565d3b6e8dac30976afd7a14133c91db5f05ba35f1ad37a6ee6ffcb147c667ad6c4d66217375245fd496e4418b68b00c78e64c5d33b4463ed8c054bf232ebaf43d8a601697ff9d73700c4486fefcf39ae583ee454511527125170c262f86d1cfefcf9b6b96336b43b32cfcbb7df9684766520c9fb2fc4e6814904096e976d6839341f5ee97c8057e452db91eecf94749ef7c8ab6f5d15f3b38799a5faaf6334cb4e39cc726850dfda09dd818dd6ad6da3e6d2224dd75c3207c1a948ff6e73887ab62ed7ce2a5bd17b63baac33b57c069ce34b5bbc93c74b2ad5c55c26ab9d98f56cfe4d595ad961c3c1c3de7b03453936fdd580b73a73e1150783da3eb43f8aac1baa9cd514b289308a8a6109d99707a5250163e41a03d704ad706f8aae511f06db70b6c2db0bb7de8fee3ceb6511adea16460503cd3429d19afe2a2615d8bd9324b0509bf90a8e6101e1630fa159467eb47747e277fb3281653b77616fa0ed6faaf7a0fccb7b8be18b1c414c381a3076280fb33ebec48ad6f3af4e63d17a8b6dd0ad16e0683a1db8e9ac8cbf6f651fad6b100a4986a8e674ef2c5427184e1d485197ad9b3368232a8b72982f035c4ec6714c33ca1280a202a128b52cf3ba7e15a94932bd3b9f79002b33177c08cb3a9bc3def0328ae50df353595cac2744946939ca68c902bb24cb0855ade2bd15d7cb7db723b0957de185c4b268b2fecac8131e00aaa413a4b9f48b70f8cae4aaaa533e90ab21ca962e96d1a1bc9e1c0fbba5af9e8e971f584ee04f5f03288b9e3d027666364bc86a250c00a2d74bea865e6894f860672d1c1bb675a51009a251f5c21db666ab11559221b681fe0e71de1fac526b6021a68172e259067caa2b8c56ddcb4d56bbd046e972e15731bdb3b3f0f44d8a27ea9104c1d34438c704efd1411ad196815225cc27a9be349fbfab1fa8f7546d7989425ee0e639379b44f752fd758735ebffb15b7b759a4dd4909d205a4ac028059701c6bbd4d16ddf95c27731e336724461812220c20535a2aee971046fbb21c86db3e1c95fcee5482c419be28b32e43ac6dff56fac64ae505d45f1e02604492a8c007558eb62453f3f5f6c6eafe5404d820146ab7b9ed36f663e6d256182165ed57c9b1191507dd5711b23ab9ef00b5a225f6a8223a5ac85afc62493a901c3bf9124292ee7d0df1dda9123bc5c3e14b09adb0e32233a4fe4c5492cfe116cba8b7b5e9b851dab178ad7a6798344aeb64f7a257d851f52c8912afb4b93324d821031c7872478601e4297cf619d073b528ef41ebbd65cd26f5fdcdcad6466ca22317a5cb32d298a22444119f29d5d6f9b50f18575df4521b0990be5e4c2a76d2832b77a3d3d0691db9a0daacd96825a7366c45b8b9daf8420d1b10f4ee402904d53ad9c9edb096f91f51213091f707fc56b4e169955b98b230c617b5ee43322df806d2e031ffa1efddd54b993b8527338143d0ca378fa13177133fadd8217f917fd89217a47d7afb55077317808e93f7249e8ba8a8f65ebad2afcb5af8ce56959d55cdd83368b79538e43c49eef10612474550f06aef29938911ca55a37da5ce9b9c43e9502bd93321ac870f4803da218db55118c3157be67b6a6e7611e33e33c4d6ed2745ed57e56f01dc8384e099884cdd89cec94251a386a2d1d2ec931009bbabb113a714b01e379012ed26f821c31cd43d0efd5e3aa8830b61f399ef0c8cfbdf672f757384c9e5ac4983bc28df5c4e302fe64af1e5dc3994ec09bc2e40d825df8c81c5fe1e74b24c0825168b698119f7979c447993e0f51a031bc0073ddf84faeacf6808ef1276704b479d46c690edf31c9aa78ba48f38d7a7413de787a78cf1504c8774a67f3ad34ab2bc1b8893d797fab423d4c0d516439e836e7c40a08dffcca84ea5d4a34da6b98983bbfc9a31fb4524d309a39cab0d434a5c4f45a8cb075cb67f11037d977f18913091c1baa", 0x1000}], 0x2, &(0x7f00000048c0)=[@dstopts_2292={{0x110, 0x29, 0x4, {0x75e1dea16263ef91, 0x1e, '\x00', [@generic={0xc8, 0xf1, "231e82d494d9d2ca93000f3e3d5eacd9559704810405b6415ce24fcd5815f102cbd464043812fb51da8a0746b03595ca445eab9be5a9c22e2de3dc3ca8ac2bde560c81fb3460d62fa37d4da6184ae273f716aa00dec955102b6d100f05f6ab8922dc103da05a69af5ea2fd369c767cb39e7931514628006ee7b833d9ca8cfc2ca7edd2bb82506a93cf1a700f2dead4238c3ca23e8a334ce9762042959bc55a6e06b00a96e30038480b9639ece13c2ba1a177fc6a38a4bd82902d5106ddeb161e864cadde0264784207a6668a7556f6961f3d7581579556ca7dcb5d9f49114eb772474e98161e6a67edf7372d6ec9bc1843"}]}}}, @hoplimit={{0x14}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x6f, 0x6, 0x1, 0x1, 0x0, [@private2, @remote, @private1]}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x87, 0xa, 0x2, 0x40, 0x0, [@local, @private0={0xfc, 0x0, '\x00', 0x1}, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2]}}}, @dstopts={{0x40, 0x29, 0x37, {0x3b, 0x4, '\x00', [@calipso={0x7, 0x20, {0x3, 0x6, 0x0, 0x1, [0x0, 0x3, 0x3]}}]}}}], 0x218}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004b00)="cb7ac58941994fcb88ab041506799ec3be1e250ecd3031c1d30befa4bb4ada054800835f478ef9260eeb47c663a55664da66208abd30a39534437b845fda2303ec17ae2e9de95c49cf9eea356b7e7bdaf8302d90422591937e466571", 0x5c}, {&(0x7f0000004b80)="cd85908dcaf8d6ddb89d90c4b440ad99ded0739fcf11bb1b6301b8038a9d5599b32dccded33e0a6a2927bd16410c87c8ed8960aa19db08e47c6e1926c7d024b77a8ce9c1f5481487ddcb5fa5d0915dbb7f5f3b6e92f5770ee3af0cb1be86e270efe1d693825fc183a5da375d159ee9a06073eed54e9a05a83ded71ad025fa9cfdf5e6c82", 0x84}, {&(0x7f0000004c40)="a21f512280d652cf8722cc15d18660be8d7683b6baa67d11d1ecb2f78385ccbcc26714217f66fb8baf9854e224c5670aee5ff6f6bb131bfd2428e69b2e62ae2799e01f7509264032c68ea3c132d4a66f8e670dc61f2091efa1830b", 0x5b}, {&(0x7f0000004cc0)="0c0d9b36644eb48ab24aae478f28baecb9d03645c0f0e17fd131d9e9e0a83ac374425dda9f147f5253ed28256ffc8cf7039c936048cbe2ca912bc3b7651c217dd276335e6ba81f8d00f44b2fd36a42602bd36134a7f21ab58b1dd5805fd1af4230fa724c6a6651533699e1cfbeeeeeea9e558657e9f662d9eac5eaf1d121fbc5737041e0222fa1275a708b53706ae1c480f05006fc52a1c5293925d17054002d5fe2cffc6f5ab521450ecec7901bdb1ee28313f8a8060971d6c644b2efce07af3c0ed74425ee3bafbe7bcf89fd60c36c37a803fab5eb82095a82a9", 0xdb}], 0x4, &(0x7f0000004e00)=[@flowinfo={{0x14}}, @rthdr={{0x28, 0x29, 0x39, {0x32, 0x2, 0x1, 0x1, 0x0, [@loopback]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xdf5}}, @hopopts_2292={{0xa8, 0x29, 0x36, {0x67, 0x11, '\x00', [@pad1, @hao={0xc9, 0x10, @mcast2}, @jumbo={0xc2, 0x4, 0xffffffff}, @generic={0x9, 0x68, "2431f457d7a67ac154b1fb85089cbef1c406e7f86ff5980805b607f4a50430e58fb83a9c2df27025f25cd486fcc3a14b8f914570e7909e1d85a6deae750b67a1e72d7f6823f737468199e049871d30d39228853306f8cdb08c62f167c28ef193cfd80150ba67665f"}, @jumbo={0xc2, 0x4, 0x2}]}}}, @tclass={{0x14, 0x29, 0x43, 0x6}}, @rthdr={{0x28, 0x29, 0x39, {0x2c, 0x2, 0x1, 0x3f, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @rthdrdstopts={{0xf0, 0x29, 0x37, {0x3b, 0x1b, '\x00', [@calipso={0x7, 0x28, {0x3, 0x8, 0x1f, 0x0, [0x5, 0x3bd, 0x100000000, 0x6]}}, @generic={0x0, 0xac, "c2912f6bb16091e2222ebb4ede32120021f2fae31cf53f70132a5fa18aee6c2e5cfac0d8ee28c87ac2d1ac9cf053d9856a729fba879284149c052c654a17001d1895988cfe85081c2d508aac9260e88a2c7f076ffa5de61a1905746892b5add821e51d98dc333668652f8d8623a6eeb5f96d62bb963157c602441564d1686baf2334126a9c665661b2ec49ac70b65672dfc9176b8760016e52b17fcddd20b411f9b70df0d876ea50d634c59c"}]}}}], 0x230}}, {{0x0, 0x0, &(0x7f0000005380)=[{&(0x7f0000005040)="79dfd663eb43bc8354dc57eeca783ccf4a3b09d786eec383b3ed40ebb8b3b933c823f72263af69f3301fc16addc81fcb23718581e15c9ed6a991c9a467e9581f27cb4649a03daf79b8c14bd5ba27c160b98217c4e923d46e682b14b6f2fe06321d83db1b425563137ec14b31d3d82a5a18cb5370f56dd0f5fa5c10e5a48e736bc887690a03e75d46e4a544f65d4b5b30b651a9559a3350aadc718b3853b0dc9365228a5e487454d55484617ee3f1e4af280dd91cd60bd27ca2f227beb2fdc91a75d9de0ac6ad71e2cebfdfd2be91cd9127e06e246d9f66f20a76aa4803ef76c2809ff032c7ea29f76b881594e74ac9", 0xef}, {&(0x7f0000005140)="2ddc12fcf45a4d3ebea2269c0a69aca5f8de2df2447c39f682bdbe4dbe58e1e905c9bfbfcab946f628e68010e9245fe8588f7d659c388f1b8f2818381bdd2a006a78bb43f8f11160f3539363fc25c3f02112e3d3c460659a24997c693a12878d2a920386fe2b87dcaaf9815ead450474e787b5f7a36343aac33970317afa56d5a42a5a62244e2df6845ec581261b80c7fd6d", 0x92}, {&(0x7f0000005200)="14553872a6072ad46ff32339bb1a2719c7a7c4fd92cdf91aec76593f07b6975a9b9d64c262e416410cfe16831b406ba20f2432b6747f04e4df934502188de936311e2ce193ec0ef789f36302a785897f1e7ebe13b95728036c4baf73f33909a49358548eab661b840e4e7f25f84ff43ab4a3fee9fd1e14cad0266bef13f72b0269c3dff36b7a4781280188d92f469322d2035c9c7173b7ba2013781b5d90c203df1e18", 0xa3}, {&(0x7f00000052c0)="a445fb8ffb4eaff13052e6e5ffd2e59af8023248b2606be70df577beef80a8658c1a09169c670c62ba088afd93a036bba858b3f25ef016d6bf0a5208dfcb7571be2df7800e4c6e76787b575183957ced2a64431d4ef807d9c355546eef616226e54c498d0649dfca7da84da51fddda8f5f49fb3b3a6dd9f9caa1d289f399b8b98f59d36e8d1e292a8b06c2c6b11bb460eb495e90da32", 0x96}], 0x4, &(0x7f00000053c0)=[@hoplimit={{0x14, 0x29, 0x34, 0x4}}, @tclass={{0x14, 0x29, 0x43, 0x6}}, @hoplimit={{0x14, 0x29, 0x34, 0x200}}, @hopopts={{0xb8, 0x29, 0x36, {0x89, 0x13, '\x00', [@pad1, @generic={0x1f, 0x64, "c3c3b47005b259b9bdf5040d2789b48004e38de25b43afea30d8dd6d6da3ca8e38057cccef02c4f2deff87c51fc9a8a45cea9da5684361f601e093a0dcb875f092e22f5a024148e201829d89fcf6b40e56c96061830d66c69a7f2e15991a27bd6efa93ba"}, @enc_lim, @calipso={0x7, 0x30, {0x3, 0xa, 0x2, 0x400, [0x8d, 0x3ff, 0x4, 0x1, 0x200]}}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}], 0x118}}, {{&(0x7f0000005500)={0xa, 0x4e22, 0xfffeffff, @loopback, 0x100}, 0x1c, &(0x7f0000008880)=[{&(0x7f0000005540)="af192db28fde0ee7c9b85a43ca71d18866cd705ff7f628af33ec1a1667d45e485615d420cdee496d8aeb8be5dbe59f3434058c2794f2ab1856", 0x39}, {&(0x7f0000005580)="73c5e0c4a85494ca2a7134", 0xb}, {&(0x7f00000055c0)="18b0f6d06de34a18882da8a97728c056826a1f9fd013fdfcbba5812451e5c64572f89d4fae01b3f41ed910b3eec1ef7afbd1d3e25737e11814ae56fbc6d03d7e8ab460cd545a048818295cd6f4aea59c868206ad94927475d692a0890c63e474c77d071bb545c0787e09d3cfcbbb58f8b1cffa34d5ddb489859e6a452c22a8e80beec698f850883ec028217a3a9e1df1c4163f9a14b2b955b772da809768a7c55df0cb5672882e888efa26f9970a45c546a6b73b5041a3f3aec140497256350aa881e02b21aca1bc7be7bb19dba1870074029b7d64", 0xd5}, {&(0x7f00000056c0)="a42f6a49fe087aa95ed8435f556c94c48b4d9c253fcd0306d8b6491e03ee2c3cde507de9609a7ab8f40f58bc52e60d881f117277175346db6578f9f10ba850231152ce7b326ac2791011c4f30e5d31262646ab43eb03007ba65d41fce089337864c25732845d2579c7a430cf8d3eedd99e728d8789f5e2c3a0eb2e20", 0x7c}, {&(0x7f0000005740)="0a16faf8c09ab86316a139dcc06b8a97819c5f47218ef0f1c7d00a2df24c8e232de621d46208d13724e7b493ec12d4657aa94f460ea116c04e514f50bd9ad8e4281a799e110c1dcd77f4055f219c964f4252ad27e8d660c908486a5691f1f2b74422a922e367929d00f5a9552900c6cf165b8a2a83ffefe7dc4e1878a8da302736bb231efc9a5cf2e685ee03d51b5c56295245a8ba9230cec62fb9bbd03f2f0a5e989effa7992079b1bbe1bed8618bb5e088b005e49dc2dd6e7e171b68f602ff3a3aafef805fe00b", 0xc8}, {&(0x7f0000005840)}, {&(0x7f0000005880)="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", 0x1000}, {&(0x7f0000006880)="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", 0x1000}, {&(0x7f0000007880)="d32dfd14557b5b1dd406735a7b2ee1402fc0111b0edca26df08b4494a2edf7a0f68156e7983a156ffb3a255fc2fa485528e67bf67c69b469fe0987f949245cc2f22ef59262e8c3d96a07c9212349fa2d4ef59eaece0257722f1bb53b3a5a2aece9d99d7af94d4742db25de2da59c2ea53fb35ba9a781e201368fe24c056bb4424c6f1439a91bd7b52e663ab937581931133fdb7d6ce82fd89d3fe5a0639cd516a5b607621a0826d0113c6f0521a4dc2e0948db37e967c85baf0df8d51359aa13d1c1e8137f7ff53358db85b851241efc85333b7c10d29a70d122dc6b59e79c91632432d19ab100b14030a536e7598eea19352664b95742b59c8c0c01216a0d0a87c265e4f4073931074700d4bd24ef0ff2e2e8b4fd5e18ed1f2523f2e265e2ee46dc2903451ee6d2b201b24f208289bb4129ce7b7b1793d546eacae94dacff813c40f3690eea920c9443a83e725ebe0cedfd625602df7f16f43c3267ac055f15a3f8e277841fe724b84f8429bc5fb05d68d8dce5b42f41e54f641fbd002773cd9be473b6e28773a3b1c0d894057d2b6dcd2c9f818c5e3888b0a4b134d24f6af04e9f2e374eda90a7ce15b529f1e60203380932d825b9111c6f4f1e2159d877a31a8a9a92a3b4923983c741d09f5123e5a62bb914eb9023b19adcbd9bd7eab1ca653ef3808f2434854aa7aa0a4acc1dc0f3fa5f37422668b7d2559818fdfd4369b7b19d32bcecc424730b51d60f70da9f4c4d547d52b88a862e2cabbbb564d7faf25a32dc026bda577cabce91edf410e342b3bc8cd4f592dde7db6ca483c95a99d5158fe24afea5859ff5072d18e022c59683c7c3cb06d19d70e00e401f39f9913aeb11b8d15dfd541d6796ae968e468ed5b513f053268dd7affce42616b400a6debfbf741fca9e3c2075c4e2b8497d9cb316dbef1f97f072ac38b921b961401d9cc3bf02695038a28f79c6d57dcd7cb9e6ec4dfd39a54cc0c38451ef841bd2ebdcd6832c266dfbec414e7dc4be887db6577533411386b6c9c86614473b54937054bb64622fc3465118d596f5f4f01bc40a40bb5f69befdd1c530470da71fe2c376fb5c7a4068f67af3425ababcda2c4cb192e98699854874316be06530b983ac613461d3fc47ece362b4e4fde0d4615c2d2dd642af9cdcab7a58172778898574077584563dd4a7d20e8c1154fd12b473cffc7a48398cb44212acf7289726eaaa88fb68bbca0537d8e471b5cb650e49ec74239f0e17ea4b1c7940597813797c8c6bffb8590f3af93fd8624c05a8a06f41d0ad3a3b8cb39fe526ea5f118eb8cab9dca77fe9d9b2a384b554762c7f776e2d1afe1ac1e2e9672cdec2e172dadde220b1c863d21d20c9041047ae0d4f34793bc3b8bb375b67524b51610c7dec3255199aca2b15c8872a6789a0fa19c467c2619df43cf1c1684bf7f6ca0a69455ee16a6339780a39f965cbe77a5938f3a9221bcca8d38233518566c91264b492337d46d64c258c3b2cbecb3c733c80b6549e2ad71b494c641ff987c01f4fbce7919fc79a20ae6667e3222652246361f39649796e67adc77ca68c7a28a7a40f51407c6b246c2e3634feb0274d6482069971c636f7dd79bb74548c6605902c6b303c093b46a600a279f141c7c747d2466d245cbf40278b8d4fa218e01a4406d0cf033a44565f8f843a31383fda2d1778f2b07e613da46a4befaa4f1465c39595667808a9182bb6eb1edf3e849374707800216cb8d5c5b9b7f8abf77901f46dc4c24fdb57fa832ddb01f9a372c01543c4c669cf092f75b94bacb8fad6a043c1b47b04845e255cf6a541f90adb71bc9f8836c118c756b137b1af86ba2850386ade54c694fff250d5f9ef2f3dc6b447d7233c10e9d4bc0a8d3913f1f5863150ba78d44ac4f3e53b7d7910ab71125c561544ac0356aa08567f172464b5e7569a320a80d65abf74cbe2ed2f73207fbc826161e97d8d2efe0df3c8bc7c72e2932ecab2c01c1d276b59b175036138ee1aea8d0d40919936691de9af3e559dbb1fde6f4bcff2996435c47ec962f675276c2c9803e383760941d1a7c910ee744bebd256af9edc5b075da65f3450268334851b8ffba4af657dccb83aced569fcb8c5eded84f27cadd7b88d1fc9f2f1ead0db4dfa16643191ab0535beb98ea1deca5c2027d17d9122abb0af5e92fd503db02b1670412bea329f5c3f1dd88fa826e99d532f7a6519e1ca8fba8355d2788bca6ffe46ba13cd0257b8ad883061417a8f28c0c4c3559129849fe82055c03d597f272c6a7fdf96ac61e7212c3fe15ca267dc66c05aa28d6dbae38060b91189309d62b0d325b3a3f22768484d163fb4daea922036f39567c4647a249a2ff47a48af55cfae81075f46f442b4a51595fce8f80e6aa6759fe058335717835092617cf0e0833f62e2196c07cce28bfb70ee709dce113cea445fef9b766f07dcc7c116c2af6dd8ef20641253e4d661d489dc8d88c5b286bf38adebab23cc5ab4bf1730c30097345aa94f3bedff441b6e6b0ad20514e21ec9199f76e80b95b9f9ebc6e0b9f874981982fbf360501afb4e3d4d64a374c1acd6ba34934bcb132a3cb8cd2dba5e0ecc2f9bd2d2b78f49717c00caf28dbfddc30809ee25fddbe6898a2905b33ba56b858b2c259b59f95833cd0ebb14f9c2e8e0e68463f4d1beddc76e38ec3713247ceef71cbb55c46b1b320f3fcbb280d5cc8e27ec47a2e4773d423d457d7b8e32694372047f3c806e085dae21e9017900104782cbcb522c30c02eb6c1070f444f23ae5278f58a618ad72fa7b54848d28a128dc0393cd9e1d3afd0bb6f916e2d1f2f732668d18eeea96937c3593aa3a9f07920990c3e8c7eac954b6535c1cba77352bfc651d1e454c80c7b99095dd250a26fe3034d42b470b27d0e7d64e0313f32ade6014c8fa8b7b9b35ecae85f11cb8b4f2336f5dd025006b04f4c75c182eabe03bc51851fb15f0305e100a5b485f2a74b92beac49a98a45ae12636eea9acddab9f328399b9a2b329aa0172b08cf105bcc3d031d4fd14c0858eb311d4c6b3f10322a0cd0b6035110dbb656175fd6d56753f75410fe85e57eef700488cb96217f1c86a2f5ee9f5a92ff6ea37ec00ca34ff62d99042d03db698e5d1dec7a6828a66a902619772d3a4d5cff1012636eecaa0f7e51e0e5af6ee1ea904031e5e5aa835e3741632b63422a21c50f70497c014d5623088d2c35081244992c3ea2e9f9789ffa27f85333cf3251abe1621eb9d91119c75ea7aa053b6b4c5d0efa864eb2d3e2d1c51dba4a81533e797e6bd57d00506e972a613c2b1f26c190258cfe22c139643e449b0830e7266884d829024a479c44c2f4ff70cbd52b5eb9a118d678858adba63b0de837a9cf601d7d6e41f0afb0f9830dc7af83a6c0ec938bde0bc1c885f3e6bffe10b0216604a6297e82efdf00bd09e4406301ce643b186e24441935e333839326e3b5152ef06c70ce7a5855ff422490911beb7b411b8a97a832fbb10fd5825abea087fd349c5c6cd800742b108650148a0d48eb1714ca38fc4977936899069a0c36aa1b8913fad00ce366bb7712862488050fdb7f6c5e0a8cebd8ae6a91c92787caada4106ff2ba163f1ce90ac022c6f34b7f638f61086ce8716209fcc06c4054310b8f139bf312564259d9c560a20a01f69b1d3024f9e810da029d2fc49500fcef2ad4895e85e95f30a7123a59fe4b832886dc7c72cdba99f4a9bd9a5b0b14c5e3c594e1a6f7c3feeb261af46ddff37ec159ea27dddd815ea080235d96fad09d70673d591eb77bebf0d74d17a92adc9d0160b6d1b5501bea016caee2bd0e8f04f2c205d4463cbd22aa37c08076f130dcd06efac44054db5b6948330ff26a5e2b2c461e15e133b5a07843577e4cd89faa90ec905520cd79b94440845d3b9220cb8d5e59c7ce6be198d31edee660ed1799911b280bfa18829ca205e5d7fdb47b132860a2dbed0fddcb998f27a5982bce558ba616336e8cde347e68c2539be63b3d2085cdbf8f711acf575d0d187b114d2604a0ec79a3db25f73ceddc37fda205366538c63ff53369318cdb50f353cc222c32f73c18228bc38c492a20b23580f69eb6f7b92e27532fd853cdbbd662bab2beca1f31e03fb5f1494d9efafdc633fcadc843ad28a05b4957dba0d192f5c15b0cc88f8dfee94443790db210b256edc6e4cee8861f568e791e344809f2a5b10dffcfc7ee638de754949a2fc29c27b2ff1814793d5ae1bec21c4c19f82c9300320eafd2070aa86c11c16240c84a640cd7b05ab15394fc494cfca8234141661fd384cd5cc395df3c9026b10802116af313fa4ea64919776be6fdf4f80428fc8d4597fea4a1bd6585b810c64a9efd27f2ea6edc88dab38fdb65dfa9aa7948a4af7149860c9de28ac86e6447eac6a61f161d83d01f29007474e8085df764efbd212a0b4641b8329e00c055093a46e2bd7b54eddad608ab0bdca103a83234e0d4fb73421d1a871a37933ca03b5cca7b43a20fe4c95a32ccd4510b34a326635b9fd134f249e673d122886b245978d09527f5be4b369d18ec83d3a4732120ed69b0a171ee6bab65f8ec10276dc7f1e364feb977f1c563a9955b50e640bab5242f7b1a30c172fea01a38621c629d6f768e27639da275ec2b25c124580298af58717540aad810108208e418334d695606fe50f623c547d23009d19d5f3a5d728978039ad0e368486a8a6d53c650452708f7925ab971de1db982f01b2530531dc9ebd5c79c7a5a6cdefa800994a9202d08b4dbc57affa8e0d36b4d6c60418325d1269437afaf9ef92a2418f6108b0e43cf62a33934536be81da6427ccb59e531dfde0d8bd0df93f00a7638ea11206b6a86cfc7103994c8eada168b516394fe4875458d90c91384b6d3d6a8f94948227f5d60fda5089a2a0f2568058bb9f8ffaa6c23614a22f04272b53a77475fed9d42d222eaa73f28e524da8c4c1ce97b3a83c8451fb1774111f643e94a4d9a33deb5b2eb6278c8f8041f27407681baf8036e016c50836f663103ea156a049e66b4a961ae5f3b2578c1962fd8965e3668967249abb05df5f28d3536bef12631fa6a1f0eb02a02b3e45da6a34b492f6f13693d549bf8c4696844e52762ef02dc88711c682df7ac77f62bad01db44cd063dcd616f6fd3ae49485b6b75b3a8dd92114a85373b1aa831fe56e812a28ffff40484126bcbefe9d133f70da5832bfb8c92a4832e07d0f8faad686da399519dcabacae4b32a7f3859c0a165cc64dffab5aa7fc4ef955bab139932aeb6474a9002a73f866f1b8128b14edce242c469c5e1c332468c2a9eb637fcc74b1dc116184a071fd222a71e5ee95d426c3f111f89bd24d804ff0be82e96419b43c2183a56823d59411052bd976a11de77f049c9e2a61471d30328610ecea50349ef6ee80f78bf87a113114fd1299124268f1ce9becbfe5a79d74865274fbb5637ca920ed766ecaf8f4f8acb5ac325e3fdc0dbae65920d82e0cc7cfe9566de556f0be98648047537c98edd6ea1858707aeb6e6f3771a6f94d360c065f774901b8c7546500717f084d3fd3ad6ea8b9a47c1727ff5564f392c8c0afe26a95baf50b18f969e512be0af6d6e04ce6d72551a466824a2e647eae7d2988feffa3801a075d11ad13f3b39cf51eb83cc0b5ab2925cd2cf3e5b1b10ea0fe81354b67c1d36f9898440341fc6f511249ab56f95caedd1c256ab2738b572a5a2eab758f3b1481c83cb63831ebb6d4d4a8c9cb1411bf76f1a6a11849ea4bdb7a20df8c532952104e0f6d583daa5beddf7657283fe1117b984", 0x1000}], 0x9, &(0x7f0000008940)=[@dstopts={{0x38, 0x29, 0x37, {0x88, 0x3, '\x00', [@enc_lim={0x4, 0x1, 0x9}, @ra={0x5, 0x2, 0x7}, @hao={0xc9, 0x10, @empty}, @enc_lim={0x4, 0x1, 0x7f}, @pad1]}}}, @dstopts={{0x18, 0x29, 0x37, {0x32}}}, @flowinfo={{0x14, 0x29, 0xb, 0x377e}}], 0x68}}], 0x9, 0x24044000) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000140)={0x2000000000000bfc, 0x9, 0x7}) [ 1674.760008] device lo entered promiscuous mode 13:22:19 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:19 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xa) 13:22:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1674.981030] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 13:22:37 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/mac80211_hwsim', 0x101, 0x4) getpeername$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x202000, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) futimesat(r3, &(0x7f0000000380)='./file1\x00', &(0x7f0000000440)={{r4, r5/1000+10000}, {r6, r7/1000+10000}}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f00000001c0)={{0x21, @rand_addr=0x64010102, 0x4e21, 0x3, 'wrr\x00', 0x4, 0x7, 0x4d}, {@broadcast, 0x4e21, 0x1, 0x7, 0x4, 0x1000}}, 0x44) write(r2, &(0x7f0000000080)="01", 0x292e9) lseek(r1, 0xffff, 0x3) 13:22:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:37 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e00}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:37 executing program 5: waitid(0x1, 0x0, &(0x7f0000000180), 0x2, &(0x7f0000000300)) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000880)='./file1\x00', 0xf43ac2ab228883d6, 0x81) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000003c0)=""/78, 0x4e, 0x800) r4 = signalfd(r1, &(0x7f0000000200)={[0x7]}, 0x8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() fsetxattr$system_posix_acl(r5, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r6}, {0x2, 0x1, r7}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x800, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_loose}, {@version_9p2000}], [{@euid_gt={'euid>', r7}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, 'trans=fd,'}}, {@measure}]}}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 13:22:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xff', 0xffffffffffffffff) 13:22:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:38 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) [ 1693.640161] FAULT_INJECTION: forcing a failure. [ 1693.640161] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.641317] CPU: 0 PID: 24878 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1693.641905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1693.642490] Call Trace: [ 1693.642682] [ 1693.642854] dump_stack_lvl+0x8f/0xb7 [ 1693.643151] should_fail_ex.cold+0x5/0xa [ 1693.643465] should_failslab+0x9/0x20 [ 1693.643755] __kmem_cache_alloc_node+0x5b/0x400 [ 1693.644109] ? __do_sys_memfd_create+0x12d/0x910 [ 1693.644469] ? __do_sys_memfd_create+0x12d/0x910 [ 1693.644832] __kmalloc+0x46/0xc0 [ 1693.645093] __do_sys_memfd_create+0x12d/0x910 [ 1693.645442] ? trace_rcu_dyntick+0x1a7/0x250 [ 1693.645783] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 1693.646184] ? syscall_enter_from_user_mode+0x21/0x50 [ 1693.646582] ? syscall_enter_from_user_mode+0x21/0x50 [ 1693.646960] do_syscall_64+0x3f/0x90 [ 1693.647247] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1693.647624] RIP: 0033:0x7fb968b78b19 [ 1693.647902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.649171] RSP: 002b:00007fb9660ede98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1693.649721] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007fb968b78b19 [ 1693.650239] RDX: 000000000000000c RSI: 0000000000000000 RDI: 00007fb968bd20fb [ 1693.650763] RBP: 0000000000000002 R08: 0000000000000006 R09: 0000000000000000 [ 1693.651290] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1693.651819] R13: 00007ffd4d9c841f R14: 0000000004000102 R15: 0000000000022000 [ 1693.652370] 13:22:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:38 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:22:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:56 executing program 5: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) shmget(0x3, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) mincore(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x110, 0xffffffffffffffff, 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0', [{0x20, '\x9f+'}], 0xa, "0e671e842431d107f90d8b556b3a9a556be56c7d91109bb47381ca323332af794de316fb87f0dc49a8ac370c65046167afcc6e9313de764b16a666efb4a030deb5842c8b130f3c7e2f5171df4a5b6dfd46087ffb9f70b33b08ed501a5c5db685fc5d9ed9c6b15fb94958044b8ccbbf6cedeb8d4da1a4a4d989872837fb26925693d28cb90c260fa2141e19a69b14ce14d5924d1ee7ff8986e3355b0196d095405bfeaa183162b365017929b8c601d10b9bc92547a13b057adb324083fe464ad73161f57e474ea5c795e1a1440a9850398a4ae5b2d973aa7394b6"}, 0xe8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x44, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) getdents(0xffffffffffffffff, &(0x7f0000001680)=""/87, 0x57) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000001, 0x40010, 0xffffffffffffffff, 0xf) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmat(r3, &(0x7f0000ff2000/0x3000)=nil, 0x2000) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x5, 0x7f, 0x2, 0x0, 0x0, 0x4, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xffffffffffffffba, 0x7, 0x0, 0x2, 0x1000a44, 0x62, 0x0, 0x7303, 0x0, 0x4b5c}, r4, 0x6, r0, 0x2) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@can, &(0x7f0000000240)=0x80, 0x80800) 13:22:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc03e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:56 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000480)={0x0, "7d3e7089ad984b532235afac4e09ed101db213534511df295fd4477cc2f8f8052f085d7a74a2a059d892660ea17358b0d38dc86a072251baf810151316d78d92", 0x26}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x2}, 0x0, 0x0, r1) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='\x00', r2) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, r1) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000380)="eb4b07961ba980c65c357a9b80", 0xd, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)=@keyring) keyctl$revoke(0x3, r1) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/164, 0xa4) add_key$keyring(&(0x7f0000000000), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) r4 = add_key(&(0x7f0000000640)='rxrpc\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0xfe, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000800)='blacklist\x00', &(0x7f0000000840)={'syz', 0x0}, &(0x7f0000000880)=',&,-)\x00', r4) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r5, 0x4004662b, &(0x7f0000000340)) 13:22:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:56 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:22:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33fe0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1712.480303] FAULT_INJECTION: forcing a failure. [ 1712.480303] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1712.482141] CPU: 1 PID: 25341 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1712.482709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1712.483269] Call Trace: [ 1712.483453] [ 1712.483621] dump_stack_lvl+0x8f/0xb7 [ 1712.483912] should_fail_ex.cold+0x5/0xa [ 1712.484211] _copy_from_user+0x2e/0x180 [ 1712.484507] __do_sys_memfd_create+0x1b0/0x910 [ 1712.484848] ? trace_rcu_dyntick+0x1a7/0x250 [ 1712.485172] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 1712.485542] ? syscall_enter_from_user_mode+0x21/0x50 [ 1712.485914] ? syscall_enter_from_user_mode+0x21/0x50 [ 1712.486293] do_syscall_64+0x3f/0x90 [ 1712.486576] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1712.486957] RIP: 0033:0x7fb968b78b19 [ 1712.487228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1712.488431] RSP: 002b:00007fb9660ede98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1712.488962] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007fb968b78b19 [ 1712.489466] RDX: 000000000000000c RSI: 0000000000000000 RDI: 00007fb968bd20fb [ 1712.489960] RBP: 0000000000000002 R08: 0000000000000006 R09: 0000000000000000 [ 1712.490471] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1712.490972] R13: 00007ffd4d9c841f R14: 0000000004000102 R15: 0000000000022000 [ 1712.491497] 13:22:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x0, 0x0) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x6, 0xc5}) r1 = openat(0xffffffffffffffff, 0x0, 0x242040, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xc2, 0x0, 0x0, 0xff, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x190, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f00000000c0)=0x3d6, 0x4) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x3, 0x3}}, './file1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x12480, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) open_tree(r0, &(0x7f0000000440)='./file0\x00', 0x1801) inotify_init1(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000540)={[0x9]}, 0x8, 0x0) syz_io_uring_setup(0x3cf8, &(0x7f0000000300)={0x0, 0x122e, 0x4, 0x1, 0x8, 0x0, r1}, &(0x7f00003fe000/0xc00000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000240), &(0x7f00000003c0)) r4 = socket$netlink(0x10, 0x3, 0x10) dup2(r4, r3) acct(0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000040)={0x1000, 0x794b3144, 0x7, 0x9}) 13:22:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:22:57 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:22:57 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(0x0, &(0x7f0000000480), 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) dup2(r1, r0) write(0xffffffffffffffff, 0x0, 0x0) 13:22:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:22:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1712.865381] FAULT_INJECTION: forcing a failure. [ 1712.865381] name failslab, interval 1, probability 0, space 0, times 0 [ 1712.867258] CPU: 1 PID: 25933 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1712.867808] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1712.868355] Call Trace: [ 1712.868536] [ 1712.868699] dump_stack_lvl+0x8f/0xb7 [ 1712.868987] should_fail_ex.cold+0x5/0xa [ 1712.869281] should_failslab+0x9/0x20 [ 1712.869557] kmem_cache_alloc_lru+0x6b/0x760 [ 1712.869872] ? shmem_alloc_inode+0x27/0x50 [ 1712.870178] ? lock_release+0x3b6/0x750 [ 1712.870464] ? alloc_fd+0x2d8/0x6e0 [ 1712.870733] shmem_alloc_inode+0x27/0x50 [ 1712.871022] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1712.871359] alloc_inode+0x63/0x240 [ 1712.871646] new_inode+0x25/0x1f0 [ 1712.871909] shmem_get_inode+0x191/0xdb0 [ 1712.872210] __shmem_file_setup+0xb8/0x320 [ 1712.872520] __do_sys_memfd_create+0x319/0x910 [ 1712.872851] ? trace_rcu_dyntick+0x1a7/0x250 [ 1712.873169] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 1712.873529] ? syscall_enter_from_user_mode+0x21/0x50 [ 1712.873892] ? syscall_enter_from_user_mode+0x21/0x50 [ 1712.874270] do_syscall_64+0x3f/0x90 [ 1712.874543] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1712.874917] RIP: 0033:0x7fb968b78b19 [ 1712.875180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1712.876414] RSP: 002b:00007fb9660ede98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1712.876943] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007fb968b78b19 [ 1712.877442] RDX: 000000000000000c RSI: 0000000000000000 RDI: 00007fb968bd20fb [ 1712.877931] RBP: 0000000000000002 R08: 0000000000000006 R09: 0000000000000000 [ 1712.878431] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1712.878919] R13: 00007ffd4d9c841f R14: 0000000004000102 R15: 0000000000022000 [ 1712.879429] 13:23:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\t', 0xffffffffffffffff) 13:23:14 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 5) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:23:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:23:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x0, 0x0) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x6, 0xc5}) r1 = openat(0xffffffffffffffff, 0x0, 0x242040, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xc2, 0x0, 0x0, 0xff, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x190, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f00000000c0)=0x3d6, 0x4) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x3, 0x3}}, './file1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x12480, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) open_tree(r0, &(0x7f0000000440)='./file0\x00', 0x1801) inotify_init1(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000540)={[0x9]}, 0x8, 0x0) syz_io_uring_setup(0x3cf8, &(0x7f0000000300)={0x0, 0x122e, 0x4, 0x1, 0x8, 0x0, r1}, &(0x7f00003fe000/0xc00000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000240), &(0x7f00000003c0)) r4 = socket$netlink(0x10, 0x3, 0x10) dup2(r4, r3) acct(0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000040)={0x1000, 0x794b3144, 0x7, 0x9}) 13:23:14 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 13:23:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:23:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xff', 0xffffffffffffffff) 13:23:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:14 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) r3 = syz_open_procfs(r2, &(0x7f0000000980)='net/ip6_flowlabel\x00') r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000940), 0x44, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f00000009c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r5, 0x0, 0x220) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000100)={0x6, 0x8, {0x95, @struct={0x400, 0x1}, 0x0, 0x9, 0x8, 0x8164, 0xa53, 0x6, 0x2, @struct={0xfffffe00, 0x1000}, 0x8, 0xffff, [0x3d, 0x7, 0x6884, 0x1000, 0x9, 0x1]}, {0x94, @usage=0x5, 0x0, 0x3, 0x5, 0x2, 0x3fc2, 0x3, 0x20, @struct={0x0, 0x5}, 0x4, 0x0, [0x20, 0x7f, 0x80000000, 0x0, 0x2, 0xe9c]}, {0x2, @usage=0x1ff, 0x0, 0x5, 0xc6, 0x5, 0xffffffff, 0x20, 0x8, @struct={0x0, 0x7fffffff}, 0xfffffffd, 0xfff, [0x66f3, 0x1f, 0x7, 0x3ff, 0x1, 0x6]}, {0x4, 0x7, 0xfffffffffffffff8}}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, 0x0, 0x220) ftruncate(r7, 0x2) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r5, 0xc400941d, &(0x7f0000000500)={r6, 0x40, 0x3b8, 0x1}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000dc0), 0x30500, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f0000000e00)=ANY=[@ANYBLOB="000000000100000018000000", @ANYRES32=r3, @ANYBLOB="01000000000000002e2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r8, 0xc0189375, &(0x7f0000000900)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000000000000002e444aeae12a617f36af2f66696c653000"]) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x97, 0x3f, 0xa2, 0xfe, 0x0, 0xfffffffffffffffb, 0x20d4, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x9}, 0x420, 0x6, 0xfff, 0x9, 0x8, 0xa4c9, 0x6, 0x0, 0x0, 0x0, 0xca}, 0xffffffffffffffff, 0xe, r9, 0x1) preadv(r3, &(0x7f0000001140), 0x0, 0x0, 0x0) 13:23:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000009c000000000000006294bead0000050000e10eef1703ee49e3234999c1396dc30000866e010000000c00000000000000dff4c769ffffffff2a", 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000dff4655fdff4655fdff4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004000400000000000000050000000c00"/64, 0x40, 0x2200}, {&(0x7f0000011600)="200000004c3e14de4c3e14de00000000dff4655f00"/32, 0x20, 0x2280}, {&(0x7f0000011700)="c041000000380000dff4655fdff4655fdff4655f00000000000002001c00000000000000000000000d0000000e0000000f0000001000000011000000120000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000dff4655f000000000000000000000000000002ea00"/192, 0xc0, 0x3400}, {&(0x7f0000011800)="ed4100003c000000e0f4655fe0f4655fe0f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c65310000000000000000000000000000000000000000000000000000003a08c6c6000000000000000000000000000000000000000000000000200000004c3e14de4c3e14de4c3e14dee0f4655f4c3e14de0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x3600}, {&(0x7f0000011900)="ed8100001a040000e0f4655fe0f4655fe0f4655f00000000000001000400000000000000010000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009fdbabda000000000000000000000000000000000000000000000000200000004c3e14de4c3e14de4c3e14dee0f4655f4c3e14de0000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="3d72fa9cbd8056108ae1"]) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) openat(r0, &(0x7f0000000680)='./file0\x00', 0x101002, 0x22) pwritev(r1, &(0x7f0000000600)=[{&(0x7f00000000c0)="80cad45921d8e30e5531169094f86ab2383a0a97e049a98fce1fd82dc7a30852654da7b61d50ab21169ff2f85eef7fcf316427b7f38810047c710d", 0x3b}, {&(0x7f0000000140)="fe83d0fe4c2820b6486bc7ec3d4cc426f12686b668d544a0c75f3706776d23aeacff02337f9ba5bb50e793ac32ca53e36b4adb61878d832231c242fc447ba4dc74c42c", 0x43}, {&(0x7f0000000300)="0be732d1ef4cf558118c7a2afd68e8dfd1019587b5f901c9b2f03d613301b964039e650b92018b0544f5ccd14ef4f0823a57222b8d90d8b0dfa5723b8cb61026e9ae9ec2cac35d8b8705052a0f2d5227a34f426d1c958ccca995a42256009cb6a3adb14255a73852c461ec9bf7431356683fe7b5bb4bf4a3178eef1f94c2869d6a36a3c6852c657c9c7088db013dec16cc0c72270c7cc940fffb070a14d202a888f2b03486d8260ffb33f0c2547a71b4cfd4385839bc02a5c1bc0f612cabe6370dc9e1cc45df61c5460cb60ca8c4b66a95ade377bfc86e", 0xd7}, {&(0x7f0000000400)="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", 0xfe}, {&(0x7f0000000500)="37d67c1ed74378bc38a8d559038e8bb183e6a3399e5d2b4aa09f5f4c311f7aad589a5dc74a0ca790a7228e4b277d5bdc1eb9a1e6f710f0858d0fb09f691adc067d0f8e4b05a6458c", 0x48}, {&(0x7f0000000580)="62eacd11821b327bda2b63246c58ace3e02261ea1f8a8f6df56a2e6bacf49d4d158fbec5c3292c1950cf976462fa747cd48e1cd0ba4654f227a1026060ba1277d0d3660879388d3e1889486666b2", 0x4e}, {&(0x7f00000001c0)="7aa6e93682", 0x5}], 0x7, 0x4, 0x8001) 13:23:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:23:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x19, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r4, 0x0, 0x0, 0x87ffffc) r5 = fcntl$getown(r4, 0x9) perf_event_open(0x0, r5, 0x0, r3, 0x8) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getuid() fsetxattr$system_posix_acl(r6, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r7}, {0x2, 0x1, r8}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) sendmsg$netlink(r0, &(0x7f0000000100)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x400000}, 0xc, &(0x7f0000000080)=[{&(0x7f0000000040)={0x24, 0x3a, 0x8, 0x70bd25, 0x25dfdbff, "", [@typed={0x4, 0x6e}, @generic="5cc6839d405b8fa79b622c268d"]}, 0x24}, {&(0x7f0000000200)={0x47c, 0x33, 0x24, 0x70bd29, 0x25dfdbfd, "", [@nested={0x1a4, 0x8, 0x0, 0x1, [@typed={0x8, 0x4, 0x0, 0x0, @fd=r1}, @generic="7cb7fb59abd3454b28767428f46bfca682c06749daf13560adc300c8e869df6465716b79817fe08edcd49ee87870fe549a82b355ee2432cc504f8d134e30fb3208e341cd8a7946f8f71c518fc5504199f22c091534e084bb0484724c5d0df1e9df109fb83d64855a6868e4c0cea4e3365259139fdd8acc357ea6d6c798f5e96003611193c9245903773691556c844faaa8f4148be975685ca11d564900cc32dc92ffa6d0837bd77dd43172dfa0544edcf53e1b06c0e1382053917a3f64dda3f16ebcd11afb2d17be34ac96869bdcb08afd95a4e6b3b15ed03b4c6f9b80092e118693ab", @typed={0x8, 0x36, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x4e, 0x0, 0x0, @uid=0xee00}, @generic="9934193cee4f93c7dc525ec1df9481d833fb865bc6859f7c66811896f7acc0244cbc5db6c45d69a6f7e056badc6e9ccb7b2ac30c0ed3b3cc144eb9bebdd62294715aa65b4526e79d210ef5517ff3493c6b7359ab76cbaee80cffe80a524da78c2267d8761024a891105a1561223dea7fd6d4e4d425d2524140e1863884c8901abe7b2d928f06a861b32e73ab40df94542521aeb67348e6d653e6ee4699", @typed={0x8, 0x4b, 0x0, 0x0, @fd=r2}]}, @nested={0xaa, 0x70, 0x0, 0x1, [@typed={0x8, 0x83, 0x0, 0x0, @pid=r5}, @generic="710b9f4c9fe0ae692493900886608ba544cc7ccb7874f54ac6ddda0fbf82f5bf1cb89690583089bbf3a0dc4c48fb2f21ef1e4f6f8a565e63c3f7529227ea395dac3d731cebd0276d16ce95d2542b1468637b2b580081b4b752ad8a20467f2419d0a7f76d740256ad7c71acaff22b5cab891645035b07c7dbe01f172d19dd3207cb20caac534e03a6b27ad8bd7a1fa9218686", @typed={0x8, 0x81, 0x0, 0x0, @uid=r8}, @typed={0x4, 0x60}]}, @generic="9eaabe7158ea59eb3ad0cce2e13eb10397", @nested={0x207, 0x62, 0x0, 0x1, [@typed={0x14, 0x51, 0x0, 0x0, @ipv6=@mcast2}, @typed={0xe0, 0x80, 0x0, 0x0, @binary="af1f701496f43ed23dc8fd1f7f2940789b7aa91e1b09ade65a919749797eb3f01dbedc1b6ef07b11a6a016b5482384fa2f599c1f591a0b99b49fd4ed0bd16a7c5e926d530a8c184c06027d4f1687e5690742196d21d372d88e486fe9a6ec9e60bc7f262187eaa9729e1583c55613eb23447c5c2a05c718d88faa08d08a2f75ddfd14fe9d518f658bf4efc09a4534ab56378878619c54fd67f91a4c71be55329a40dd99f8935786f84bcd72634784154e534c10b7147acae2d6e0428d692f44342f155ea3c8fd9cf53d51a064b42ccbf158450f87aa67f00955d295e0"}, @generic="ca0e5bdf6c43f1d703f669e44cdc93a85a855832cf1a7583aa003a9e06685c38defe42ac1c8f6dc0cb65e6c874f8dd469b9c356145a5e1dd590310427598f472d45cf7be3090779b50ea3acc39f10857deae4da859854df3e1db363001a839f2fdf509", @generic="9f4f9802316f26", @typed={0xb, 0x63, 0x0, 0x0, @str='%/-@]-\x00'}, @generic="5983db04b8a35bb25abc4fcaf5a57b450168ce257317e3b8bb0484cfe9e28698946cf1134ef971e811fd278113ef2431f79297a6f220d8d5c05d386f3596e660a856ccdd02c65600f526068215ccccf7a9d27d2a851d9c6aaf81d406be808910300bbf", @generic, @generic="66b0b341edda822ef7f3ef8946af1fdd5a00409e372505cfd832d6d2ae6c7f8e5de1850c38bd56cd8ed3265a3e69cc2364c13c52617e"]}]}, 0x47c}], 0x2, &(0x7f00000000c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x40}, 0x0) 13:23:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:31 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 6) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:23:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xff', 0xffffffffffffffff) 13:23:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = dup(0xffffffffffffffff) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0, {0xfffffffb, 0x21}}, './file0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10100, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=']p\"\xae\x06\xc40\x1a\x1a\\\x9e\x8a\x17@)#\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004I\x1c4P\x0e\xc4!\xc9\xece\x84\x85\xf2\xdb\xd3\xa7_\xe5\x95\x04\xdae\xca\xfd\xe2\xd1\xc5\x13\xf3u\xea\xc0\xb5b[\x9adH~\n\xe1\x86\x1f\xe7s\x04\xe8\xf2$\xae\xa8\xe7\xbd\x05\xb0B\xf2\x9cp\xc73\x9db\xc4\xe8EC\xbd\xc9\xf8\x0e\xd7\x1b\x11\xaf\xbf0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3010000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:23:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1747.501117] FAULT_INJECTION: forcing a failure. [ 1747.501117] name failslab, interval 1, probability 0, space 0, times 0 [ 1747.504332] CPU: 1 PID: 26472 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1747.505306] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1747.506375] Call Trace: [ 1747.506735] [ 1747.507051] dump_stack_lvl+0x8f/0xb7 [ 1747.507600] should_fail_ex.cold+0x5/0xa [ 1747.508162] ? security_inode_alloc+0x38/0x160 [ 1747.508790] should_failslab+0x9/0x20 [ 1747.509318] kmem_cache_alloc+0x5a/0x410 [ 1747.509896] security_inode_alloc+0x38/0x160 [ 1747.510502] inode_init_always+0xbb2/0xea0 [ 1747.511092] alloc_inode+0x84/0x240 [ 1747.511609] new_inode+0x25/0x1f0 [ 1747.512116] shmem_get_inode+0x191/0xdb0 [ 1747.512647] __shmem_file_setup+0xb8/0x320 [ 1747.513248] __do_sys_memfd_create+0x319/0x910 [ 1747.513889] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 1747.514606] ? syscall_enter_from_user_mode+0x2b/0x50 [ 1747.515311] do_syscall_64+0x3f/0x90 [ 1747.515841] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1747.516540] RIP: 0033:0x7fb968b78b19 [ 1747.517045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1747.519374] RSP: 002b:00007fb9660ede98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1747.520365] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007fb968b78b19 [ 1747.521290] RDX: 000000000000000c RSI: 0000000000000000 RDI: 00007fb968bd20fb [ 1747.522218] RBP: 0000000000000002 R08: 0000000000000006 R09: 0000000000000000 [ 1747.523149] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1747.524084] R13: 00007ffd4d9c841f R14: 0000000004000102 R15: 0000000000022000 [ 1747.525040] 13:23:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xfe', 0xffffffffffffffff) 13:23:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) pwritev2(r1, &(0x7f0000000040)=[{&(0x7f0000000100)="fffe0b630e264f54ba3be0b4d665999c8e98b3c0ff193535ba72a849dff555a4ad62fb6da98303b4f49787aded65e32da3ec47dc05ffe4e18f9717fa4c6b08f0c5b820c260c31e057fa48cd28cb62cce053e5dff17d5decda9ed40ae1a5439de91388c8ca2b59ab957cc803c5c47a0839dea557c228830674a5ace271c5ae8bc2bdc", 0x82}, {&(0x7f0000000300)="e6fef1ae42ac5042855980566e73ef4c48306acd6322ed291d072c1f178ce8ae0e11ebc7ac76fe12f8946d5ed665e14bfb285403635a467235064a7166de4f04930ec003702f5b740f77ab46d71ba5976fc792b4b731ebd94f140dd6d2ba873e0490a753e4f9ca2057ad407cee5c49c304f7cf71153fb3f376ae4bc3ce1dd23c6df99f1685d53b4e8dbc0964db5eae1464e6130d6dd6f58a04d017ad91f33092a1d80852af5dc794f30a953062682ca137b128302c6ff5075a252339c03f125261db6ff171048a95a137971ceaa0141aef504ec32f70970d", 0xd8}, {&(0x7f0000000400)="79ee7a267096ad1454210608bc76bf7a89941d5589bcb4bb4d36237488e516a567dad45dc0ea68e9d7150738e907385dce90ccbdf8dada99c7f53895726b0d366522bf147d355a3aa666efaf151a32731d5e944aa276e1bb8b1cdf3a0cf33a6a904379e3513b7bb89eeb3628c8b2135408c353e2a408bd36da7de824a3e8311d0b6e7374c732b723208a8fc533c7acd758c9ddc02d5741121a8fd0be64d9705d549e448d47c3d03c2853859a4b4d20c590c4a044fcd847747730403c884b0a98ecf8d2749c6bc074c8afb9210ffc8f9a0953240baaa7639a7f920900426bfb", 0xdf}], 0x3, 0x0, 0x8001, 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x5f, 0x9, 0x5, 0x20, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0x11006, 0x20445389, 0x6, 0x3, 0x101, 0x6, 0x2, 0x0, 0x40, 0x0, 0x4}, 0xffffffffffffffff, 0xc, r0, 0x1) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 13:23:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:23:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:32 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 7) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:23:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:49 executing program 4: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffff) shmget(0x3, 0xa000, 0x0, &(0x7f0000ff6000/0xa000)=nil) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) mincore(&(0x7f0000ff8000/0x2000)=nil, 0x2000, &(0x7f0000000700)=""/4096) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) shmget(0x3, 0xa000, 0x0, &(0x7f0000ff6000/0xa000)=nil) shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) 13:23:49 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 8) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:23:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xfe', 0xffffffffffffffff) 13:23:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:23:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x4, 0xf7, 0xff, 0x0, 0x4, 0x1000, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x89, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0xa008, 0x9, 0x2, 0x5, 0x6, 0x9, 0x9c, 0x0, 0x2, 0x0, 0x8}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file2\x00', 0x4042, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfe, 0x7f, 0xab, 0x8, 0x0, 0x5, 0xa040, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x3, @perf_config_ext={0x5, 0x1}, 0x0, 0x85, 0x6, 0x8, 0x1, 0x1, 0x1ff, 0x0, 0x10001, 0x0, 0x1f}, r1, 0x10, 0xffffffffffffffff, 0x1) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)='e', 0x1}], 0x1, 0x0, 0x0) 13:23:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xff', 0xffffffffffffffff) 13:23:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x100003, 0x0, 0x0, {r2}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file1\x00'}) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'wlan0\x00', 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x87ffffc) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents64(r4, &(0x7f0000000380)=""/207, 0xcf) readv(0xffffffffffffffff, &(0x7f0000000300)=[{0x0}], 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) clone3(&(0x7f00000005c0)={0x20000000, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200), {0x27}, &(0x7f0000000240)=""/15, 0xf, &(0x7f0000000480)=""/200, &(0x7f0000000580)=[0xffffffffffffffff, 0x0, r5, 0xffffffffffffffff, 0x0], 0x5, {r2}}, 0x58) 13:23:50 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0x5, 0x420, 0x7}) fcntl$dupfd(r1, 0x406, r2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000100)) 13:23:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a010000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1765.693300] FAULT_INJECTION: forcing a failure. [ 1765.693300] name failslab, interval 1, probability 0, space 0, times 0 [ 1765.695160] CPU: 0 PID: 27131 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1765.695753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1765.696339] Call Trace: [ 1765.696531] [ 1765.696706] dump_stack_lvl+0x8f/0xb7 [ 1765.697010] should_fail_ex.cold+0x5/0xa [ 1765.697316] should_failslab+0x9/0x20 [ 1765.697609] kmem_cache_alloc_lru+0x6b/0x760 [ 1765.697940] ? __d_alloc+0x31/0x9c0 [ 1765.698230] __d_alloc+0x31/0x9c0 [ 1765.698496] ? get_random_u32+0x406/0x6e0 [ 1765.698822] d_alloc_pseudo+0x1d/0x70 [ 1765.699108] alloc_file_pseudo+0xd2/0x260 [ 1765.699424] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1765.699784] ? shmem_get_inode+0x6b2/0xdb0 [ 1765.700109] __shmem_file_setup+0x144/0x320 [ 1765.700439] __do_sys_memfd_create+0x319/0x910 [ 1765.700785] ? trace_rcu_dyntick+0x1a7/0x250 [ 1765.701119] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 1765.701498] ? syscall_enter_from_user_mode+0x21/0x50 [ 1765.701874] ? syscall_enter_from_user_mode+0x21/0x50 [ 1765.702267] do_syscall_64+0x3f/0x90 [ 1765.702554] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1765.702947] RIP: 0033:0x7fb968b78b19 [ 1765.703229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1765.704519] RSP: 002b:00007fb9660ede98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1765.705070] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007fb968b78b19 [ 1765.705588] RDX: 000000000000000c RSI: 0000000000000000 RDI: 00007fb968bd20fb [ 1765.706102] RBP: 0000000000000002 R08: 0000000000000006 R09: 0000000000000000 [ 1765.706615] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1765.707149] R13: 00007ffd4d9c841f R14: 0000000004000102 R15: 0000000000022000 [ 1765.707684] 13:23:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:23:50 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 9) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:23:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) socket$inet6_tcp(0xa, 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYBLOB]) sendfile(r1, r0, 0x0, 0xfffffdef) setxattr$incfs_id(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), &(0x7f0000000280)={'0000000000000000000000000000000', 0x30}, 0x20, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r2, &(0x7f0000001f40)=[{{&(0x7f0000000080)=@in={0xa, 0x4e23, @local}, 0x88, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x14, 0x2}}], 0x18}}], 0x1, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}, 0x40000000) openat(r3, &(0x7f0000000480)='./file0\x00', 0x400480, 0x2) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000240)={0x8000, 0x800}) 13:24:06 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 10) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:24:06 executing program 5: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b]}}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) openat(r2, &(0x7f00000001c0)='./file0/file0\x00', 0x40, 0x120) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_setup(0x3a25, &(0x7f0000000080)={0x0, 0xffffffff, 0x10, 0x2, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000000300), &(0x7f0000000340)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000400)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r1, 0x0, &(0x7f0000000540)="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", 0xfff, 0xc0, 0x0, {0x0, r3}}, 0x3) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000008, 0x8010, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_setup(0x3a25, &(0x7f0000000080)={0x0, 0xffffffff, 0x10, 0x2, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000000300), &(0x7f0000000340)=0x0) syz_io_uring_submit(0x0, r8, &(0x7f0000000400)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r6, 0x0, &(0x7f0000000540)="7768a4b4a0fe852864c4321e993f078c327a04fdca253b696c5823ca801ee45b02277f4672fbfed9edd0610279464a9f5b397dc79773107a2cf47c9c978ac1e1596bfec09de0f1be09fa477fc28524488543b46b754e43188e48e86f11c4d11f922dc707ffbc10d6ed2ec6074434caa0990d4d2a951eb13f6641370ff5eff1f9981b5ad9b370498a1926906f81154ff559e5ccdfb3c3e38930039068ffaac6a38252df74e6a4c2c7e29a30d84bc93e7588d6b92f90e5aa39edaf34469d5cdb643259ddfc2010c5d15c70a54ca22ea81819c5c63ba9a10c4ecb19b35d11ab706543b20d4050ed6da98ed5a8b3450810389566b0d4b28569a4d391ce4abf3c5c0a90162ab9477d91cf6972242575ab894c5f1c6d7f72f2cd2f91641d75e4621226847465a63814e9c9e46e99f6cfd3231fe0071a1c0b572a22a2fb0cbb00e7c6f487833bd3c3e4f24bd1e98c58f025164a2bbc126cd83f4b7789944ca6117facbc9401ac85e9fea9fa0cb07bf28111baacc38c4023618b7760c47679347a02ff4aedcf725a5dcd50498967fe200067ff06d5f37505d1cc4c34fd268736518311a44da454b97bcfca869fbd0a58c3dfb9c4a2d3e64e9af9f30dc547f4ee2c0ffedc58b4e9013fa1dc37df3b15cf62d0a26a22127f8afeef74e570759542ce77483f9f1df902c4894f981dfe2503ec49114c21eb8d4cdcb640388e3276f75259f5e75fedf3022c6affd3f8f7aaf758ac8c4f4111b58482656b49625096007776cd5e7f080a12f5d9aff02a1700f67205827ecbcd25253e7c4ef2c34a9977e7750d81cbf854038f33a26c3115ea9ec27a41071ecd8375e4a34cc3882409780b97cf8eb2d070b36b5d68b03bbbb2e6e6190bdf3698fe76ab256715532f7bfc10666dbcd342d3b21e5f6564312578f27ac4a15b846a9709cd6e487d3e060495aac1485871d4b413e5c28b552f45a649bb75cb97e70110c908bee758ce872c1c1c94fe4bf269dae60aabd0e03b8b4f3922f6b098eaa6df7e20f1e04279174b0abf53c93a867ceb32fa47798e0b00e416581d6da1256bfdadc5a713809cad6724adb2ed939f015f74f19e7d22d2bf0ac2c191cf7ebe191c83e8d7a4ec832c3e48533311bea91f0ed6944836c7ba089c382e1f8fe6244544b4b402277b0ade7412a1e26ac631d80e7513ab25dcc76cfedf7ff8ada3e87ccd0688f8d776fe005faada1e85d21d4887caf27672b635ac497e2395e42faa2050e2a6388df91459319649f83f90549b3e378b94ee4c83ec254ad033854ec4ee5fdf0a498208603de179da41b829dec03e5beec0b91966ca5ef4bbc10b731484418c53313a14e97cebb7c9683260989386f9c7b1b9f3094a7aae2ed741c1d8328d3b71820c9457b5bfc93c21419d685d003d4c713a6aaa77374b71be5a9f2dfb82bdfe467b77b59337359a69c1ba467a25787c8f2eb33ea7062a0367778f66864ffa6de4ac426ac7ad36d1c06d2733a71a5c24c40e832798fca018f59e33d128a90cc5092da73c4f4a6bb0765f2e041d48083e049b45792fe1605bb32f8bb1be25ea2b53e4b40f3e63503975e00d90db7ffa7088cccf6ea9f7b856676ec7e4d3cc092f5dbfd406ccacc0f5f1f36337b53345bc5629b711154fa39bcc770a5e79c07db3da86b2971d640dc0ddb5514718f2ee12adb5b31d4adba4f31c49d7f6613523ff3b83413d6f426a8c8b4fbd448537aceabbe176cf9c63d1d0d54868f8970a311e2fc70c2384468a149b941403ace5ac9bd7e63db9d0a83a8edd7cc607ff66ceab94ee7971af0ce10cb916cc73e20e6880899cabbc5bdcf3ab6600a9bb56442d3764e8fd3b6ac323bf01b269f9416c5aa53dc5e8ceba00cf2d825858cd12263b4d0507879b72a2bbf4e23024afbd5aa4533f9739a82166a2891d18849a01ca0db0528537f2e0538f134847ce8c10321689a975b674190125e108f39e26ac5e67d115744ffcacf14bec672617e7f2a96152662579dda305dbdf85d818a97c6ae747e4d133958527f1850692a8e36cefd329d9b64e1e95fde4066d819dce141e7ae7ea23b4b37df4b6c279ee661f7d2b289971f1b9ee86ee66ff70bafade9468dee577b5f5d00032acca10659c0437ce96c60d7b4af949ce17be9ae95803638ceff51ddf477a9b49837c47065b86455b558e65ad5443cfa3c7a3182d2b50b46e6199ba9d8527a813a65cddc6993d42500cdff058f147b519f1fa00c28b9c867ddedcb2d11c9d8e843cf16f1fc0b5ce4f72ac8870b2ffd2be14794e815e20327a59eacfb64ccce056000c4bd75effbf7a479dde05c3dff80b56f78bd8ae55dc0ba0fa35ebe07e2150d3e54f3026454108832ce0999ce8f84d0a408a9af74090fe6f6a800d62c9270eb5523fb3dc36f184a8ebe3294b6377e683a5b492446708561a270d8ec68d82e63759e67a11784d0f8f02b4b9915daa354b1d3141d339ec875b865946f8869b47e357f3d4f2b011da25340f2ec60a20a4ce78411bc316c5b482704cc013685d578ef573eb3071f5529e9dabd0fc91563f3d9fc51efdbdbc695a9012a7eac4853a3053f3d671b18861581d7a306d228b79e47ba446be3048746f3ca6fd7b758e402d8d8e15c637813318b6c3ef8bec45c9131a6e3526c01c9dfa069a01e1610bb4cacd8f1af5402f9afbe2867b73a8a9d402660df493b543ecb1ab85db412da21ccb58a9f5d1efc137b1dec01dba9b7ef07d553da8fe396b7c56893368340f8ab441ed70ae4ab49a3552ae02b9b68330ca98d36ac44dde01ff35fa701a1c2bb606facbec831f55991fdfc39dc302e08ea7c83f4d84a1bdd7b5e1a57704b63e4ff521b2434928c5e34dd9c2abd3239b8b7726692f0b7e6e1af9210a0543c44b321129d50be9ff300599dd5b279bdfa866415dfc7610ba4590703989c05f847a860c02b68e2c3e7ae9e402cc82cc9671b3ec3aa10dedb406196746cfd270006e543744f5e0414af6ffde3a7db8f1f6c443a5fec877e61829c3712835950a6a2736c8455a21c9bb6c1b712c60b4ef44b105d357e2fbbb6ba9ae9034b5800ca31bbb4f30df2ca632d6054fcca2037723f6479416cb1a3591586ca01363b0dcba481fbbe2ec74fe5ecd88de29def9e66706cd9e2d906ecfce7d2ff42022654e8696da31d7e3abc9c30d58489d140034fa15370dfd85a49bd8fc603a1a15af7d422330618d177074cae2c65be1c13e13ecae8b5a36ac4d3a89b9c452b759d00e9c4baa41c9651c0c4270f3c3e5053450a63b32b5b7de684f51088620c0eae9ed28618e9d9a4377878907541f73ee4252bd2fafd22933f761662a01446b5b127a5231b897432d76ff9ec6e03f9b55fe987a201223af8511a45810ab814f873dcb5a531cd29a71b4a7570e7b620ed306929cc06673680b791e8678d675013e079eb3caec36264ab96d6cf40a07aeafe6ee2e2e95a0cad525ebd67a4a758b729f7fecb1367521a4e1e16d138b8556d7523bc9001232d550229bbe7a6a83e4c3dfdb4873bb986cbdab640ffd172ad7a79dd8f62f6adc97e4d83e7f06fa0af423ef41629c310265a77b758b9a331118da336918c014aeb7cbc06ead365f1ce4152a72227662cc47a75a98ef24ee1700b9138692cc16431434296aea436f28bd5520507c5c422c81a46187a4ea2766e35daeebcdb60956dde8c8184561bd35c5eaf2f8900c25d1846c7c20274977db06162e3616dda9df007339f46eb9bf0249a098c3e4ac323bf9bb6f10d45da989dc76221d73c09579ce10826eede77eb5ebcf338a0c23cd682af637b7986f5cd841830b9e1067b626d734386d73865b51d7801fe75c8365d995ab1670e2d65984f2436495443057343d988bf90b3185b3baebe2bc62ffc9578df619dd07daeb96e398b2248d4d47137b6878160dbd8e4ce057b341f3b27e9abcc48b0b158456c6acf89a1337a93048ce80dd0dcef83b4774c8b6eeb2387cf69b2bca1e3c351488fbdefb9279f015905cb67629151f180e396608991c6cfeee26bffeed77438c0d3cbd8a1a66b46a40b2253f3a830424417c92dbf00ffd18976e4e5c93fb0cbc9ff703fedea71b665b7dd2a706d9eb9b2f35d725cb82c11e73451d7f7b64617ca4077df13eff1662e91a610ac0185b7d6a74c6644a7e015e30bd46970c764107f1a32e21f0b9bbf5f79b22589de19ab4c83454fe5dd0c8fefa534d34d73353c5f6a7d6189a086ea7155fa6506f808d57a90b300ebee96002f1a6f140e30786939487c07e7f7dc97331630615a056dd50edd5eb3766ef79846e5d34d5e50b18c53cfbc746e26f89524970e2b062865ffae2394c7787c46e1e52ecaf614a21597d911fc60480eec46a5146bdc68998a6b9f94cdbba44063488824d071a85272d4aefb5d73effc9874995d2fffe7df4714d80302cfeecb698b7cfe82e9bcad5b7163d1baffcf4b124accf622ebd09ca5b29a1b4217621550ae8ad03d86a972ac7029ce9485db798990433a86f876abfd48a39fa27ce6e9b4243e38e7ce8aeab40c261c723b1310188583b18865edd6d3377ccdc9627b1fdde8d7a6418427fe75975bbdf638b143b79a8fe6e8d42a290f3560f974099fd463aaaa0d0cfb625cc2a17331f2d4d827e7edad10228602dcb863c7f63bb4b8aa24b319d279abdad10b3b69271e08948cda59f5ca296a1496b676a9cbd1aaea266d563e7f587529338dfe3ed269de1bcb71ba35beb78a96c7ba60d377d01836780b71cf848609bce63843c9d92feff47924d4703eac61e2843b6792a47691832b24722065a5d0a13024a38fa78cb3f3695e7e0854fc53b69c210fe8a05d29daf2c2d1b47fb2c4cf93fdee42480b0b4ef116a9a45647a027fb643d63c02f1e27a2496872bf3a65cffad4be1c7f7844135220582f508cdb66cb3d0823ff4a214c12f191fc689741a5ae92ad26ed0db74cfcd643a0b4c0b1f1b6a8388aa92042f0ed65aeced1bed08a6040c975d8c897f9814a824c501db90cf814a948bf98378cc83dcae98179934d66fd277e0ae85ab04469742cdbf7f389f47c47bebe76f3e5911cba0f2a9d66dd59d315d1172d6b4b6110deac38e45f6d3218f89ef1d355bcb1cba0d494d2b5bb1f30f3a95f8fb800130f3e97ffe5d01f1acb4721288ca65eec016bba537c0ac2a4009f274f18e4c88bb049192e80bbf9073fc2d7146f05204a4b43acd35b1105cc33fa11d510a538c74977f6205c1b5e59ff8d830ff3af4ba249aede84c7e0029ac00338c1441f1ab016d2c5a2af1245071facb12f3f670f8cdd9d56b23a3988c24c90e9deef197c5e6dbe982f4467ee4b512cc879046fcc9d9b5123ee3b7a349e36d1f72f3efbbc7a7da8d945ca258c77b8e4591845bf71ada578cb241ea893c1044ab5baeabb57954dc18c61e7677a20ae69f5476d636a9e3d411a6e602fe20f8bd805a4f728479d3b9c90e80ec79fdc8f340f5510cd3fbf1bcaebb92456bc3fd38c3a81d6bb7d949f68c0f72ad592637308f9e504386234c6291101abc0b11a46346e3f2121233945f725e3cd9091891aba6af8fa031b25d1fec86193b9ff87056ea530e28ac0a2048102545df1e8c03d0771f1fd571d444908fc8c2a090196adc956b2fff8286086c9dd8af6ba643df262b7bf52c73a3f3237387b83505269ba9f444de332c05dfae5f25315f0c5b9c235313708ca0c3f30123e4af4140bdc399374d3745360e3474fb76b8e536598db9a92264d569df5e2e05813bb9a205125d563d16c6901a205d4d9480f8573c0c92839ffec26de49374a2a23b38d160", 0xfff, 0xc0, 0x0, {0x0, r7}}, 0x3) syz_io_uring_submit(r5, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}, 0x1, 0x0, 0x1, {0x0, r7}}, 0xd6b) syz_io_uring_submit(0x0, r4, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd=r0, 0xffffffff, 0x0, 0x1, 0x4, 0x1, {0x0, r7}}, 0x5d9c) 13:24:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:24:06 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803e0000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1782.538289] FAULT_INJECTION: forcing a failure. [ 1782.538289] name failslab, interval 1, probability 0, space 0, times 0 [ 1782.540154] CPU: 1 PID: 27780 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1782.540728] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1782.541309] Call Trace: [ 1782.541500] [ 1782.541670] dump_stack_lvl+0x8f/0xb7 [ 1782.541972] should_fail_ex.cold+0x5/0xa [ 1782.542279] ? __alloc_file+0x21/0x240 [ 1782.542570] should_failslab+0x9/0x20 [ 1782.542867] kmem_cache_alloc+0x5a/0x410 [ 1782.543181] ? d_instantiate+0x79/0xa0 [ 1782.543468] __alloc_file+0x21/0x240 [ 1782.543747] alloc_empty_file+0x71/0x170 [ 1782.544057] alloc_file+0x59/0x800 [ 1782.544331] alloc_file_pseudo+0x16e/0x260 [ 1782.544645] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1782.545000] ? shmem_get_inode+0x6b2/0xdb0 [ 1782.545329] __shmem_file_setup+0x144/0x320 [ 1782.545663] __do_sys_memfd_create+0x319/0x910 [ 1782.546007] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 1782.546394] ? syscall_enter_from_user_mode+0x2b/0x50 [ 1782.546785] do_syscall_64+0x3f/0x90 [ 1782.547084] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1782.547464] RIP: 0033:0x7fb968b78b19 [ 1782.547733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1782.548997] RSP: 002b:00007fb9660ede98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1782.549556] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007fb968b78b19 [ 1782.550067] RDX: 000000000000000c RSI: 0000000000000000 RDI: 00007fb968bd20fb [ 1782.550569] RBP: 0000000000000002 R08: 0000000000000006 R09: 0000000000000000 [ 1782.551093] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1782.551605] R13: 00007ffd4d9c841f R14: 0000000004000102 R15: 0000000000022000 [ 1782.552135] 13:24:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:24:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x280000, 0x100) r1 = accept$packet(r0, &(0x7f0000000180), &(0x7f00000002c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000013c0)={'ip6gre0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x29, 0x39, 0x4, 0x8, 0x0, @mcast1, @loopback, 0x700, 0x40, 0x1ee, 0x1}}) r2 = accept4$packet(r1, 0x0, &(0x7f0000000300), 0x100000) r3 = syz_open_dev$vcsa(0x0, 0x496, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000340)={0x0, 0x0, "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", "ed7a0bb19fdd2448b417977d5017dfce3bca016320a6296fb70fa63a99cc67de03781e5432c299e608ae2027aa6fd8183ca17856a828bc14a29ee0f03460967fadd4f54a12d40a03dc0e8170f86cf233e670bd29cfa1257fa9bfb0584b736e5eafd6a62f2e87fea28f7b51cca77b61abcecc65b36f71734ea9e395527426988f792ed38e225908a495fc0ac42d12ff45b32410814f0b0e04b61d76eb269fcaf08ccc17dadc16cfa72f6a72db614086225963d33fd416b984eade889e56141d9cbe39d0ecd6b20fc09e98c5fa7f9064a5b1c93eac3b09b6d4e752a20cd829a50b1918b20fc6651268478ec324313eefe1a464aaa56490cdb5f4d7bd598fc575c4f24d6cc8d28a90ec57a80bd5096a21d60ec81de6a65eabb2293d7bf1e4a02a40232d9bbd6c92f069b0dc7153e59e57d4ebd6176a6f58035745af3e2fde1d7c91ac6d500f16b232e2f3c9dd237f7e21c9a363d265eadceb9440701c618bb169a362d490f28d7a03b4fde8e12182259ed2cb751d965b6f04398b2bf2c8ced37c81aecc309801db8ba9af5ab855389fa01a5bf318c0af3433f152774082a924bf7952eaf45f4081cf7f46ff0f738b9eefcf282f0326d1a896cbc8c81b1d7e27beaf7f47631a4463413af5d11bcfec9f369e5e807f8730667d69f6816448e58ac6911ac3872e0780fc3da339bc217ad5704d7d040e9018cfbbc984f647cff0a21f00896493b703066a4ab8e6d0cba61a8427f7098170dd3d6599a14d23385bde7c76e807b89f0b9af0a2df9f40cce6bd95bcd8d5e0b8c96436d17f02da56be41211a097527ada3e150c6acc1d74762707fd66419170f0d8f54f6ba8765b467d8d10f44ae1571430e24a0abd7ed6c796b80a56e6338b199b7eabac3a3227bede904a24beac95059f5550ce8ac529d38a7ebb8232623d9c1bdef2e47904aecb6cf1f4eef513e2a94b93710ffd3e738ee9b58a5ea1013c3016501783ef6585be7f9fd9ea6ce5f32aecf4a26471a95c398dfd28c7ce5fad38bb8b2eb1e8b248ff6842fb0cd320ea1e0390a12650145915ae5d079b52a45d7391685b35b1924e2c144c6fc1a94dfeaa6e876eb33f7d1a80f76c478635da368cdbd8b5429408427e0c3b64360c7f65723ecfd04316747a3c8bf832e4026b4f4a8c16fd7f481ab18f68cc9aed48ae5a61edccd7d6042260b94ae22c57eb31b8c3d7197449e6a1a670cd7357124d1e1ea9a9d7bac9fc55d6f1f88afdfd86195bbd0eec04edd27c9d20da4aba3d20921a44389209a9735f6081a45bdef79625438a85c4c9bbc26dc31bab438982573353a8bf3a0e2f724b3ca6ad799c2b2c1b72807804d77801c3573e9583fba7a7b03a13e041afe602018da8086ccc813c465baa2b209d65139e2649714618159ad7dfbae16626245d6e05d2f979f8ba3e5f2bed6142a5d89a683efb6195e2264a98a85590995ccb26a8db081b114ee2c1dbbb0933db33eb44f1450d0ce2644c0c777e8cc0ff78126450f71c7176214c4df4e27bda056f48595af2d2e8f509df2c854bc75a5ff1310b1a325ee66d946b3e31afe75d9a55173a71216adb4aeac2a126a1f92a8bc4f2b6f35c18191fe2c7ba541bf27ff361df9c2fdb84d9bff97e69000a055c091a0ed1ef3af90a2618379b3c2eb087a5b9f9c728bb5493b5fc665a110f819f823f95c946e3ea2398b9db13d8343cadfea5a6a5dd91ba33be6dd71c732fa372c20f94f6e89afde6afead1eb32c9c5929bfdea1839b05c4852817b3dd14beaff7bef282a4d61b0b83cd84a77d863fb99e44a9f290c3972c4ee58edce21087770d252a3071de728b0ebf4933786d8beb5a81d4c30ac574a97e4fbabd8b506980dd64fb584913ad2fa35ba329ba9a03a07ffa150c4ad505f5f6c72f47d2812f60c8b3bcf5cb260a12fe0906c8379f8ed2fa585a2d3594656ab463f3da92cec1e6ebc4d949454f218d722c1209ce7b38dc1dfde58faf96168537d45ff371fc65ac250368854166c678d1c93fbd9b85a962c59786229936e93c5951360e5f59e1c7d5f7bbe2c37d20646c01de7a802d4d69b03dc26377fb7a15d7abaf6e93271de1468b891fc8ccf8a3521bbe3f078302e9f87afe20184096548a0dd0b74057702679c35713988cb54b8174a27a0815bc1bfc937b195ed591cf441bf3f8dcb8113259813ccea55a2e6ec510984f940b1707c584a64666e4c8cacac93ac43619ac900659e2f4dbe546fa7647637e2246f21c89b3b6343baeaac19124b450a7b6491a02e140eceda7049d94816b15399157438b253c6278badd2471206daf53bcf99768c70bc5bae515167ea38f11954261ff9a2a78295d9520efb4b6ecda80b64847d39e232b9f205d2de74c983f4199ba06021989fe356e9456c86fbb071257fa4f61d8a837c5be2450159f0419295ecfba6d276b63f4d92bd412192bf1e59fc0f625ff683199387c0b14032654b0524f1c1864854c1d801a94a3ea024f40a7d9c27a98671c14c8d138b50e87837a2b60ea821960c99f4ed5f1ab48d9438a002eb53ff5ef0f879c78cb5ae2cd307b2082f11db3eb9aa8c0fe6954a3825f818f424328bfd414d015c333c878e8edf1d372d550e4fb6690e1a9cb238dfb4193e1f6eadb7b365a0b56ba2d8f15cb32d6e66fe75facd3d0af84d45282235e4d26c1096568b655ae41eb45ece4bb54e51ddea853193c8a168a2e8f946639601b62ffc23e639583c23c0ac5c34b57e0a7748457c742e9aa6e00a41654f417936bc170fa82b9be0f54253f81925fcf38f3a7a029f4a7bb05ddcb2b29d9b4097a96e7ea44bb7f4770b0b216679e012522fa6c1d7bdef30b8e18c8afbeb4e073f6985116ff742080e9c6b3e4f9ec5ee2a89dd4e90a9e5a00ba0053fe042a89eb1ce7dd5bf336e23dfb2347bfb242f38ac25970d86adff30158670b01b24f76095061579801c87da6d3b467a164508512e289e383783bbe26dfed5566694d40992f284562faec98a7f893f2462c2b40c50803564ffcf27e569495309d26fe49820da8eae818c8689c7b792bddf29a631b72f3593dc8ceea0ffdbb920ab610b61e808affc96faeadfc3165fbd12905dcc9b88361551b4cf219cabf70e7cc56e7ffa7875dbe9e5aa982d598160542abd6602ccdfc19b486a7f620870f0264f3b3cc7e8bafa03792bcb380bfc3e141a87c431b10d948e9dfe5f870ce46d3061b55eeffa3b1b5654f7d17362d3925dca50078b238310b1c018ea97e1e35473ac25b1aeabaf4ce396b76033880bf784f1ac98e044545ac16605e4da0f0fd7293c55b1f7ba7f931ce8fde5c33f2a0880dc6529d5e01b4a6b5192d02f3f0358235073b87612231bc46f3d32543f4b5269e1e5bc81daa54a64c7c05f87197e2c838d7731908920485053ce76d661b32a86881e016b289c96dda367c5436233a2947463de57bf3829c81f18ebe23cdd1563d7f889e0c715e729ebf92a862c246a49d4d93d70a4b645840f6c82874d5162a155c6cb3327e6dcda5fd077c53851cea58c4ce34ae528e057e1d3cfda4627354ee48ae07b29c6a58f450cf46c90bee5276a7e2dc5f7e0f9c864d7469baadd90b96517235957427087ca839288637d25079d1bd94e473a92c8dd5c09dfea35eb6da9991930d925a1ec3e1277be104abe95103244425ec308a6796a8cffe5306641194ea7e19e8c5750fc19b6d75fba15e3ced3a4936af17b31bd69a16c9a6d42e6e94eae325360c3b5aa0f48e2696f2ba51280a78affb0647dd2eba011cb856940a2b613673796a6e64f93d40d5711de4f8df8b31770a21ca3657dc4f089ec49e7acc591f6f5e77fad73f186eab79333aa37e18b8c751d3595e37678a3c550873d0dd129bda619b614abe4d5cbda5723c295ede7a5c1d6786950d9982f57e620e84bbe04127079057d4682c3ab9376c2965a4672e92b165d906a14c01abc4dd185852719a5fc1d32be979663e292b94a6627e511abcf332c662252a0fc09c3d14fc5031ea62e18d5eb235cbe1250da5c3aa8d650f1fbd3291b17f94a83ba4e5ed91ce474054ff341a694d8e189d44270d806682ea21ca9d2ac58cd9d29bae217e043d66ec8168ba33b4a97f1835feee0ff0c9aed59d190445a6d1a42c0fe50e41d51ab60fbdf5a71da83b7c5bf2192be959664addde6dab38fe4355713276fa2aab4a7de9322bb1d7e4635ad0403d20faa6b554bb41a01abdeeab655b6261a0d259ff4636631bf720d56430d8211e1d404b43f71b2ddee7a09d312cb378ef4ddbbe0a759103258b42bc1262d0a530a7aa54c1a15b34aaa31249622750088a8da9a8ed4373a0f1230499984aafc3f2697b65ec2a7ce5c4191421b1a1db143f56a902ce32849929c0d7c36aa27d94dc8795d9cb84df3cf0e70b7bef3270439862940c599518ac891527e280c55db429f75c9473aba6be639bbb67deb749c6774fbd5ef39b185e49d31ad2feb45f0a6eff9b4fc1d24a602b94480874477ebc94b5c8a8815dbc67f838c826ce4c8530bbce6044fa5edcfbee7f0fb3500a7aaff97e3c7e44e463c5a4e2bafa99b1cb6cd4d43617e593b39949deccad7e7a2377156b8e8e909879f14ddb755ee33a8bf1541bf1fb6477f6316962d54f90664c9078b3286cad7a6b95984d4b9ada72012595d445ba493bed9b25f0c19999616a6e6ace2176aee110b9aba57b5261d1d3c93bc53127c1a60ac4744a823b00238605cc653959788705dd802563d26e0d5f80877c7f08e1488fa100af56e55dec98fcf7ea0c51ba0cace7cd48bb74a829eca7b0c1c738738828c911631bc82f81712291424fae050e0a67928e8434ce1de0745a1db13cb00d570b900f363ffd0d74fc4783fbeb81ab342ced89467dd4566c8b62585f560e917c799989e947ba76882916a8602e8b3ab2db2f08e95d4269a8bed606fea3002e062e63cfa747d46c4d7a8d52d9747ed1151b547c93762d96af2265245b583d653693f6938246021049710096f10cb27335ecd9860b10cbeb5866bc610c8eb68a59d840d04b8fef4ba4781fc07f9037326e194dfcd425f469a2a78e6575d7ca6922b1d4699326b8bc3334690e1f306ef70926bc9420e66cd845a5220cb07d5093b5e3c421c295ff22864ece633a897e724cb52c426b68472d92c8a3a13fcef31541568ae0911e9cf83177345969b57ce6281aed16fcb412df44648b0da73bd981f3cf80a6b035d6a93120cb0420806f34a781cc68d3a0e17ba15183dc5dc77060e82513f90536b0449904edf664b9ec263d068ec06c6a0d182ab120723dd4d932f81676ea6fc7158b2f200e9465f13e188d50017da2a6fc3376bb7929a29a46c93241af9c8508bdab5344d72dccddb5f9cc2ecbbeb950938741054060dbeb6a8e6e236ce93a5b1b459b51e4f8df51731a50fd"}) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f00000018c0)={r5, 0x7}) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x387f03b0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) 13:24:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xfa, 0x3, 0x8, 0x40, 0x0, 0x6, 0x500, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x7, 0x78}, 0x2020, 0x0, 0x5, 0x7, 0x8001, 0x81, 0x1, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r0, &(0x7f0000000080)="01", 0x292e9) 13:24:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:26 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 11) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:24:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc03e0000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:24:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:26 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1000000, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='status\x00') perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x8, 0x2, 0xa6, 0x0, 0x4, 0x15550, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x2, 0x7}, 0x9, 0xffffffffffffff80, 0x8, 0x1, 0x3, 0x861b, 0x1, 0x0, 0x46af, 0x0, 0x9}, 0x0, 0xe, r0, 0x8) preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) syz_genetlink_get_family_id$fou(&(0x7f0000000300), 0xffffffffffffffff) 13:24:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:26 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000040)={0x3, 0x9}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x6) 13:24:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe03f0300}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:24:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:26 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 12) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:24:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 1802.874455] FAULT_INJECTION: forcing a failure. [ 1802.874455] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.877061] CPU: 0 PID: 28648 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1802.878033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.879035] Call Trace: [ 1802.879390] [ 1802.879694] dump_stack_lvl+0x8f/0xb7 [ 1802.880217] should_fail_ex.cold+0x5/0xa [ 1802.880762] ? security_file_alloc+0x38/0x170 [ 1802.881357] should_failslab+0x9/0x20 [ 1802.881864] kmem_cache_alloc+0x5a/0x410 [ 1802.882413] security_file_alloc+0x38/0x170 [ 1802.882983] __alloc_file+0xb6/0x240 [ 1802.883524] alloc_empty_file+0x71/0x170 [ 1802.884064] alloc_file+0x59/0x800 [ 1802.884569] alloc_file_pseudo+0x16e/0x260 [ 1802.885141] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1802.885793] ? shmem_get_inode+0x6b2/0xdb0 [ 1802.886396] __shmem_file_setup+0x144/0x320 [ 1802.887001] __do_sys_memfd_create+0x319/0x910 [ 1802.887644] ? trace_rcu_dyntick+0x1a7/0x250 [ 1802.888210] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 1802.888845] ? syscall_enter_from_user_mode+0x21/0x50 [ 1802.889491] ? syscall_enter_from_user_mode+0x21/0x50 [ 1802.890180] do_syscall_64+0x3f/0x90 [ 1802.890677] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1802.891327] RIP: 0033:0x7fb968b78b19 [ 1802.891825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.894046] RSP: 002b:00007fb9660ede98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1802.894960] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007fb968b78b19 [ 1802.895858] RDX: 000000000000000c RSI: 0000000000000000 RDI: 00007fb968bd20fb [ 1802.896749] RBP: 0000000000000002 R08: 0000000000000006 R09: 0000000000000000 [ 1802.897669] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1802.898610] R13: 00007ffd4d9c841f R14: 0000000004000102 R15: 0000000000022000 [ 1802.899582] 13:24:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xff', 0xffffffffffffffff) 13:24:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:24:42 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, &(0x7f0000000140)={"820086a68fe68c522b09feb2", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwrite64(r0, &(0x7f0000000040)="702142e2e49a8ba5fb1f3ee4f5008a3dc0d115ff96241e6037bc9fb37130bd3f751423467bf51fcaf61a5a5e2a36b59c3784db6e327266b8b50574c61bb157aea08f67251d699e2b55467cc5c4037157e39be0807948b3cc63429f518e3446cb26cb56363a0620348b90d6e94f3a45db6f75316ba7d751030f8fca87aab5ae1e4167bcf7de5103fa94a2ae9ca41f251f65da2fe85195691e7ca0abe8ac7967dca2a455b633845b6d7a13d16e6d5929620c9de357d2b5a2568f2cecaf23a42c7c5c97f02265ad68318555bed51d3e071d7a43b7b379c22395b6797841c984f71cd7d48b7315b402ea9c8b955d1e421b3a7a5e212c", 0xf4, 0x9) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000002, 0x8910, r0, 0x0) 13:24:42 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000040)={0x3, 0x9}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x6) 13:24:42 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 13) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:24:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:24:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:42 executing program 4: ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000000)={0x1, 0x6, 0x7}) syz_mount_image$tmpfs(&(0x7f0000002cc0), 0x0, 0x0, 0x1, &(0x7f0000002f40)=[{&(0x7f0000002d40)='{', 0x1}], 0x0, &(0x7f0000002fc0)) 13:24:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10c00, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) 13:24:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20860000}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100), 0x2, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x10, 0x0, 0x39b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) 13:24:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:42 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 14) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:24:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:24:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1818.337220] FAULT_INJECTION: forcing a failure. [ 1818.337220] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1818.339183] CPU: 0 PID: 29665 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1818.339761] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1818.340334] Call Trace: [ 1818.340523] [ 1818.340689] dump_stack_lvl+0x8f/0xb7 [ 1818.340978] should_fail_ex.cold+0x5/0xa [ 1818.341277] prepare_alloc_pages+0x178/0x500 [ 1818.341600] ? lock_is_held_type+0xdb/0x130 [ 1818.341908] __alloc_pages+0x149/0x500 [ 1818.342194] ? lock_release+0x3b6/0x750 [ 1818.342484] ? __pfx___alloc_pages+0x10/0x10 [ 1818.342802] ? mark_lock.part.0+0xef/0x2f70 [ 1818.343117] ? percpu_counter_add_batch+0x13f/0x1a0 [ 1818.343492] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1818.343845] vma_alloc_folio+0xe2/0x480 [ 1818.344133] shmem_alloc_folio+0x108/0x1d0 [ 1818.344448] ? __pfx_shmem_alloc_folio+0x10/0x10 [ 1818.344808] ? percpu_counter_add_batch+0x13f/0x1a0 [ 1818.345173] ? __vm_enough_memory+0x188/0x390 [ 1818.345501] shmem_get_folio_gfp.constprop.0+0x6ed/0x1670 [ 1818.345896] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 1818.346315] ? mark_held_locks+0x9e/0xe0 [ 1818.346619] shmem_write_begin+0x148/0x360 [ 1818.346921] ? __pfx_shmem_write_begin+0x10/0x10 [ 1818.347269] generic_perform_write+0x25a/0x580 [ 1818.347620] ? __pfx_generic_perform_write+0x10/0x10 [ 1818.347974] ? __pfx_file_update_time+0x10/0x10 [ 1818.348315] ? generic_write_checks+0x2c0/0x400 [ 1818.348655] __generic_file_write_iter+0x308/0x4b0 [ 1818.349006] ? trace_lock_acquire+0x14c/0x1c0 [ 1818.349329] generic_file_write_iter+0xe7/0x350 [ 1818.349675] vfs_write+0x9c7/0xd90 [ 1818.349950] ? __pfx_vfs_write+0x10/0x10 [ 1818.350272] __x64_sys_pwrite64+0x1ff/0x260 [ 1818.350590] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1818.350933] ? syscall_enter_from_user_mode+0x21/0x50 [ 1818.351300] ? syscall_enter_from_user_mode+0x21/0x50 [ 1818.351679] do_syscall_64+0x3f/0x90 [ 1818.351962] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1818.352349] RIP: 0033:0x7fb968b2bab7 [ 1818.352615] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1818.353878] RSP: 002b:00007fb9660ede70 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1818.354410] RAX: ffffffffffffffda RBX: 00007fb968bc2970 RCX: 00007fb968b2bab7 [ 1818.354889] RDX: 00000000000000e3 RSI: 00000000200001c0 RDI: 0000000000000006 [ 1818.355370] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 1818.355884] R10: 0000000002000081 R11: 0000000000000293 R12: 0000000000000006 [ 1818.356393] R13: 0000000000000006 R14: 0000000020000040 R15: 0000000000000000 [ 1818.356913] 13:24:58 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x7f', 0xffffffffffffffff) 13:24:58 executing program 4: r0 = openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) syz_emit_vhci(&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4) r1 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x81, 0x84, 0xf9, 0x9, 0x0, 0x81, 0x4a64, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7}, 0x18, 0x3, 0x0, 0x2, 0xffffffff, 0x7, 0x3ff, 0x0, 0x4, 0x0, 0xb9}, 0x0, 0x3, r1, 0xa) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) recvmmsg$unix(r3, &(0x7f0000002200)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}, {{&(0x7f0000000300), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/235, 0xeb}], 0x2, &(0x7f00000018c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x160}}, {{0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000001700)=""/228, 0xe4}, {&(0x7f0000001a40)=""/214, 0xd6}, {&(0x7f0000001b40)=""/83, 0x53}, {&(0x7f0000000380)}, {&(0x7f0000001bc0)=""/191, 0xbf}, {&(0x7f0000001800)=""/40, 0x28}, {&(0x7f0000001c80)=""/227, 0xe3}, {&(0x7f0000001d80)=""/111, 0x6f}], 0x8, &(0x7f0000001e80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f0000001f40), 0x6e, &(0x7f00000021c0)=[{&(0x7f0000001fc0)=""/213, 0xd5}, {&(0x7f00000020c0)=""/196, 0xc4}], 0x2}}], 0x4, 0x10004, &(0x7f0000002300)={0x77359400}) write(r2, &(0x7f0000000080)="01", 0x292e9) perf_event_open(&(0x7f0000000140)={0x9, 0x80, 0x3, 0x80, 0x7f, 0x81, 0x0, 0x5, 0x8406, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x5d78, 0x2, 0x6, 0xffffffff, 0x1, 0xffe0, 0x0, 0xdd58, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) 13:24:58 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 15) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:24:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:58 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x121042, 0x21) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8", 0x10}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) syz_io_uring_setup(0x400281d, &(0x7f0000000740)={0x0, 0x9aae, 0x2, 0xfffffffe, 0xce, 0x0, r2}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)="9b", 0x1}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r2, 0x542, 0x1, 0x3ff, 0x4}) 13:24:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:24:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:58 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xfe', 0xffffffffffffffff) 13:24:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:24:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:25:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1458c3, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/custom1\x00', 0x802, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x8, 0x6030) fallocate(r1, 0x8, 0xfffffffffffffffd, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r3, 0x20, 0x3000000, 0xffff77ff000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8, 0x0) 13:25:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) statx(r0, &(0x7f0000000080)='./file0\x00', 0x400, 0x400, &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf7e49a1d95947318303ae70299e26a0010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2100}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000030", 0x3d, 0x2200}, {&(0x7f0000000040)="111fc0d901000000013a0920e56647000000000006c0", 0x16, 0x18000}, {0x0, 0x0, 0x80000000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="b053ffc6b124dc444397ce20ccb525c6f6642e12e21cded5a1740b96bd5a7d791f651e5da1c5e5df19706163db827a42eafd733c069465fdb017302135889d88323561793dd6ad7b11963d5f2527f4364976cdc3c8678e692e7f364adfcaeb69838142e575987e3fd654137d35c9e7b80aced7a306f3d2f3be9bf0aa0fe872e891be2d57035cca6a29184dbe129c2e59492b19d2dc7ef19ea3e3d3c2"]) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0) r2 = open(&(0x7f00000003c0)='./file1\x00', 0x88401, 0x8) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x94, r3, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_OURS={0x78, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x66, 0x5, "54468fde6a20526d01bd30ffa1229e50dc8ee1d3133099a7e34fdd4fad8c23ca34efbd7a21bf3893b90a87449e47f81fa878237dddf38e3d3899070192592106162675e37467ada69537d0f0371fedca09633b78e0edd755c3a721cdd81f241ee4fa"}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000841}, 0x600000c1) write$binfmt_aout(r1, 0x0, 0x220) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x8010, r1, 0x3) 13:25:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x4}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:25:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:13 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 16) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:25:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x8}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:25:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:14 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400002, 0x4) 13:25:14 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 17) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:25:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x56ad, &(0x7f0000000140)={0x0, 0x10ae, 0x0, 0x2, 0x212}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000300)) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000780)={0x3, 0x80, 0x8, 0x30, 0xe1, 0x1, 0x0, 0x0, 0x8100, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2d7, 0x1, @perf_config_ext={0x1, 0x800}, 0x40810, 0xd0a1, 0xffffffff, 0x9, 0x698, 0x9, 0x2, 0x0, 0x4, 0x0, 0x7}) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x52, 0x1, &(0x7f0000000200)=[{&(0x7f00000006c0)="8298e2895b6a932c83a05e5d3dcfcd51d19e670088436619b3b8544c57677e6f0b93256c73ce6f1d8021b3ff4531635e37ba7e2914d76a870525b711c670ec2136e0e19ab03dca1b4733bf22629d249f451034f3387ef385d3e2fbf733ef93bea3d7cf5e75cbadab8503ec232be66f611f7604a45739abf94cc25f9cd4bd6cffe4c427b1794f28734e852723a4088b426b76111a842f25a6d76460eb9683", 0x9e, 0x7ff}], 0x1042c00, &(0x7f00000009c0)=ANY=[@ANYBLOB="696f63073c1d97cb6df7195b6861727365743d4b703837342c7a1e186bcfbe6f624b5f726f6c653dffffdc25", @ANYRESDEC, @ANYBLOB="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"]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r3, 0x0) mq_notify(0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80000, 0x1, {0x0, r1}}, 0x7f) syz_io_uring_setup(0x43da, &(0x7f00000003c0)={0x0, 0x0, 0x10, 0x2, 0x375}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000440), &(0x7f0000000480)) 13:25:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x11}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:25:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:29 executing program 4: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff6000/0x4000)=nil) shmat(r0, &(0x7f0000ff8000/0x1000)=nil, 0x3000) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, 0x0) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4000, &(0x7f0000000000)=0x400, 0x8a, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x293f, &(0x7f0000000180)={0x0, 0xbfe1, 0x2, 0x1, 0x15c}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000300)) 13:25:29 executing program 5: modify_ldt$read_default(0x2, &(0x7f0000000680)=""/211, 0xd3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) r1 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2d53a4ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1, {0x1aaf}}, './file1\x00'}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fed000/0xd000)=nil, &(0x7f0000fee000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000240)="bedcc1df281fd63d64ef45214a2151fed81d07a1e445c64adf7f352195c27564237bd025a7e4b043a2d57cf04e661516d73d9423b06e9ace607ba8754f49817b0b15b1a6a114caec173f12e7bc45133f5c613f75c193f9fe25ce5967876ce53e2d61bbe479ec5156fbe09ff94a5eef955ac01811bac72793273844a71a8c2171ce878f48d4a691f2d33f1712dbe1256996dc65ad839754fff74edcefc0da149816c175764c57f145820eaedaf2ddf4bd96096347251663e65686d684a596922c13c6ff79ef63252e4cb93b20c4a4d9be22e0fedbfcbf53da26f04b3a7eb781f1d120e477d94ccfd739cb1046f6f42787", 0xf0, r4}, 0x68) openat(r4, &(0x7f0000000380)='./file1\x00', 0x44400, 0x4) pwritev(r0, &(0x7f0000000680), 0x0, 0x80, 0x7) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, 0x0, 0x100000) 13:25:29 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 18) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:25:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x6e}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:25:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xc0}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:25:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:48 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:48 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 19) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:25:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/uts\x00') 13:25:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x103}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:25:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:48 executing program 5: modify_ldt$read_default(0x2, &(0x7f0000000680)=""/211, 0xd3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) r1 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2d53a4ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1, {0x1aaf}}, './file1\x00'}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fed000/0xd000)=nil, &(0x7f0000fee000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000240)="bedcc1df281fd63d64ef45214a2151fed81d07a1e445c64adf7f352195c27564237bd025a7e4b043a2d57cf04e661516d73d9423b06e9ace607ba8754f49817b0b15b1a6a114caec173f12e7bc45133f5c613f75c193f9fe25ce5967876ce53e2d61bbe479ec5156fbe09ff94a5eef955ac01811bac72793273844a71a8c2171ce878f48d4a691f2d33f1712dbe1256996dc65ad839754fff74edcefc0da149816c175764c57f145820eaedaf2ddf4bd96096347251663e65686d684a596922c13c6ff79ef63252e4cb93b20c4a4d9be22e0fedbfcbf53da26f04b3a7eb781f1d120e477d94ccfd739cb1046f6f42787", 0xf0, r4}, 0x68) openat(r4, &(0x7f0000000380)='./file1\x00', 0x44400, 0x4) pwritev(r0, &(0x7f0000000680), 0x0, 0x80, 0x7) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, 0x0, 0x100000) 13:25:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:48 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 20) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:25:48 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:25:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x14a}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:25:48 executing program 4: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getpid() sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xc4, 0x464, 0x1, 0x70bd26, 0x25dfdbfe, "2ddb55a51fbea57a45af9ff46cc87c8d5f604e83f8a3234c7f2a19cfdb76a859978533216978f8f1c36b1c778b96ff58a7c8923a0c448b93835ff1a45cea6c4ab81b9991e3017f83bab81c2c495cf18b7d38e3e3601eda804b9dfb367cf11aea8011cdb1f6aae1be90f2782a436c2b79614e485206d19ee55733fff18e49695bf9f143d40cd3124b9c5683caee517e9d5b0efa39124c8a4d7444ae0aacc7aa67be8de237d4fabd02a8e086fff974a54e580b6686", ["", ""]}, 0xc4}, 0x1, 0x0, 0x0, 0x4801}, 0x44000) 13:26:07 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 21) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:26:07 executing program 4: mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x6000) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000180)=0xe65) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) r3 = semget$private(0x0, 0x0, 0x0) semop(0x0, 0x0, 0x0) semtimedop(r3, &(0x7f0000000000)=[{0x1, 0x4, 0x800}, {0x0, 0x9, 0x800}, {0x4, 0x81, 0x800}, {0x4, 0x7, 0x1000}, {0x0, 0x3, 0x1000}, {0x4, 0x5, 0x1800}, {0x4, 0x40, 0x800}, {0x3, 0x1}], 0x8, &(0x7f0000000100)) 13:26:07 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x301}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:26:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:08 executing program 5: syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_CHANNEL={0x5}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) 13:26:08 executing program 5: chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400020, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7690}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xfffffdef) statx(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x4000, 0x8, &(0x7f0000000180)) r1 = accept4$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0x1c, 0x800) r2 = openat$cgroup_pressure(r0, &(0x7f0000000440)='memory.pressure\x00', 0x2, 0x0) dup2(r1, r2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./file1\x00', 0x40580, 0x12) openat2(r3, &(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)={0x373802, 0x20, 0x11}, 0x18) sendmmsg(0xffffffffffffffff, &(0x7f000000af40)=[{{0x0, 0x0, &(0x7f0000002e80)=[{0x0}], 0x1}}], 0x1, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000480)=""/21, 0x15) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r4, 0x2) 13:26:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x1100}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:26:08 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 22) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:26:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:08 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x840, 0x0) poll(&(0x7f00000000c0)=[{r0, 0x1140}, {r0, 0xa000}], 0x2, 0x8) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x800, 0x54b, 0x0, 0x6, 0x7ff, 0x4}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x105000, 0x0) 13:26:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x3e80}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:26:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1903.976253] FAULT_INJECTION: forcing a failure. [ 1903.976253] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1903.978164] CPU: 0 PID: 32246 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1903.978945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1903.979728] Call Trace: [ 1903.979985] [ 1903.980217] dump_stack_lvl+0x8f/0xb7 [ 1903.980632] should_fail_ex.cold+0x5/0xa [ 1903.981051] prepare_alloc_pages+0x178/0x500 [ 1903.981497] ? lock_is_held_type+0xdb/0x130 [ 1903.981944] __alloc_pages+0x149/0x500 [ 1903.982357] ? lock_release+0x3b6/0x750 [ 1903.982764] ? __pfx___alloc_pages+0x10/0x10 [ 1903.983207] ? mark_lock.part.0+0xef/0x2f70 [ 1903.983654] ? percpu_counter_add_batch+0x13f/0x1a0 [ 1903.984156] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1903.984681] vma_alloc_folio+0xe2/0x480 [ 1903.985074] shmem_alloc_folio+0x108/0x1d0 [ 1903.985486] ? __pfx_shmem_alloc_folio+0x10/0x10 [ 1903.985973] ? percpu_counter_add_batch+0x13f/0x1a0 [ 1903.986467] ? __vm_enough_memory+0x188/0x390 [ 1903.986923] shmem_get_folio_gfp.constprop.0+0x6ed/0x1670 [ 1903.987476] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 1903.988071] shmem_write_begin+0x148/0x360 [ 1903.988489] ? __pfx_shmem_write_begin+0x10/0x10 [ 1903.988975] generic_perform_write+0x25a/0x580 [ 1903.989442] ? __pfx_generic_perform_write+0x10/0x10 [ 1903.989938] ? __pfx_file_update_time+0x10/0x10 [ 1903.990413] ? generic_write_checks+0x2c0/0x400 [ 1903.990882] __generic_file_write_iter+0x308/0x4b0 [ 1903.991365] ? trace_lock_acquire+0x14c/0x1c0 [ 1903.991824] generic_file_write_iter+0xe7/0x350 [ 1903.992296] vfs_write+0x9c7/0xd90 [ 1903.992681] ? __pfx_vfs_write+0x10/0x10 [ 1903.993127] __x64_sys_pwrite64+0x1ff/0x260 [ 1903.993555] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1903.994027] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1903.994511] do_syscall_64+0x3f/0x90 [ 1903.994902] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1903.995413] RIP: 0033:0x7fb968b2bab7 [ 1903.995776] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1903.997480] RSP: 002b:00007fb9660ede70 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1903.998208] RAX: ffffffffffffffda RBX: 00007fb968bc2970 RCX: 00007fb968b2bab7 [ 1903.998882] RDX: 0000000000000023 RSI: 0000000020000000 RDI: 0000000000000006 [ 1903.999554] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 1904.000230] R10: 0000000000000006 R11: 0000000000000293 R12: 0000000000000006 [ 1904.000919] R13: 0000000000000006 R14: 0000000020000058 R15: 0000000000000001 [ 1904.001620] 13:26:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r1, 0x407, 0x10001) pwritev(r0, &(0x7f0000001600)=[{&(0x7f0000000180)="6c5619c4270beda14453a28fbb576b0099b87a920756919373b764fe8e1d503334b1e54c6be590cd3b017371f46471d370d4bd45a74b6087fa1543ff56c09bcb40c22123b7324147cc7579bfe3d141c5c4c99ee76d07e388c7c87f9a1ed3231d85d884393359a886bee9cb66e46c83484fea40fb328e6584efee2493fbddc25aeef561d08e906f05eaf9d08c3290fbbaf6e461875f242a40c7786055ca56875dfd9ae57214fb2396caa2e2a5582802ee4b3b83a5b8094e0af45dd1830235c752b361dd27b131311b7de23552ec206f65d194574ed59431d4abee1d66640c395ccc41d9549f758c4b429ee58c6aac61e526", 0xf1}, {&(0x7f0000000280)="632d6a9c94f1e995a90130be65d9e2413bbfdd323ec4374ec721dab383d7d720c40544064a4c419a1a883c384bbe82f5ff60febb74aa8cc2a8d05d9ec5b57c289e2d26c8a21b1668bc623d87e6fe58c3e5fe3f39765ee590d8e82505b5995a7db9f8d5b6f2b1c79050cc34559e9e250d07d9", 0x72}, {&(0x7f0000000300)="0ee491c50972870ff57d696ff684d1e8994f3cff59e71eb7056e530d6470033f8cfe55c042", 0x25}, {&(0x7f0000000340)="f8666819defe4a26d47dfb28e951b8de602cadb7b9119e1b42d98efea22cbfecca05c28c3b59bede38e32bdc214ed35f6bf869b1a472080d1ee0b55398b9a13cf8596e3e0f5298b1fdd03aba23b76222fd090f2e5d3f10a31db7f46a0752b714f4f9e2ecb8064b4987d8330d0d5aa132502c92d6ed11fabc20493e9e6bc219714a1de8f9f4ee761589dfb8d9d5be6f18446202f69ebff050a5dd3b88dafefa47b20b79e5ef95a267eec8aed619b214368b51ff2c7c34367962ca5b96d2e78f6b2dc47251be319dead4a399aaabda915cce5e8189a79a1a09954083e8bccdcd0d19302c63986c94288a0d73af153ca639f541e84f00c4c0d25c", 0xf9}, {&(0x7f0000000440)="712c58f3744b169f6dec6b19828b55165c0d06a81a1c1d9a5a25cac0a09360cc69af15827d4899b49a42d8669addf86222c0b1977104391b35c118a8aa9ec7975f6a9dbda0672bf7172861f731b2dc9316f3a7969ec8e7feae143c92818903cab6deae4783856833589e07890472824bf1644f52f9660dde104fd0ed2b2d305b0ffca6dcb6f5e49b24f806578da44b7466bd757b4e71cf192b106b594bdccbd8", 0xa0}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="8fd5bd69263e274a50af018b31733164e58d379862dfc1834dd367cfd8b7444b804f83d8a242ef1fc102fec4516b2ddd3130b991cbc98e9124282e58f6f89ac4ded77959634b83faa8acd68be712114c4aa5780c25b75449f1f85168a644d0fe51ce0ca76a9d5642dd52d565f76785e0c1797438e5a2629187e7c9c8f1bf69711c604f63b1e25d537db2df1286f0c562d1947a15168159102eba55a79bdf8b96d46780cf8b9ed6484364f0411776608911cfbbdada8f76bc430cfaab8d3c42cf805a4860b19ba0a8ee295eec0c9731176ec6dc08845f002e9237ccd5cea36cb00a", 0xe1}], 0x7, 0xffffffff, 0xffffff73) 13:26:24 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 23) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:26:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x3ec0}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:26:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 5: epoll_create(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5d3c) close(r0) 13:26:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x3, &(0x7f0000000080)=""/43, 0x2b) syslog(0x0, &(0x7f0000000140)=""/124, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 13:26:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x4a01}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:26:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2803}, {&(0x7f0000000300)="a45db3780faca2fa6775b9d34e40ffec7a5e2ace09608ca822ac951768e1af752914f6df855f06e7be22d8726f437a189a629e9b1fec42b05704ede509e492103474db391335a82c2c5d7c1b950a94ce98137000f4d0da277d7ba7703b3d00d925664e1d79bea3be10a42594984f9aa76b0c07b06d350869613364917096e0d1b5dab730be5eef5b4c6cec23a585686d51bfa7efa052e7abe2ede4ef4a598b3c75f416b8763e057d57", 0xa9, 0x1}], 0x410, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) openat(r0, &(0x7f0000000200)='./file2\x00', 0x101000, 0x15a) lgetxattr(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="2b2147ea260000000000f8d100"/22], &(0x7f00000001c0)=""/39, 0x27) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0xec465000) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) write$bt_hci(0xffffffffffffffff, 0x0, 0x13) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 13:26:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:24 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 24) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:26:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1920.205209] FAULT_INJECTION: forcing a failure. [ 1920.205209] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1920.207207] CPU: 0 PID: 33173 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1920.207796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1920.208429] Call Trace: [ 1920.208626] [ 1920.208819] dump_stack_lvl+0x8f/0xb7 [ 1920.209145] should_fail_ex.cold+0x5/0xa [ 1920.209474] prepare_alloc_pages+0x178/0x500 [ 1920.209815] ? lock_is_held_type+0xdb/0x130 [ 1920.210137] __alloc_pages+0x149/0x500 [ 1920.210450] ? lock_release+0x3b6/0x750 [ 1920.210761] ? __pfx___alloc_pages+0x10/0x10 [ 1920.211086] ? mark_lock.part.0+0xef/0x2f70 [ 1920.211431] ? percpu_counter_add_batch+0x13f/0x1a0 [ 1920.211806] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1920.212178] vma_alloc_folio+0xe2/0x480 [ 1920.212494] shmem_alloc_folio+0x108/0x1d0 [ 1920.212827] ? __pfx_shmem_alloc_folio+0x10/0x10 [ 1920.213202] ? percpu_counter_add_batch+0x13f/0x1a0 [ 1920.213601] ? __vm_enough_memory+0x188/0x390 [ 1920.213938] shmem_get_folio_gfp.constprop.0+0x6ed/0x1670 [ 1920.214356] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 1920.214818] shmem_write_begin+0x148/0x360 [ 1920.215147] ? __pfx_shmem_write_begin+0x10/0x10 [ 1920.215531] generic_perform_write+0x25a/0x580 [ 1920.215916] ? __pfx_generic_perform_write+0x10/0x10 [ 1920.216285] ? __pfx_file_update_time+0x10/0x10 [ 1920.216626] ? generic_write_checks+0x2c0/0x400 [ 1920.216995] __generic_file_write_iter+0x308/0x4b0 [ 1920.217367] ? trace_lock_acquire+0x14c/0x1c0 [ 1920.217714] generic_file_write_iter+0xe7/0x350 [ 1920.218051] vfs_write+0x9c7/0xd90 [ 1920.218344] ? __pfx_vfs_write+0x10/0x10 [ 1920.218703] __x64_sys_pwrite64+0x1ff/0x260 [ 1920.219033] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1920.219417] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1920.219796] do_syscall_64+0x3f/0x90 [ 1920.220081] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1920.220481] RIP: 0033:0x7fb968b2bab7 [ 1920.220774] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1920.222036] RSP: 002b:00007fb9660ede70 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1920.222579] RAX: ffffffffffffffda RBX: 00007fb968bc2970 RCX: 00007fb968b2bab7 [ 1920.223108] RDX: 0000000000000023 RSI: 0000000020000000 RDI: 0000000000000006 [ 1920.223638] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 1920.224166] R10: 0000000000000006 R11: 0000000000000293 R12: 0000000000000006 [ 1920.224687] R13: 0000000000000006 R14: 0000000020000058 R15: 0000000000000001 [ 1920.225268] 13:26:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2, 0x9881, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x818, 0x1000, 0xfffff801, 0x8, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) 13:26:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x6e00}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:26:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)='\"', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x480200, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x17) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r3, r2, 0x0, 0xfffffdef) 13:26:40 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 25) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:26:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x803e}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:26:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:41 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 26) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:26:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xc000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:26:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000100)=0x4) r1 = socket$packet(0x11, 0x2, 0x300) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x80, 0x6, @multicast}, 0x14) syz_emit_ethernet(0x131, &(0x7f0000000240)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "b051f3", 0xfb, 0x11, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, {[@fragment={0x2b, 0x0, 0x3, 0x1, 0x0, 0x0, 0x68}, @fragment={0xc, 0x0, 0x7b, 0x1, 0x0, 0x4, 0x66}, @hopopts={0x3b, 0x1, '\x00', [@pad1, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x6}]}, @fragment={0x2c, 0x0, 0x7, 0x1, 0x0, 0x0, 0x68}, @srh={0x0, 0xe, 0x4, 0x7, 0x56, 0x40, 0x7, [@empty, @private2, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, @dev={0xfe, 0x80, '\x00', 0xd}, @loopback]}, @fragment={0x67, 0x0, 0x1, 0x1, 0x0, 0x0, 0x65}, @fragment={0x87, 0x0, 0x74, 0x0, 0x0, 0x2, 0x67}], {0x4e24, 0x4e23, 0x43, 0x0, @gue={{0x2, 0x1, 0x1, 0xff}, "aabce85250284befe6919e8a8d3cc29231362b12df3f4c2fb2e91b97e8b16cf7c57b435af621a930705c018d3b7a79b6ad8264"}}}}}}}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x8000, 0xffffff7f, 0xffff}, 0xc) 13:26:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 27) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:26:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x518d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2280c250}, 0x0, 0x3, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:59 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) syncfs(0xffffffffffffffff) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x541c, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x1b4b, 0x0, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff5000/0xb000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x200000, 0x0, 0x5}, 0x0, 0x10, 0xffffffffffffffff, 0xa) mincore(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000240)=0x1) r3 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000300)={0x10, 0x2, {0x2, @usage=0x4, 0x0, 0xbac, 0x1, 0x3f, 0xf969, 0x7, 0x4b0, @struct={0xfffffffb, 0x1f}, 0x1d80, 0x83, [0x195, 0x5, 0x9, 0x80000000000, 0xffffffff, 0x846]}, {0x0, @struct={0x9, 0xffffd6b7}, 0x0, 0x0, 0x3e, 0x1f, 0x1f, 0x3, 0x470, @usage=0x6, 0x800, 0x2e, [0x6, 0x7, 0x4000000100000001, 0x0, 0x3, 0x8]}, {0x75c, @usage=0x401, 0x0, 0xfffffffffffff800, 0x100000001, 0x5, 0x2, 0x22, 0x411, @struct={0x8, 0x401}, 0x20, 0x4, [0x0, 0x2, 0xf3, 0xf9, 0x8, 0x3]}, {0x8, 0x3ff, 0x3}}) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mmap(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x27000000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) [ 1955.164411] FAULT_INJECTION: forcing a failure. [ 1955.164411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1955.165820] CPU: 0 PID: 34186 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1955.166407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1955.166968] Call Trace: [ 1955.167151] [ 1955.167325] dump_stack_lvl+0x8f/0xb7 [ 1955.167624] should_fail_ex.cold+0x5/0xa [ 1955.167926] copyin+0x19/0x120 [ 1955.168174] copy_page_from_iter_atomic+0x276/0x1280 [ 1955.168556] ? mark_held_locks+0x9e/0xe0 [ 1955.168864] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 1955.169273] ? shmem_write_begin+0x15f/0x360 [ 1955.169598] ? __pfx_shmem_write_begin+0x10/0x10 [ 1955.169953] generic_perform_write+0x2cf/0x580 [ 1955.170291] ? __pfx_generic_perform_write+0x10/0x10 [ 1955.170663] ? __pfx_file_update_time+0x10/0x10 [ 1955.171010] ? generic_write_checks+0x2c0/0x400 [ 1955.171349] __generic_file_write_iter+0x308/0x4b0 [ 1955.171706] ? trace_lock_acquire+0x14c/0x1c0 [ 1955.172039] generic_file_write_iter+0xe7/0x350 [ 1955.172380] vfs_write+0x9c7/0xd90 [ 1955.172658] ? __pfx_vfs_write+0x10/0x10 [ 1955.172983] __x64_sys_pwrite64+0x1ff/0x260 [ 1955.173299] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1955.173652] ? syscall_enter_from_user_mode+0x21/0x50 [ 1955.174031] ? syscall_enter_from_user_mode+0x21/0x50 [ 1955.174416] do_syscall_64+0x3f/0x90 [ 1955.174703] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1955.175085] RIP: 0033:0x7fb968b2bab7 [ 1955.175362] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1955.176625] RSP: 002b:00007fb9660ede70 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1955.177168] RAX: ffffffffffffffda RBX: 00007fb968bc2970 RCX: 00007fb968b2bab7 [ 1955.177684] RDX: 0000000000000023 RSI: 0000000020000000 RDI: 0000000000000006 [ 1955.178193] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 1955.178702] R10: 0000000000000006 R11: 0000000000000293 R12: 0000000000000006 [ 1955.179208] R13: 0000000000000006 R14: 0000000020000058 R15: 0000000000000001 [ 1955.179729] 13:26:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) sched_getparam(0x0, &(0x7f0000000080)) r3 = open_tree(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x800) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) sendmmsg$unix(r4, &(0x7f00000005c0), 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x7, 0x8, 0x5, 0x48, 0x0, 0x9, 0x8a00, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x1000, 0x9, 0x8, 0x0, 0x8, 0x5, 0x200, 0x0, 0x40}, 0x0, 0x6, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000001c0)={0x6, 0x80, 0x61, 0xff, 0x5, 0x20, 0x0, 0x4, 0x40000, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x100, 0x6}, 0x1014, 0x8, 0x3a6, 0x7, 0x2, 0xb9a, 0x8, 0x0, 0x100, 0x0, 0x22}, 0x0, 0x8000004, r3, 0x9) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e010072e0df31fcb79599e7ffb3d0f1b611508418baccecacd3ae8745b80325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a8499650148098352ab51489b0e5ff75aa5a8cf819b1faf684d78db136cf64f922cc81c253ca184e99de21f3d2ae4648e0dd8640af6ca1d78fd1e5339274b605f85590e77dde4a5653efc2b35b079a1681152140e22b0e8e14d43ab14ef31d200a4677b34ba834e5692646c0fec502a6d19f26482a0a42e7600e4212dc4f36cd19624fc0c00", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) 13:26:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) close(r0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xc03e}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:26:59 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 28) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:26:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:26:59 executing program 5: pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) write$binfmt_aout(r0, &(0x7f0000000e40)={{0xcc, 0x4, 0x20, 0x177, 0x2a5, 0x859, 0x178, 0x20}, "ac08fc6c2acaaf324c8d554b5a980a8fa9fae16a74977274adeb"}, 0x3a) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000080)={"844386f2dcf72852faae4a55a934fa8f", 0x0, 0x0, {0x0, 0x9}, {0x81, 0x2800000}, 0x2, [0x10001, 0x40, 0x81, 0xffff, 0x36d5, 0x9a5, 0x4, 0x101, 0x5, 0x6, 0x400000000000, 0x5, 0xfffffffffffffff8, 0x2f9a, 0x6, 0x8]}) clone3(&(0x7f0000000dc0)={0x200003200, 0x0, 0x0, &(0x7f0000000000), {}, &(0x7f0000000040)=""/54, 0x36, 0x0}, 0x58) 13:26:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)=@keyring) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)="bd23e3f871d05b9de3081207db9628d8674357d1b7dac5e0d5980d55b45e323d14e047469a45bce9cd49fe21c9fb32c77fd0d34ad27cd661ff7914bb12b80bd3aaab2092b45bb315d33a08966c46de0efe922d8c75e361026149df4ec5a3bcb1b9b43fdf8aefee1f2c70", 0x6a, r0) 13:26:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:00 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 29) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) [ 1955.642181] FAULT_INJECTION: forcing a failure. [ 1955.642181] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1955.644097] CPU: 0 PID: 34786 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1955.644656] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1955.645212] Call Trace: [ 1955.645397] [ 1955.645567] dump_stack_lvl+0x8f/0xb7 [ 1955.645865] should_fail_ex.cold+0x5/0xa [ 1955.646176] copyin+0x19/0x120 [ 1955.646416] copy_page_from_iter_atomic+0x276/0x1280 [ 1955.646782] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1955.647187] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 1955.647582] ? shmem_write_begin+0x15f/0x360 [ 1955.647909] ? __pfx_shmem_write_begin+0x10/0x10 [ 1955.648262] generic_perform_write+0x2cf/0x580 [ 1955.648602] ? __pfx_generic_perform_write+0x10/0x10 [ 1955.648969] ? __pfx_file_update_time+0x10/0x10 [ 1955.649317] ? generic_write_checks+0x2c0/0x400 [ 1955.649654] __generic_file_write_iter+0x308/0x4b0 [ 1955.650003] ? trace_lock_acquire+0x14c/0x1c0 [ 1955.650328] generic_file_write_iter+0xe7/0x350 [ 1955.650664] vfs_write+0x9c7/0xd90 [ 1955.650937] ? __pfx_vfs_write+0x10/0x10 [ 1955.651272] __x64_sys_pwrite64+0x1ff/0x260 [ 1955.651597] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1955.651959] ? syscall_enter_from_user_mode+0x21/0x50 [ 1955.652331] ? syscall_enter_from_user_mode+0x21/0x50 [ 1955.652732] do_syscall_64+0x3f/0x90 [ 1955.653007] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1955.653414] RIP: 0033:0x7fb968b2bab7 [ 1955.653692] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1955.654980] RSP: 002b:00007fb9660ede70 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1955.655542] RAX: ffffffffffffffda RBX: 00007fb968bc2970 RCX: 00007fb968b2bab7 [ 1955.656051] RDX: 0000000000000023 RSI: 0000000020000000 RDI: 0000000000000006 [ 1955.656592] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 1955.657093] R10: 0000000000000006 R11: 0000000000000293 R12: 0000000000000006 [ 1955.657576] R13: 0000000000000006 R14: 0000000020000058 R15: 0000000000000001 [ 1955.658119] 13:27:15 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) sched_getparam(0x0, &(0x7f0000000080)) r3 = open_tree(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x800) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) sendmmsg$unix(r4, &(0x7f00000005c0), 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x7, 0x8, 0x5, 0x48, 0x0, 0x9, 0x8a00, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x1000, 0x9, 0x8, 0x0, 0x8, 0x5, 0x200, 0x0, 0x40}, 0x0, 0x6, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000001c0)={0x6, 0x80, 0x61, 0xff, 0x5, 0x20, 0x0, 0x4, 0x40000, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x100, 0x6}, 0x1014, 0x8, 0x3a6, 0x7, 0x2, 0xb9a, 0x8, 0x0, 0x100, 0x0, 0x22}, 0x0, 0x8000004, r3, 0x9) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e010072e0df31fcb79599e7ffb3d0f1b611508418baccecacd3ae8745b80325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a8499650148098352ab51489b0e5ff75aa5a8cf819b1faf684d78db136cf64f922cc81c253ca184e99de21f3d2ae4648e0dd8640af6ca1d78fd1e5339274b605f85590e77dde4a5653efc2b35b079a1681152140e22b0e8e14d43ab14ef31d200a4677b34ba834e5692646c0fec502a6d19f26482a0a42e7600e4212dc4f36cd19624fc0c00", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) 13:27:15 executing program 2: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123163500, &(0x7f00000000c0), 0x0, 0x0, {0x1c}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xff', 0xffffffffffffffff) 13:27:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x33fe0}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:27:15 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x1f, 0x1, 0x9, 0xef, 0x0, 0x401, 0x100, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000001280), 0xa}, 0x1020, 0xfffffffffffffffb, 0x401, 0xa, 0x5, 0x0, 0x3, 0x0, 0x3, 0x0, 0x1}, r2, 0x1, 0xffffffffffffffff, 0x2) keyctl$read(0xb, 0x0, &(0x7f00000000c0)=""/24, 0x18) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x3, 0x8, 0x6, 0x1, 0x0, 0xfffffffffffff548, 0x2a10, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp, 0x0, 0x9, 0x80000001, 0x8, 0x2, 0x1200, 0x5, 0x0, 0x1, 0x0, 0xfffffffeffffffff}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)=@keyring) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000100)={r3, 0x1000, 0xb5}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'blake2s-128-x86\x00'}}, &(0x7f00000001c0)="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", &(0x7f00000011c0)="7862ec698a6702e2fed4309d3b33688793f31f155b714c970f9335a52e7d852df0bcecf7daf3bcc2593d34fe11255e8649841d944355cc6cb229e39739d9d40636135435fb117fa7e33c41496ef4ed8572cd32b935d8f11cc4ad50f6e802ca8af9ad8974165fdc1b733dadf42b412342a3956022b78d96ee99d34e5464e6b03d47a140f1fe7906cb57ffc765a5c82059bdb00b3316bdfdbda0777b49d61c859b2901fc81779968ecbff2a301e0d05777c1a41c65df") 13:27:15 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 30) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:27:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000000)='./file0\x00', 0x280000, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x11, r1, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0xa0202, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='sessionid\x00') openat(r2, &(0x7f00000001c0)='./file0\x00', 0x40000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_setup(0x6991, &(0x7f0000000340)={0x0, 0x1, 0x0, 0x1}) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000600), 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000300)='./file2\x00', 0x9001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendfile(r3, r1, 0x0, 0xfffffdef) 13:27:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x9, 0x5f, 0x0, 0x8, 0x80000, 0xd, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x10080, 0x32f0, 0x5, 0x7, 0xb40, 0x10000, 0xe4, 0x0, 0x1, 0x0, 0x2}, r0, 0x9, 0xffffffffffffffff, 0x3) 13:27:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x34000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:27:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1970.871297] FAULT_INJECTION: forcing a failure. [ 1970.871297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1970.872407] CPU: 1 PID: 34930 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1970.872987] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1970.873568] Call Trace: [ 1970.873758] [ 1970.873930] dump_stack_lvl+0x8f/0xb7 [ 1970.874225] should_fail_ex.cold+0x5/0xa [ 1970.874532] strncpy_from_user+0x38/0x3e0 [ 1970.874850] getname_flags.part.0+0x95/0x4f0 [ 1970.875177] ? vfs_write+0x492/0xd90 [ 1970.875468] getname+0x92/0xe0 [ 1970.875717] do_sys_openat2+0xf9/0x4c0 [ 1970.876022] ? __pfx_do_sys_openat2+0x10/0x10 [ 1970.876357] ? syscall_enter_from_user_mode+0x21/0x50 [ 1970.876739] __x64_sys_openat+0x143/0x200 [ 1970.877051] ? __pfx___x64_sys_openat+0x10/0x10 [ 1970.877416] ? trace_rcu_dyntick+0x1a7/0x250 [ 1970.877751] ? syscall_enter_from_user_mode+0x21/0x50 [ 1970.878141] ? syscall_enter_from_user_mode+0x21/0x50 [ 1970.878524] do_syscall_64+0x3f/0x90 [ 1970.878809] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1970.879192] RIP: 0033:0x7fb968b2ba04 [ 1970.879462] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1970.880716] RSP: 002b:00007fb9660ede20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1970.881257] RAX: ffffffffffffffda RBX: 00007fb968bc2970 RCX: 00007fb968b2ba04 [ 1970.881774] RDX: 0000000000000002 RSI: 00007fb9660edf40 RDI: 00000000ffffff9c [ 1970.882274] RBP: 00007fb9660edf40 R08: 0000000000000000 R09: 0000000000000000 [ 1970.882774] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1970.883279] R13: 0000000000000006 R14: 0000000020000070 R15: 0000000000000002 [ 1970.883798] 13:27:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000040)={0x1, 0x7, 0x7fff, 0x9bf}, 0x10) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x11, r2, 0x0) 13:27:15 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 31) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:27:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x40000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:27:15 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r2}, {0x2, 0x1, r3}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)=0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0xa}, [{0x2, 0x6}, {0x2, 0x1}, {}], {}, [{0x8, 0x2, r5}, {0x8, 0x4}, {0x8, 0x2, r5}, {0x8, 0x1, r5}, {0x8, 0x2, r5}, {0x8, 0x4}, {0x8, 0x0, r5}, {0x8, 0x5, r5}, {0x8, 0x7, r5}], {0x10, 0x7}, {0x20, 0x4}}, 0x84, 0x2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0xa}, [{0x2, 0x6}, {0x2, 0x1}, {}], {}, [{0x8, 0x2, r6}, {0x8, 0x4}, {0x8, 0x2, r6}, {0x8, 0x1, r6}, {0x8, 0x2, r6}, {0x8, 0x4}, {0x8, 0x0, r6}, {0x8, 0x5, r6}, {0x8, 0x7, r6}], {0x10, 0x7}, {0x20, 0x4}}, 0x84, 0x2) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000180)={{}, {0x1, 0x3}, [{0x2, 0x2, 0xee01}, {0x2, 0x4, r3}, {0x2, 0x1}, {0x2, 0x5, r4}], {0x4, 0x5}, [{0x8, 0x6, 0xee00}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x2, r5}, {0x8, 0x1}, {0x8, 0x1, 0xee01}, {0x8, 0x4, r6}, {0x8, 0x1, 0xee01}, {0x8, 0x7}], {0x10, 0x5}, {0x20, 0x2}}, 0x84, 0x3) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x420c, 0x4}, 0x0, 0x0, r0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x109840, 0x0) open_by_handle_at(r7, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0xb}}, 0x0) [ 1971.164111] FAULT_INJECTION: forcing a failure. [ 1971.164111] name failslab, interval 1, probability 0, space 0, times 0 [ 1971.165809] CPU: 1 PID: 35341 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1971.166404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1971.166975] Call Trace: [ 1971.167169] [ 1971.167341] dump_stack_lvl+0x8f/0xb7 [ 1971.167639] should_fail_ex.cold+0x5/0xa [ 1971.167941] ? __alloc_file+0x21/0x240 [ 1971.168232] should_failslab+0x9/0x20 [ 1971.168522] kmem_cache_alloc+0x5a/0x410 [ 1971.168830] __alloc_file+0x21/0x240 [ 1971.169110] alloc_empty_file+0x71/0x170 [ 1971.169429] path_openat+0xd4/0x29b0 [ 1971.169716] ? mark_held_locks+0x9e/0xe0 [ 1971.170024] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1971.170427] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1971.170832] ? __pfx_path_openat+0x10/0x10 [ 1971.171146] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1971.171558] do_filp_open+0x1ba/0x410 [ 1971.171850] ? __pfx_do_filp_open+0x10/0x10 [ 1971.172176] ? find_held_lock+0x2c/0x110 [ 1971.172479] ? lock_release+0x3b6/0x750 [ 1971.172784] ? do_raw_spin_lock+0x125/0x270 [ 1971.173112] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 1971.173492] ? _raw_spin_unlock+0x28/0x50 [ 1971.173796] ? alloc_fd+0x2d8/0x6e0 [ 1971.174082] do_sys_openat2+0x171/0x4c0 [ 1971.174383] ? __pfx_do_sys_openat2+0x10/0x10 [ 1971.174725] ? syscall_enter_from_user_mode+0x21/0x50 [ 1971.175116] __x64_sys_openat+0x143/0x200 [ 1971.175428] ? __pfx___x64_sys_openat+0x10/0x10 [ 1971.175772] ? trace_rcu_dyntick+0x1a7/0x250 [ 1971.176108] ? syscall_enter_from_user_mode+0x21/0x50 [ 1971.176495] ? syscall_enter_from_user_mode+0x21/0x50 [ 1971.176877] do_syscall_64+0x3f/0x90 [ 1971.177167] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1971.177555] RIP: 0033:0x7fb968b2ba04 [ 1971.177827] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1971.179101] RSP: 002b:00007fb9660ede20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1971.179644] RAX: ffffffffffffffda RBX: 00007fb968bc2970 RCX: 00007fb968b2ba04 [ 1971.180149] RDX: 0000000000000002 RSI: 00007fb9660edf40 RDI: 00000000ffffff9c [ 1971.180654] RBP: 00007fb9660edf40 R08: 0000000000000000 R09: 0000000000000000 [ 1971.181159] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1971.181680] R13: 0000000000000006 R14: 0000000020000070 R15: 0000000000000002 [ 1971.182200] 13:27:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100), 0x0, r0) r1 = add_key(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="d744ab3de11ddcd06571ce71650c4131f2cb04f5f42c4b2d4dc37e5ea87c7d98ec3ffe2d3dc2e76eada2ee5a2a2d480f44f42cc8a0838b014b81eafd4c1a3cff94fd4002e4ce066a", 0x48, r0) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='%{!,[,\x00', r1) 13:27:15 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:27:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:15 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 33) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) [ 1971.666373] FAULT_INJECTION: forcing a failure. [ 1971.666373] name failslab, interval 1, probability 0, space 0, times 0 [ 1971.669399] CPU: 0 PID: 35614 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 1971.670462] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1971.671524] Call Trace: [ 1971.671878] [ 1971.672192] dump_stack_lvl+0x8f/0xb7 [ 1971.672744] should_fail_ex.cold+0x5/0xa [ 1971.673303] ? security_file_alloc+0x38/0x170 [ 1971.673948] should_failslab+0x9/0x20 [ 1971.674481] kmem_cache_alloc+0x5a/0x410 [ 1971.675051] security_file_alloc+0x38/0x170 [ 1971.675641] __alloc_file+0xb6/0x240 [ 1971.676160] alloc_empty_file+0x71/0x170 [ 1971.676721] path_openat+0xd4/0x29b0 [ 1971.677249] ? perf_trace_lock_acquire+0xfd/0x530 [ 1971.677920] ? __pfx_path_openat+0x10/0x10 [ 1971.678499] ? perf_trace_lock_acquire+0xfd/0x530 [ 1971.679163] do_filp_open+0x1ba/0x410 [ 1971.679696] ? __pfx_do_filp_open+0x10/0x10 [ 1971.680292] ? find_held_lock+0x2c/0x110 [ 1971.680846] ? lock_release+0x3b6/0x750 [ 1971.681412] ? do_raw_spin_lock+0x125/0x270 [ 1971.682009] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 1971.682660] ? _raw_spin_unlock+0x28/0x50 [ 1971.683221] ? alloc_fd+0x2d8/0x6e0 [ 1971.683732] do_sys_openat2+0x171/0x4c0 [ 1971.684287] ? lockdep_hardirqs_on+0x7d/0x100 [ 1971.684910] ? __pfx_do_sys_openat2+0x10/0x10 [ 1971.685549] ? __x64_sys_openat+0x1a9/0x200 [ 1971.686144] __x64_sys_openat+0x143/0x200 [ 1971.686709] ? __pfx___x64_sys_openat+0x10/0x10 [ 1971.687357] ? syscall_enter_from_user_mode+0x2b/0x50 [ 1971.688063] do_syscall_64+0x3f/0x90 [ 1971.688597] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1971.689291] RIP: 0033:0x7fb968b2ba04 [ 1971.689786] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1971.692087] RSP: 002b:00007fb9660ede20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1971.693066] RAX: ffffffffffffffda RBX: 00007fb968bc2970 RCX: 00007fb968b2ba04 [ 1971.693995] RDX: 0000000000000002 RSI: 00007fb9660edf40 RDI: 00000000ffffff9c [ 1971.694912] RBP: 00007fb9660edf40 R08: 0000000000000000 R09: 0000000000000000 [ 1971.695832] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1971.696751] R13: 0000000000000006 R14: 0000000020000070 R15: 0000000000000002 [ 1971.697728] 13:27:32 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 34) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:27:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x80000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:27:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x7f', 0xffffffffffffffff) 13:27:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) close(r2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x7, 0x28, 0x1, 0x0, 0x3, 0x40, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x95fba0853128d56e, 0x3, 0x8, 0x2, 0x5, 0x0, 0xa5fa, 0x0, 0x7, 0x0, 0x80000000}, r1, 0xa, r0, 0x9) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:32 executing program 4: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6261727269fba3dae578303030303030303030303030302c6e6f6f727069642c7265737569643df000c36fd34169a46da072f4ff7423f23cd66adfcf9be8f42c553a64096036a890bf89713f119b4cc8e76e3cc9bb5daeb50b4b59edb9144452987d01f00d739bbcd0e44681a0ae01067b094ce1f2e7cc6dd850cfb022b345683e0451b050aa58df7f2b6c43ca2f22bdc56256745e2f38f86ff3da83882aff1e27189c67", @ANYRESHEX=0x0, @ANYBLOB=',stripe=0x0000000000000000,dax,\x00']) 13:27:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) clone3(&(0x7f0000000100)={0x233c5480, &(0x7f00000000c0), 0x0, 0x0, {0x3e}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891a, &(0x7f0000000240)={'macvlan0\x00', @ifru_flags}) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x29, 0x3, 0x7f, 0x6, 0x60, @empty, @mcast1, 0x0, 0x7, 0x40, 0x5}}) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x4e) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x20028, &(0x7f00000002c0)={'trans=unix,', {[{@privport}, {@loose}, {@posixacl}, {@cachetag={'cachetag', 0x3d, 'version=9p2000.L'}}], [{@obj_role}, {@euid_eq}, {@smackfsfloor={'smackfsfloor', 0x3d, '}\''}}, {@euid_gt}]}}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="2c775babf1156630de4a9c5eef58c705c0f9c7efc809ad24fc76d3ea5d6ea25efca6037ea06d797d1ecbd9737667056abd74f6feb9a1ea792a97b54a46f19f6f0e14521fde78a06b8faa885137f988bb981fc7f7a501490dde11c37d981bbab3b9c7d9ac8a7baa26092b11008705", @ANYRESHEX=r3, @ANYBLOB=',version=9p2000.L,version=9p2000.u,version=9p2000.L,\x00']) umount2(&(0x7f0000000180)='./file0\x00', 0x1) [ 1987.743289] ext4: Unknown parameter 'barriû£Úåx0000000000000' [ 1987.746911] ext4: Unknown parameter 'barriû£Úåx0000000000000' 13:27:32 executing program 4: io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x7fff}, 0x500, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x44, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000040)={r0, 0xb58a, 0x100000001, 0x2}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$CDROMREADTOCENTRY(r3, 0x125d, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xff, 0x7, 0x9, 0x3f, 0x0, 0x4, 0x80001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x4, 0x80}, 0x208, 0x0, 0x1, 0x0, 0x0, 0x2, 0x400, 0x0, 0x3ff, 0x0, 0x2}, 0x0, 0x3, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r4, 0x0, 0x0, 0x87ffffc) openat(r4, &(0x7f00000001c0)='./file1\x00', 0x400000, 0x102) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x181c00, 0x0) 13:27:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x400300}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:27:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\xfe', 0xffffffffffffffff) 13:27:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000007c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000000000000000000000600000008000300da915237382bc2dfff010000a8909eb26d33d362ea5114e618e5021204440be2549e555a0473dc508dd18e4743ae3b21750b352e4b98c39304af3e298e514806e5e6a20c496c0bdc87a8080709b3c96d5ed5e9479097500fe42ba21a877c544e1a8accb0cba340016baa51c98e3b121d0435bcf950d42d4c3bb799074ea3faf6d7b2c8f17fd8f0bf01c9de5d80ae26ed", @ANYRES32=0x0, @ANYBLOB="0500530000000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x50, r1, 0x4, 0x70bd29, 0x7, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_USE_MFP={0x8, 0x42, 0x1}, @NL80211_ATTR_PREV_BSSID={0xa, 0x4f, @random="890fa4764159"}, @crypto_settings=[@NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x1}], @NL80211_ATTR_VHT_CAPABILITY={0x10, 0x9d, {0x2, {0x0, 0x0, 0x5, 0x200}}}, @NL80211_ATTR_USE_RRM={0x4}, @NL80211_ATTR_IE={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}, 0x18292}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c000000505a1e7a010d75f7304ba92e279c8d269704c79b79bc32b59357bee15379bf3efeccdb3d6ee9e2a3df04e6b1e28520eac9c84eefa0e1f274f54893a05a35461237fac7296f924857c24eec5a0e571be75463d67cb51f9209000000000000001cfa6c1b6d2c14907727030c234d09dc12fe6660bf6adc16d1af4c958d345e307e097e9b", @ANYRES16=r1, @ANYBLOB="010000000000000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="e4e2146e261091a9fb24565c78bae5c0f46e87ee7c5c5a12178d036c221541389a29abb2ae694dfa078b05c76d26cbeae72ce7d356e79a48417948ad3fd14e631830826161672c0e60b5ad91e59eb129205b508fc8d9eed3efed17198466c2ebcf060d78768b51ba3c1bc2f75957ed5cf9de28ab3b4e540b09a41c3e466a006dd591d45f4c734c05d966a347b4354f5abbd9666e87441675"], 0x1c}, 0x1, 0x0, 0x0, 0x24040050}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x3f5, 0x200, 0x70bd26, 0x25dfdbfe, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000800}, 0xd0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x10000027f) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) r5 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', &(0x7f0000000480)={0x101000, 0x0, 0x3}, 0x18) openat(r5, &(0x7f00000004c0)='./file1/file0\x00', 0x200, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 1988.019674] 9pnet_fd: Insufficient options for proto=fd 13:27:49 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 35) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:27:49 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x0, r1, 0x8) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x8, 0x8, 0x40, 0x6, 0x0, 0x7, 0x638b, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x9}, 0x4508, 0x0, 0x9, 0x9, 0x40000000000, 0x1000, 0x1, 0x0, 0x101, 0x0, 0xc67}, r3, 0x1, r0, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x1000000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:27:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x80, 0x8, 0xff, 0x0, 0x0, 0x40032, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x6, 0x3, 0x4, 0x800, 0x7f, 0x80, 0x0, 0x2, 0x0, 0x8}, 0xffffffffffffffff, 0x10, r0, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000140)='.log\x00', 0x10000, 0x10) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="e8040000", @ANYRES16=0x0, @ANYBLOB="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"], 0x4e8}}, 0x1) 13:27:49 executing program 4: openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r0, &(0x7f0000000080)="01", 0x292e9) getpgrp(0x0) fork() fork() ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000640)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file1\x00'}) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x8, 0x3, 0xcb, 0xf6, 0x0, 0x9, 0x4, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffff8, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x880, 0x4, 0x1, 0x3, 0x10001, 0x4, 0x4, 0x0, 0x461, 0x0, 0xff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) socket$nl_generic(0x10, 0x3, 0x10) 13:27:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x60, 0x6, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_open(r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) syz_io_uring_setup(0x28f6, &(0x7f0000000100)={0x0, 0xd122, 0x8, 0x1, 0xa5, 0x0, r2}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000180)) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000240), 0xfffffffffffffffc) 13:27:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0xfffffffffffffd82) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) read(0xffffffffffffffff, &(0x7f0000000100)=""/158, 0x55) 13:27:50 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000008, 0x8010, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_setup(0x3a25, &(0x7f0000000080)={0x0, 0xffffffff, 0x10, 0x2, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000000300), &(0x7f0000000340)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000400)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r2, 0x0, &(0x7f0000000540)="7768a4b4a0fe852864c4321e993f078c327a04fdca253b696c5823ca801ee45b02277f4672fbfed9edd0610279464a9f5b397dc79773107a2cf47c9c978ac1e1596bfec09de0f1be09fa477fc28524488543b46b754e43188e48e86f11c4d11f922dc707ffbc10d6ed2ec6074434caa0990d4d2a951eb13f6641370ff5eff1f9981b5ad9b370498a1926906f81154ff559e5ccdfb3c3e38930039068ffaac6a38252df74e6a4c2c7e29a30d84bc93e7588d6b92f90e5aa39edaf34469d5cdb643259ddfc2010c5d15c70a54ca22ea81819c5c63ba9a10c4ecb19b35d11ab706543b20d4050ed6da98ed5a8b3450810389566b0d4b28569a4d391ce4abf3c5c0a90162ab9477d91cf6972242575ab894c5f1c6d7f72f2cd2f91641d75e4621226847465a63814e9c9e46e99f6cfd3231fe0071a1c0b572a22a2fb0cbb00e7c6f487833bd3c3e4f24bd1e98c58f025164a2bbc126cd83f4b7789944ca6117facbc9401ac85e9fea9fa0cb07bf28111baacc38c4023618b7760c47679347a02ff4aedcf725a5dcd50498967fe200067ff06d5f37505d1cc4c34fd268736518311a44da454b97bcfca869fbd0a58c3dfb9c4a2d3e64e9af9f30dc547f4ee2c0ffedc58b4e9013fa1dc37df3b15cf62d0a26a22127f8afeef74e570759542ce77483f9f1df902c4894f981dfe2503ec49114c21eb8d4cdcb640388e3276f75259f5e75fedf3022c6affd3f8f7aaf758ac8c4f4111b58482656b49625096007776cd5e7f080a12f5d9aff02a1700f67205827ecbcd25253e7c4ef2c34a9977e7750d81cbf854038f33a26c3115ea9ec27a41071ecd8375e4a34cc3882409780b97cf8eb2d070b36b5d68b03bbbb2e6e6190bdf3698fe76ab256715532f7bfc10666dbcd342d3b21e5f6564312578f27ac4a15b846a9709cd6e487d3e060495aac1485871d4b413e5c28b552f45a649bb75cb97e70110c908bee758ce872c1c1c94fe4bf269dae60aabd0e03b8b4f3922f6b098eaa6df7e20f1e04279174b0abf53c93a867ceb32fa47798e0b00e416581d6da1256bfdadc5a713809cad6724adb2ed939f015f74f19e7d22d2bf0ac2c191cf7ebe191c83e8d7a4ec832c3e48533311bea91f0ed6944836c7ba089c382e1f8fe6244544b4b402277b0ade7412a1e26ac631d80e7513ab25dcc76cfedf7ff8ada3e87ccd0688f8d776fe005faada1e85d21d4887caf27672b635ac497e2395e42faa2050e2a6388df91459319649f83f90549b3e378b94ee4c83ec254ad033854ec4ee5fdf0a498208603de179da41b829dec03e5beec0b91966ca5ef4bbc10b731484418c53313a14e97cebb7c9683260989386f9c7b1b9f3094a7aae2ed741c1d8328d3b71820c9457b5bfc93c21419d685d003d4c713a6aaa77374b71be5a9f2dfb82bdfe467b77b59337359a69c1ba467a25787c8f2eb33ea7062a0367778f66864ffa6de4ac426ac7ad36d1c06d2733a71a5c24c40e832798fca018f59e33d128a90cc5092da73c4f4a6bb0765f2e041d48083e049b45792fe1605bb32f8bb1be25ea2b53e4b40f3e63503975e00d90db7ffa7088cccf6ea9f7b856676ec7e4d3cc092f5dbfd406ccacc0f5f1f36337b53345bc5629b711154fa39bcc770a5e79c07db3da86b2971d640dc0ddb5514718f2ee12adb5b31d4adba4f31c49d7f6613523ff3b83413d6f426a8c8b4fbd448537aceabbe176cf9c63d1d0d54868f8970a311e2fc70c2384468a149b941403ace5ac9bd7e63db9d0a83a8edd7cc607ff66ceab94ee7971af0ce10cb916cc73e20e6880899cabbc5bdcf3ab6600a9bb56442d3764e8fd3b6ac323bf01b269f9416c5aa53dc5e8ceba00cf2d825858cd12263b4d0507879b72a2bbf4e23024afbd5aa4533f9739a82166a2891d18849a01ca0db0528537f2e0538f134847ce8c10321689a975b674190125e108f39e26ac5e67d115744ffcacf14bec672617e7f2a96152662579dda305dbdf85d818a97c6ae747e4d133958527f1850692a8e36cefd329d9b64e1e95fde4066d819dce141e7ae7ea23b4b37df4b6c279ee661f7d2b289971f1b9ee86ee66ff70bafade9468dee577b5f5d00032acca10659c0437ce96c60d7b4af949ce17be9ae95803638ceff51ddf477a9b49837c47065b86455b558e65ad5443cfa3c7a3182d2b50b46e6199ba9d8527a813a65cddc6993d42500cdff058f147b519f1fa00c28b9c867ddedcb2d11c9d8e843cf16f1fc0b5ce4f72ac8870b2ffd2be14794e815e20327a59eacfb64ccce056000c4bd75effbf7a479dde05c3dff80b56f78bd8ae55dc0ba0fa35ebe07e2150d3e54f3026454108832ce0999ce8f84d0a408a9af74090fe6f6a800d62c9270eb5523fb3dc36f184a8ebe3294b6377e683a5b492446708561a270d8ec68d82e63759e67a11784d0f8f02b4b9915daa354b1d3141d339ec875b865946f8869b47e357f3d4f2b011da25340f2ec60a20a4ce78411bc316c5b482704cc013685d578ef573eb3071f5529e9dabd0fc91563f3d9fc51efdbdbc695a9012a7eac4853a3053f3d671b18861581d7a306d228b79e47ba446be3048746f3ca6fd7b758e402d8d8e15c637813318b6c3ef8bec45c9131a6e3526c01c9dfa069a01e1610bb4cacd8f1af5402f9afbe2867b73a8a9d402660df493b543ecb1ab85db412da21ccb58a9f5d1efc137b1dec01dba9b7ef07d553da8fe396b7c56893368340f8ab441ed70ae4ab49a3552ae02b9b68330ca98d36ac44dde01ff35fa701a1c2bb606facbec831f55991fdfc39dc302e08ea7c83f4d84a1bdd7b5e1a57704b63e4ff521b2434928c5e34dd9c2abd3239b8b7726692f0b7e6e1af9210a0543c44b321129d50be9ff300599dd5b279bdfa866415dfc7610ba4590703989c05f847a860c02b68e2c3e7ae9e402cc82cc9671b3ec3aa10dedb406196746cfd270006e543744f5e0414af6ffde3a7db8f1f6c443a5fec877e61829c3712835950a6a2736c8455a21c9bb6c1b712c60b4ef44b105d357e2fbbb6ba9ae9034b5800ca31bbb4f30df2ca632d6054fcca2037723f6479416cb1a3591586ca01363b0dcba481fbbe2ec74fe5ecd88de29def9e66706cd9e2d906ecfce7d2ff42022654e8696da31d7e3abc9c30d58489d140034fa15370dfd85a49bd8fc603a1a15af7d422330618d177074cae2c65be1c13e13ecae8b5a36ac4d3a89b9c452b759d00e9c4baa41c9651c0c4270f3c3e5053450a63b32b5b7de684f51088620c0eae9ed28618e9d9a4377878907541f73ee4252bd2fafd22933f761662a01446b5b127a5231b897432d76ff9ec6e03f9b55fe987a201223af8511a45810ab814f873dcb5a531cd29a71b4a7570e7b620ed306929cc06673680b791e8678d675013e079eb3caec36264ab96d6cf40a07aeafe6ee2e2e95a0cad525ebd67a4a758b729f7fecb1367521a4e1e16d138b8556d7523bc9001232d550229bbe7a6a83e4c3dfdb4873bb986cbdab640ffd172ad7a79dd8f62f6adc97e4d83e7f06fa0af423ef41629c310265a77b758b9a331118da336918c014aeb7cbc06ead365f1ce4152a72227662cc47a75a98ef24ee1700b9138692cc16431434296aea436f28bd5520507c5c422c81a46187a4ea2766e35daeebcdb60956dde8c8184561bd35c5eaf2f8900c25d1846c7c20274977db06162e3616dda9df007339f46eb9bf0249a098c3e4ac323bf9bb6f10d45da989dc76221d73c09579ce10826eede77eb5ebcf338a0c23cd682af637b7986f5cd841830b9e1067b626d734386d73865b51d7801fe75c8365d995ab1670e2d65984f2436495443057343d988bf90b3185b3baebe2bc62ffc9578df619dd07daeb96e398b2248d4d47137b6878160dbd8e4ce057b341f3b27e9abcc48b0b158456c6acf89a1337a93048ce80dd0dcef83b4774c8b6eeb2387cf69b2bca1e3c351488fbdefb9279f015905cb67629151f180e396608991c6cfeee26bffeed77438c0d3cbd8a1a66b46a40b2253f3a830424417c92dbf00ffd18976e4e5c93fb0cbc9ff703fedea71b665b7dd2a706d9eb9b2f35d725cb82c11e73451d7f7b64617ca4077df13eff1662e91a610ac0185b7d6a74c6644a7e015e30bd46970c764107f1a32e21f0b9bbf5f79b22589de19ab4c83454fe5dd0c8fefa534d34d73353c5f6a7d6189a086ea7155fa6506f808d57a90b300ebee96002f1a6f140e30786939487c07e7f7dc97331630615a056dd50edd5eb3766ef79846e5d34d5e50b18c53cfbc746e26f89524970e2b062865ffae2394c7787c46e1e52ecaf614a21597d911fc60480eec46a5146bdc68998a6b9f94cdbba44063488824d071a85272d4aefb5d73effc9874995d2fffe7df4714d80302cfeecb698b7cfe82e9bcad5b7163d1baffcf4b124accf622ebd09ca5b29a1b4217621550ae8ad03d86a972ac7029ce9485db798990433a86f876abfd48a39fa27ce6e9b4243e38e7ce8aeab40c261c723b1310188583b18865edd6d3377ccdc9627b1fdde8d7a6418427fe75975bbdf638b143b79a8fe6e8d42a290f3560f974099fd463aaaa0d0cfb625cc2a17331f2d4d827e7edad10228602dcb863c7f63bb4b8aa24b319d279abdad10b3b69271e08948cda59f5ca296a1496b676a9cbd1aaea266d563e7f587529338dfe3ed269de1bcb71ba35beb78a96c7ba60d377d01836780b71cf848609bce63843c9d92feff47924d4703eac61e2843b6792a47691832b24722065a5d0a13024a38fa78cb3f3695e7e0854fc53b69c210fe8a05d29daf2c2d1b47fb2c4cf93fdee42480b0b4ef116a9a45647a027fb643d63c02f1e27a2496872bf3a65cffad4be1c7f7844135220582f508cdb66cb3d0823ff4a214c12f191fc689741a5ae92ad26ed0db74cfcd643a0b4c0b1f1b6a8388aa92042f0ed65aeced1bed08a6040c975d8c897f9814a824c501db90cf814a948bf98378cc83dcae98179934d66fd277e0ae85ab04469742cdbf7f389f47c47bebe76f3e5911cba0f2a9d66dd59d315d1172d6b4b6110deac38e45f6d3218f89ef1d355bcb1cba0d494d2b5bb1f30f3a95f8fb800130f3e97ffe5d01f1acb4721288ca65eec016bba537c0ac2a4009f274f18e4c88bb049192e80bbf9073fc2d7146f05204a4b43acd35b1105cc33fa11d510a538c74977f6205c1b5e59ff8d830ff3af4ba249aede84c7e0029ac00338c1441f1ab016d2c5a2af1245071facb12f3f670f8cdd9d56b23a3988c24c90e9deef197c5e6dbe982f4467ee4b512cc879046fcc9d9b5123ee3b7a349e36d1f72f3efbbc7a7da8d945ca258c77b8e4591845bf71ada578cb241ea893c1044ab5baeabb57954dc18c61e7677a20ae69f5476d636a9e3d411a6e602fe20f8bd805a4f728479d3b9c90e80ec79fdc8f340f5510cd3fbf1bcaebb92456bc3fd38c3a81d6bb7d949f68c0f72ad592637308f9e504386234c6291101abc0b11a46346e3f2121233945f725e3cd9091891aba6af8fa031b25d1fec86193b9ff87056ea530e28ac0a2048102545df1e8c03d0771f1fd571d444908fc8c2a090196adc956b2fff8286086c9dd8af6ba643df262b7bf52c73a3f3237387b83505269ba9f444de332c05dfae5f25315f0c5b9c235313708ca0c3f30123e4af4140bdc399374d3745360e3474fb76b8e536598db9a92264d569df5e2e05813bb9a205125d563d16c6901a205d4d9480f8573c0c92839ffec26de49374a2a23b38d160", 0xfff, 0xc0, 0x0, {0x0, r3}}, 0x3) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}, 0x1, 0x0, 0x1, {0x0, r3}}, 0xd6b) syz_io_uring_setup(0x21b8, &(0x7f0000000000)={0x0, 0xd7d4, 0x8, 0x1, 0x177}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x5}, 0x9) bind$802154_dgram(r0, &(0x7f0000000300), 0x14) 13:27:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000010, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) readahead(r1, 0x200, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:27:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 2005.767420] Unsupported ieee802154 address type: 0 [ 2005.780905] FAULT_INJECTION: forcing a failure. [ 2005.780905] name failslab, interval 1, probability 0, space 0, times 0 [ 2005.784291] CPU: 1 PID: 36212 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 2005.785379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2005.786450] Call Trace: [ 2005.786799] [ 2005.787111] dump_stack_lvl+0x8f/0xb7 [ 2005.787655] should_fail_ex.cold+0x5/0xa [ 2005.788217] should_failslab+0x9/0x20 [ 2005.788740] kmem_cache_alloc_lru+0x6b/0x760 [ 2005.789336] ? __d_alloc+0x31/0x9c0 [ 2005.789894] __d_alloc+0x31/0x9c0 [ 2005.790392] d_alloc_parallel+0x10e/0x1530 [ 2005.790973] ? lock_release+0x3b6/0x750 [ 2005.791522] ? __d_lookup+0x270/0x450 [ 2005.792065] ? __pfx_d_alloc_parallel+0x10/0x10 [ 2005.792686] ? __d_lookup+0x292/0x450 [ 2005.793225] lookup_open.isra.0+0x914/0x1250 [ 2005.793858] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 2005.794513] ? verify_cpu+0xa0/0x100 [ 2005.795039] ? verify_cpu+0xa0/0x100 [ 2005.795546] ? __mnt_want_write+0x1fe/0x2f0 [ 2005.796141] path_openat+0x946/0x29b0 [ 2005.796688] ? __pfx_path_openat+0x10/0x10 [ 2005.797259] ? perf_trace_lock_acquire+0xfd/0x530 [ 2005.797952] do_filp_open+0x1ba/0x410 [ 2005.798480] ? __pfx_do_filp_open+0x10/0x10 [ 2005.799066] ? find_held_lock+0x2c/0x110 [ 2005.799636] ? do_raw_spin_lock+0x125/0x270 [ 2005.800230] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 2005.800890] ? _raw_spin_unlock+0x28/0x50 [ 2005.801453] ? alloc_fd+0x2d8/0x6e0 [ 2005.801998] do_sys_openat2+0x171/0x4c0 [ 2005.802553] ? __pfx_do_sys_openat2+0x10/0x10 [ 2005.803166] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2005.803871] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2005.804610] __x64_sys_openat+0x143/0x200 [ 2005.805169] ? __pfx___x64_sys_openat+0x10/0x10 [ 2005.805819] ? syscall_enter_from_user_mode+0x2b/0x50 [ 2005.806525] do_syscall_64+0x3f/0x90 [ 2005.807046] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2005.807741] RIP: 0033:0x7fb968b2ba04 [ 2005.808237] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2005.810533] RSP: 002b:00007fb9660ede20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2005.811510] RAX: ffffffffffffffda RBX: 00007fb968bc2970 RCX: 00007fb968b2ba04 [ 2005.812422] RDX: 0000000000000002 RSI: 00007fb9660edf40 RDI: 00000000ffffff9c [ 2005.813334] RBP: 00007fb9660edf40 R08: 0000000000000000 R09: 0000000000000000 [ 2005.814263] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2005.815181] R13: 0000000000000006 R14: 0000000020000070 R15: 0000000000000002 [ 2005.816132] 13:28:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x3010000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:28:04 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 36) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:28:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:04 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x24, 0x77, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) 13:28:04 executing program 7: sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xfffe}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8080) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r2, 0x0) r3 = add_key(&(0x7f0000000380)='trusted\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000480)="32777855d4fd35b0be732467c89028f5506ae1db2683d0f9042c9329707638caa282494258275e9bf013f1d55565b2de1aaf8d6143ab3cce57e26e872746cb31459445fc4930fbb81e7806", 0x4b, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r4, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)=@keyring) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r1, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)=@keyring) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x8000, 0x41120, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd9, 0x2, @perf_bp={&(0x7f0000000500), 0x7}, 0x90cb4facb38f9972, 0x80, 0xa7, 0x9, 0x4e6, 0xdb, 0x5, 0x0, 0xfffffff7, 0x0, 0x3}, 0x0, 0xe, r0, 0xa) r5 = request_key(&(0x7f0000000180)='blacklist\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='%\x00', 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r2, r5, r6, 0x0) 13:28:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000007c0), 0x2}, 0xcc80, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000480)) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) r1 = syz_io_uring_setup(0x4cdd, &(0x7f0000000140)={0x0, 0x6c4c, 0x10, 0x3, 0x20f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000300)) syz_io_uring_setup(0x2c86, &(0x7f0000000600)={0x0, 0x0, 0x2, 0x2, 0x213}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000680), &(0x7f0000000800)) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x5738, 0x4, 0x3, 0x63, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000440)) r2 = getpid() syz_io_uring_setup(0x49e8, &(0x7f0000000940)={0x0, 0x23d5, 0x8, 0x3, 0x316, 0x0, r1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000540), &(0x7f0000000580)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x2) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r3, 0x0) ftruncate(r1, 0xfffffffffffffff7) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100000, 0x95) close(r3) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) statx(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x6000, 0x7ff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x3, 0x0, 0xee01, 0x0, r4, 0x139, 0x8}, 0x0, 0x0, 0x3, 0x6, 0x400, 0x5, 0x0, 0xfff, 0x2, 0x9, r5, r2}) finit_module(r0, 0x0, 0x0) 13:28:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/slabinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) signalfd4(r0, &(0x7f0000000040)={[0x4]}, 0x8, 0x0) 13:28:04 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000006c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}, {0x0, @struct, 0x0}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) fcntl$setstatus(r2, 0x4, 0x2800) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000ac0)={r1, "cab79150acd4400477fd6ef87d624d71"}) 13:28:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0xaa, 0x0, 0x5, 0x81, 0x0, 0x20, 0xa620, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0xc104c70d77f15d40, 0x0, 0x6, 0x0, 0x40, 0xc0000000, 0xfff7, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) r3 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r3, 0xffffffffffffffff, 0x80000) recvmmsg$unix(r1, &(0x7f0000000740), 0x0, 0x80, 0x0) 13:28:04 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) sendfile(r2, r3, &(0x7f0000000040)=0x2, 0x100) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000140)='\xb5{!,[,\x00\x8dt;y~\xde\x93K\x12\x90\n[\xcc\xbf{\xbd\xbf\x11Q\x1b\x8cJN\xad\x19\x83\x1a\xaf\xbcm\xff\xa9\xc5e\xdb\xba\xcd\xaf\x18\xdf\xbf\xb9~\x84\x14D\x05\x7f\xbb&G\xcdTM\xa3\"fa\xbfYd\xb6\xf4\x8c\x05\xff\xaf~\xf8\\\x92VM\x9d;\xbd\xd7\x9e\x8d:\xc7X\xab\'#\xd7\xec\x91\xa0T\x1bb\xe8Ds1\xe5\x9e\x85q\r*\x91W\x9c\x1e{\t', 0xffffffffffffffff) 13:28:04 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x65, 0x8, 0xf9, 0x7, 0x0, 0x3, 0x2009, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xc9, 0x2, @perf_config_ext={0x47c, 0x64a7}, 0x8908, 0x200, 0x2, 0x1, 0x1f, 0x4, 0x7, 0x0, 0x43, 0x0, 0x5}, r1, 0xc, r0, 0x3) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x4000000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:28:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x40200, 0x0) r1 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) openat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x4, 0x1, 0x3f, 0xc3, 0x0, 0x1000, 0x42000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x40, 0x7, 0x5, 0x0, 0xa6, 0x3, 0x9, 0x0, 0x265, 0x0, 0x9}, r1, 0xf, r3, 0x1) 13:28:20 executing program 4: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(0xffffffffffffffff, &(0x7f0000000000)={0x24, @none={0x0, 0xffff}}, 0x14) 13:28:20 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', 0x26e1, 0x62) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000000000000", @ANYRES32=r0, @ANYBLOB="ba0cb6a21abfa4b8d25505539ce58ba69316af101dc2d8fa852463eec6531ad5dc4534e19d83bef1e535e07ed7b96b673e68e37324665ae882dc4a613bd09493e112c20665f2901f3263f6da71cf6344664271f58cc91036fd8fa99c1f77380452c3dd175badc9e01b33732be3ce6fd2a5032996bdb0085b2b03a8cc4da1bf975b5dc1871b4843ec68c1c6977e17"]) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3, 0x3, 0x7f, 0xf4, 0x0, 0x7, 0x8020, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x3}, 0x11230, 0x2, 0x7d88c0be, 0x2, 0x81, 0x2, 0x48, 0x0, 0x0, 0x0, 0x55ac}, 0x0, 0xc, r1, 0x1) r3 = accept$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000300)=0x14) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000001500)={{0x0, 0x2, 0x3, 0x1, 0x4, 0x5, 0x67, 0x1ff, 0xd43, 0x4, 0x6, 0x7f, 0xeb, 0x400, 0x6753}}) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/75, 0x4b}], 0x1) sendmsg$sock(r2, &(0x7f0000000240)={&(0x7f0000000400)=@caif=@util={0x25, "42d26651573c8d82f30fe4bfc6321195"}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000480)="b63d0af22e5cc311ea0df56aeecc6ecb09c7e9a311c00fece4ab8c5b93a3dc2c566cf9314298ead698431f99be4d7ad042114764c4d56b8086c4db50f56d5abfeb7290d6e0616d4a9789fb1586b658cacaff7fcca93d4e359ff5d43026df8d20614af8eb51f5531807a1f57f562936a7b2e4b94db731514d7f28fd11c975259984fbd6e194d31508cf1388410d82d15555727997f60fce97ec1d9f25ea448e18029e3baae1d4bb1f7813332d81502ec8efa389c1d4b0e2adc2d5dbe480b643e68901f6afe2c9132d5e9429b1a59805e5b08ff0c2dd8d609badadbca2990747b6c930483179e4cbac55adda", 0xeb}, {&(0x7f0000000580)="1fdd455427aac8a48b49bef05ab7e32290288d50e0d9f78e45cde780c2008b2a5df3c82ce51e5df3c485d99f3aefc6291b9ea0d85b0ed2b05a12a285d393920f16f4cf1bb97e64494b2c1f1098e30a19515f75710fa7e4483d26bb1011b9c7065fc1a707a24a3485375c8d9885dbf91e8bdce7d57bdb89f89eb32d0089f5bba2e1acc941b89b16909e098a51aabeb94d0186c7fd6132468c099ef76974249c69f518adae7e90c5bc6bd23a7420c4b3dec71ae90a208cb7eb6e628ab75f4da747d082a6136669", 0xc6}], 0x2}, 0x404c885) syncfs(r1) 13:28:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x84400) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r2, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)=@keyring) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r2) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x6, 0x1, 0x8, 0x6, 0x0, 0x0, 0x10, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x5}, 0x8800, 0xffffffffc38562ca, 0x1, 0x6, 0x1000, 0x1, 0x7, 0x0, 0x0, 0x0, 0x1}, r0, 0xc, r1, 0x2) 13:28:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x11000000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:28:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:20 executing program 7: pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000380)="28f18f474a25880682e8332061031a9ba9925a313ea64ea3122f9e246422fd1ff34bd07fb90bf56ada7960fbb6572f239465ae1a5641834010d8ded78bb4923dd30e6f241d49391c8431577c9070e70958d1531f0d078f550fe91088ff5753bf693a36ca41d0a60c90d23664cea7b554bd5e9db0fdcdb979afd271c96b10bb5a3edc36cfd5516080746e334a8e0e7f390c02cee5d918d5ce2b421c066c69d4af031837bb012e", 0xa6}], 0x1, 0x80, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000500)='cifs.idmap\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000580)="38d1ff29cc26942ad99463b99ed2ed3e47c7674d87205b47e8e3179d847b77d8da1491b6e08ea7608ff959da3701f07cee56819fbbdea2ea241a35fba545363f00c3522689bee171b20f2c1d5ac68d2a7a6dd14364f8030d830dbd22137c5c8d71f65c6853775a2e7b2043965d6a2cd3e25f3eb1a70ab5ff2ab2dc37f42d9199eb634867cfd623af1ba9d0f393de8ebb690ad69e56e3d8fb6486d46faadbf5211426282e29d56cea274a890de0dabcc45adedc9ccbdb630afc6e672414cecd7dc7e8c69fdf0710889fe9cb1b0e15e9f762c302e863f9b1b764d0425d3ad08f1cb054058541fba6d157739c064194fc4cd7ba6161480eff", 0xf7, r0) keyctl$link(0x8, r2, r0) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000180), &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, r3) open_tree(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x9101) write(r1, &(0x7f0000000280)="6fa7d4f366e0903b4bb4921fd1b3c039871f0cfc254d234da7a18be3ae40c0015d2dd792ce2f64d782b0dbdb490f7c16b975e4df8f23edd2fee932a608f6a08e1a9cc6d5d6a2f161454ea25dbc1d6d7b2d0ef17bb3bb8059485526934e8e4ba157072e888e0b3f00a13aabe25a350b580c6f682dc9eda53257f99ca45a3a2faa90916bbe5fca184a05df8b3d78a7706eeeac163f6a82e1653ee983b5827e6d4366ad789d558bcd551c845166144a11d4bc38508761e562e8e9397b3cb94582ae8a470badb39ca542348f1f9b5e5113afc7fd9bb6", 0xd4) 13:28:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x3a2343580, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x30, 0xffffffffffffffff, 0xa2598000) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:20 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) (fail_nth: 37) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:28:20 executing program 4: ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x7, 0x5, 0x80, 0x3, 0x0, 0x8, 0x6118, 0xde40252f27c64aa7, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x608, 0x77e2}, 0x10800, 0x0, 0xfff, 0x9, 0x3, 0x10001, 0x6, 0x0, 0x1, 0x0, 0x3ff}, 0x0, 0xc, r0, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x1, 0x0, 0x7, 0x2, 0x0, 0xa4, 0xb60801031fc71070, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x3, 0x2f}, 0x10, 0x6, 0x3, 0x3, 0x100000001, 0x0, 0x401, 0x0, 0x9, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x2) write(r2, &(0x7f0000000040)="2fc20d1aad20f6e3a1b2f02f61de6f3da1f42dfe7ce601a2c8d1c498589adaa1499ac79566e3a60dd8bd06a7373046e29d2a33398c8a7a0d1a77", 0x3a) r4 = dup(r3) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000200)) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, &(0x7f0000000300)={0x3b, 0xc, 0x1, 0x4, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @private2, @dev={0xfe, 0x80, '\x00', 0xc}, @mcast1, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x68) syz_mount_image$msdos(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{0x0}], 0x0, 0x0) [ 2036.138399] FAULT_INJECTION: forcing a failure. [ 2036.138399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2036.140087] CPU: 0 PID: 37448 Comm: syz-executor.6 Not tainted 6.2.0-rc1-next-20221226 #1 [ 2036.140692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2036.141275] Call Trace: [ 2036.141470] [ 2036.141645] dump_stack_lvl+0x8f/0xb7 [ 2036.141944] should_fail_ex.cold+0x5/0xa [ 2036.142273] _copy_to_user+0x2e/0x150 [ 2036.142566] simple_read_from_buffer+0xd0/0x170 [ 2036.142925] proc_fail_nth_read+0x19c/0x230 [ 2036.143253] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2036.143621] ? security_file_permission+0xb5/0xe0 [ 2036.143998] vfs_read+0x257/0x940 [ 2036.144280] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2036.144638] ? __pfx_vfs_read+0x10/0x10 [ 2036.144954] ? __fget_files+0x270/0x450 [ 2036.145277] ksys_read+0x12b/0x260 [ 2036.145559] ? __pfx_ksys_read+0x10/0x10 [ 2036.145871] ? syscall_enter_from_user_mode+0x21/0x50 [ 2036.146266] ? syscall_enter_from_user_mode+0x21/0x50 [ 2036.146660] do_syscall_64+0x3f/0x90 [ 2036.146949] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2036.147342] RIP: 0033:0x7fb968b2b69c [ 2036.147626] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2036.148904] RSP: 002b:00007fb9660ee170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2036.149481] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fb968b2b69c [ 2036.150001] RDX: 000000000000000f RSI: 00007fb9660ee1e0 RDI: 0000000000000005 [ 2036.150536] RBP: 00007fb9660ee1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2036.151060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2036.151575] R13: 00007ffd4d9c841f R14: 00007fb9660ee300 R15: 0000000000022000 [ 2036.152121] 13:28:20 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, 0x0) r0 = epoll_create(0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x204, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r2 = dup(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x7f, 0x0, 0x9, 0x40, 0x0, 0xfffffffffffffffb, 0xc2200, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x83, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x40, 0x5, 0x2bb0, 0x6, 0x1, 0x1ff, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x13) getsockopt$bt_hci(r2, 0x0, 0x14, 0x0, &(0x7f0000000340)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x90000009}) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x32382, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, r4, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000100)=0x3f, r1, &(0x7f00000001c0)=0xfffffffffffff000, 0x7, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r5, 0x80047213, &(0x7f0000000080)) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0xf502, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:28:20 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:28:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x4a010000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:28:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0xaa360300, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000300)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r1) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)="f103c3ef7167b7e28b040817cb5e493fde40aa83ed64126e20abdec8ddb520b40ade21b41a2930354691b93dbdea8c80381e213e726d3a04da4b26706d50919ad87ccaf7ffc36dc2238f5f6027e2d243777b36d1e23f08949fc0dad6c9c0494b33f04f4640a926bed5a364096d2e0f5fd5928c6d956f4cb310385e5848dc1e35d7c0836ab6b9c473a2edf785dbaeadbd1e1b249c50f825b0ddbd1570d846d323de67c5d7f7f948d9692ecba5c86cc487a7608d5e10f20629b4e0", 0xba, r2) 13:28:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='{-](\x00', r0) 13:28:20 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x8000) r2 = fsmount(r1, 0x1, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r3, 0x0, r0, 0x8) rt_tgsigqueueinfo(r3, 0x0, 0x33, &(0x7f0000000000)={0x3, 0x8001, 0xa2}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f0000000140)={&(0x7f0000000280)=""/172, 0xac}) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x6e000000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:28:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:21 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xe2, 0xbf, 0x20, 0xa6, 0x0, 0x1, 0x41a, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x1, @perf_config_ext={0x100000001, 0x1}, 0x8, 0x1, 0x4, 0x2, 0x0, 0xec8e, 0xb618, 0x0, 0x10000, 0x0, 0x5af79a25}, r1, 0xc, r0, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:21 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000140)={@broadcast, @broadcast}, 0xc) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000200)=ANY=[@ANYBLOB="010000020167470018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f72cacde43a03b34abf920c3d785dfd7666696c653000aea8c2dd5c5d7ceee3d35a107507fa70d8d6e0cfa39673adeac1f937df72c9b805e6e41de32f0795b03e72d9bb424f87029e7af6614afeafe59120a1e387740499e31610a6fd6c5fcff0f3ef9fd9400765bdea8149b9d7e802a4b08bcff685a3f59f87"]) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x7, 0x7, 0x1, 0x20, 0x0, 0x47c16cb4, 0x1008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_config_ext={0x0, 0x1}, 0x40000, 0x67, 0xbe50, 0x2, 0x9, 0x84f2, 0x8001, 0x0, 0x8, 0x0, 0x100000001}, r1, 0xe, r2, 0x3) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, &(0x7f00000001c0)={[0x3]}, 0x8) 13:28:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x803e0000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:28:36 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:28:36 executing program 5: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff0000/0x3000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/237) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x1b}, 0x18) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) ioctl$SNAPSHOT_FREE(r3, 0x3305) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x14, @inherit={0x68, &(0x7f0000000680)={0x0, 0x4, 0x100000001, 0x9, {0x12, 0x800, 0x9, 0x9, 0x5}, [0x0, 0x4ee3b41, 0x5, 0x3ff]}}, @name="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"}) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000001700)=ANY=[@ANYBLOB="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", @ANYRES32=r0]) openat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x210001, 0x80, 0x1b}, 0x18) shmat(r2, &(0x7f0000ff2000/0x4000)=nil, 0x4000) 13:28:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x200602) openat(r0, &(0x7f0000000040)='./file0\x00', 0x52d182, 0x0) 13:28:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xc0000000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:28:36 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x2c00, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x80, @remote, 0xbc8}, 0x1c) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$CDROM_SET_OPTIONS(r5, 0x5320, 0x0) r6 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x400, 0xe4200) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r6, 0x0, 0x4000090) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0), r5) sendmsg$TIPC_NL_PEER_REMOVE(r6, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000400)={0x50, r7, 0x0, 0x70bd2b, 0x0, {}, [@TIPC_NLA_NODE={0x4}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffd}]}, @TIPC_NLA_BEARER={0x18, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x50}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000a40)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000800)={0x1fc, r7, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x13}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}]}, @TIPC_NLA_NODE={0x104, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ID={0x68, 0x3, "a3b75304f6cce235ddce23e6391cc5bdd305810e019a1b52e3be7fecf70806b3d7021b75c4ef20d8369ae6c2f914f53e990d8d643715bb40556566207eb300f60470d17806efe73911f56251b766301da0835b7e3b7a04f96fffea5465b082598ed7c2b9"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "41360d9b89f0cd09ee73ef56a2e7315854afcd0eba0bcc"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3e, 0x4, {'gcm(aes)\x00', 0x16, "2593ac04e4c7a1507e8b612d9ae9e0e1e2101e4b2df6"}}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffe1}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x100}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x800}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}]}, @TIPC_NLA_NET={0x58, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x37c70000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x40464}, 0x4000091) r8 = fcntl$dupfd(r1, 0x0, r0) pwritev(r8, &(0x7f0000000140)=[{&(0x7f0000000240)="fa9f92b879d79dbc50c1546255e6e757d6ff8a597d29c16125d767c33a0ab8f49adc36fcb2a1e61e1631caecc521e24dee33710ab2ce46c03bcbb7060ba3acb4860a021cfe3b5a01de1b44e29ef60e4a5f1cc0504776acaa12cbd1792b740fb4fc3952983574a912e7563a6fa50d953d33693ae0735a355ce10c7086bef22652924048e83783a7e9749f068665b1d4012441165d8a9fd74d57d77d72f6637a6d4fc70ddd8c9f01fae40a71e3187dd5", 0xaf}, {&(0x7f0000000300)="98693685a5a5fb8f8d7695c3750a90cc98eb67dfeb4175c83bbf0621471d9729ca95dc45d3c96dd9da7d2f0f7b3abe0da1c8e30ae1af51d1936713fcf46c2e2c7703430e85b5a9f74ff5cd33707496da75b38eb9c2453a08451caa1afb4a8d1d8fca25edabf25a1e4b0e188a78d7e5c27c5eb290f74f7569d4fd8400e440b05ea1c019adabfa0499a797a381ba76e9b401a0315f9d44e9fc17f61c86c0a0bc2a60ccd02d0f4e3a6923fef65baec4c4789afe1d5644e55b6c7784133da7111ae9dd0746df3806b88ea42fcfa1e05ac9d20867dc428bd6a91a09ecdc02ea3d0dad7f4282c723f871a5391fc8dbe7b6bf07011c77cb", 0xf4}, {&(0x7f00000005c0)="4a6bd80ca8215eeca6f4ff634a9cbc347b5ccb140d17df37099aceaf2ad45b941fbccae21a6bbd6a0b76b59adf014cede50dfcad21eeb5206a097655789d83ece3a48218c5bcf85e2629686990aaa34d8b9e1099c7e235ecd20d8d9774b663c6bcc575c713760179ce52e3223c36086689e4c32ad588a904a23d2235d24d1506f9fd8bdf36073b808a0506034f451c1fa478930e25b7376ca94867733757ffd01801faa26a43ffc7952da757f95a9a49e323cc35de36bb3f4fe2daa36de95f108fcb78e5ddb284c44ed11828dfb76abdc32fb18ecb3141ee51e590a82dfd4e38827a6a51b2eece8d3addbb352202c7a26120158f88b671", 0xf7}, {&(0x7f00000006c0)="7e7ddcc90114b587d815d62647d28058499324761785c8c4974d1b5d1e973e3e2a740c5c83126feb01d8a94a4b4971ea0d28e486b66705a57abd086cfefdb2f3ad3842c876ebf46b73ad822312f636c894162cc5f55b6a559be592320bbf6c04b5086a8b8faebf6eb78d6ef0c129853b43123d19b2f354325a383c1d07cd11babac20e7dacd1a248eae472f220d3cf371a68089cbaefe0762d9a5a70c5482153e910e5fe96edb30c8b900292e664e3ac8b76f8ec01f61f0dcf2e13dfd9da3d49bb611a3e94a28fffcde7", 0xca}], 0x4, 0x9, 0x1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)=@keyring) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000480)='%\x0f\x00\x00\x00\xae\xa9\xc3]\xa5-\x00\xa3\xc4M;\x93\xb3\xf0q|\x93\xf8\x83\x19o*\xa39\xf2){\x10\x80\xbb\xb2g\x1c\ro\xc6\xddO\xd0\xab\x1cAK\xf8#\xa1\x80;\x12\x9c\xac\xc47\x04=\xe4\xcbx\xd9J\nYH\xd1\x97\xff\xa3y\xe1e\xe0e\xad\xd4\x95#\a\x14\x13\n|?\v@\"\x83e\xbc\x87\xde\"\xef7\xe8 G\xfb\x9e\xce\x8a\xba\xb55s\xf0\x8d\xec|\xd4Y\x12\xce\x8e\x13D\xfc\x96\xc1\x9c\xd9\x87\xbc\xc3\xc4\x8a\x1d\xfa\n\x13\xe2\x82u\xcd\xb6\xbb\x98\x93\x9b\xc6\t\x00&\xac\xcf\xfe)\xc1K?\x16z\x1d\xf4\b\xa3V\xc9\xb3.\xd4\xf49\x8b\a\xba\x14\xbc\xb8\xb6y\x18\x9e,\xfb\xce1\xa0M8\xfd{VC\xe7\x17\xbb\x1a?\xfa\x99\x90\xa0P\x880\x99\x18Bu6\xe1\xbe\xe3\xc0\x05\x19Ae\xe3\xa9\xf3\x93Z\x99\xb1\xbe\xe3\x7fV-\xf1\x85\xbd\xfd\xba:\x96QZ0\xf4\x99\n\x0e*\xa65E\xf4O\xb5\xef#,=k\x85\xa8H`z\xa9\x1d\xaew\"`\xacoE\xc0\xee\x1b\xcdm\x03\xd2\xe0\xab\xc0\x9cX\xb0#v\xcb\xa7\x9b\x95', r3) 13:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:36 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x80010, 0xffffffffffffffff, 0xa015000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r2 = openat(r1, &(0x7f0000000000)='./file1\x00', 0x2401, 0x10) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, 0xffffffffffffffff) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000002, 0x11, r1, 0xa015000) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000002e2f66696c6531006a678c6e520702275cdc09bb4bab46c543385f0e41a449e13269143fbe9dbb9123c4"]) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file1\x00'}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) openat(r3, &(0x7f0000000040)='./file1\x00', 0x23a000, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0xfffffffffffff73c}, 0xab0, 0xfffffffffffffff9, 0x0, 0x8, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r1, 0x0, 0xfffffdef) 13:28:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) r1 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x5, 0x37, 0x2d, 0x6a, 0x0, 0xffffffffffffffff, 0x500, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x11c9, 0x400}, 0x1306, 0x3cf7, 0xe31, 0x0, 0x6, 0x5, 0x94, 0x0, 0x1, 0x0, 0x80000001}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000240)={0x81, 0x0, &(0x7f0000000200)=[r1]}, 0x1) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500), r2) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x48, r3, 0x100, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x40020) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000", @ANYRES16=r3, @ANYBLOB="000226bd7000fddbdf250700000008000400ba0000001c000280060002004e210000080009000900000008000300010000006c00018008000b0073697000080006007365640008000b007369700007000600736800000600020032000000080009004800000014000300e0000002000000000000000000000000080005000000000008000b0073697000140003000a01010000000000000000000000000008000400020000004800028015000d000100000008000900de0f000014000100fe8000000000000000000000000000aa080007000200000008000400ff010000060002004e20000006000e004e2000003c00028008000500ff070000080009000001000006000e004e210000060002004e20000005000d0001000000080006000000002008000500000000800c00018008000900590000000c00028005000d00000000000800040000000080"], 0x150}, 0x1, 0x0, 0x0, 0x4000}, 0x2000000d) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xc03e0000}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:28:36 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000140)=ANY=[@ANYBLOB="01a25e05395ef433d0ba3f74f0cb1142000000000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000000000000000000000000080fa84d392d76a8a0061f3efc4936caf566263646566676809bde98319cb767778797a3031323334353604000000000000"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x228842, 0x120) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) keyctl$set_timeout(0xf, r0, 0xef6) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='ns\x00') inotify_add_watch(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x80000900) vmsplice(r4, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r3, {r4}}, './file1\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/snmp6\x00') pread64(r5, &(0x7f0000009780)=""/112, 0x70, 0xa52) r6 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r6, 0x4040942c, &(0x7f0000000040)={0x0, 0x2000000000f, [0x0, 0x156280000000002, 0x401, 0x1, 0x7a]}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file1\x00'}) ioctl$EXT4_IOC_CHECKPOINT(r7, 0x4004662b, &(0x7f0000000340)) 13:28:36 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="6a7a1ea49df0bfe0a3453973c4ba3558d65edd6fdfa2b7463a65c7b876dde24b3ba3d7b7", 0x24, r0) 13:28:37 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, @in_args={0x2}}, './file0\x00'}) fsmount(r2, 0x1, 0x6) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4d486b48af91f8a5aa423a494c1e299cde184c509b", 0x15, r3) [ 2052.622118] random: crng reseeded on system resumption [ 2052.649376] Restarting kernel threads ... done. [ 2053.074437] random: crng reseeded on system resumption [ 2053.090978] Restarting kernel threads ... done. 13:28:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = fcntl$getown(r1, 0x9) perf_event_open(0x0, r2, 0x0, r0, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, 0x0, 0x220) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x3, 0x7f, 0x8, 0x2b, 0x0, 0xfffffffffffffff9, 0x8000, 0x56c7e657aac7fcfd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x2, 0x400}, 0x4, 0x5, 0x2, 0x0, 0x5, 0x7, 0x9, 0x0, 0xfffffc00, 0x0, 0x5}, r2, 0x0, r3, 0xb) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:57 executing program 5: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff0000/0x3000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/237) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x1b}, 0x18) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) ioctl$SNAPSHOT_FREE(r3, 0x3305) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x14, @inherit={0x68, &(0x7f0000000680)={0x0, 0x4, 0x100000001, 0x9, {0x12, 0x800, 0x9, 0x9, 0x5}, [0x0, 0x4ee3b41, 0x5, 0x3ff]}}, @name="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"}) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000001700)=ANY=[@ANYBLOB="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", @ANYRES32=r0]) openat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x210001, 0x80, 0x1b}, 0x18) shmat(r2, &(0x7f0000ff2000/0x4000)=nil, 0x4000) 13:28:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='*\\\x00', r0) 13:28:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xe03f0300}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:28:57 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:28:57 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x154) pivot_root(0x0, 0x0) r2 = memfd_secret(0x0) bind$unix(r2, &(0x7f00000014c0)=@file={0x0, './file0\x00'}, 0x6e) 13:28:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xb1, 0x6, &(0x7f0000000500)=[{&(0x7f0000000140)="e3344bf81306d4978cbcb1131b975b03299b90f5591bb5ec78e6c7a9a7ca7649f7ed94f6a7674dae159ace5bff76a787b72fd9f9f9a6b9e4be81d979ff83f739c31d93b71ae9b2347e0f7e8d545093ec546288944f086153fec2a2d08cfee5ad", 0x60, 0x5}, {&(0x7f0000000280)="b8ac911572340ade9608dc6afb6994c1176011d3411b0584be8f0f944f6bc2963e2096d118ed49c3b2f554e25ad7654522d477330a2a9223346ecb7e", 0x3c, 0x6}, {&(0x7f00000002c0)="891149ecbd4675de6a9b01bdcc3d56fe9cbd1eb4ce9417da10919f798dab59f89ad277f7830f5180372c54d60a7dec050c9badc5d5c7b6f3d521331d66f3312da71f09db6e1b13ee00e9b4f9499a1d372c21f824a9874181a20e1bf2a7ea6c7d3f321c049c0bd3c2354911343a4843736397544749b0b18e7db8f37cfc95656b61f63f82d239604a877e06c4f29c6fc5672698c54391737a19f2c892aa74cdcb4f0d9ccae0c4fa9c1b3e3c7f23757145d12e0d3f036e9a36a72ce5774ff5249574aad1d62d62a53d", 0xc8, 0x1f}, {&(0x7f00000003c0)="eabff9778ae7bd3b458c3222a906d0c97548bdd195bd51e03e713561dcd94c674e609f0f8fa77df7fac1002945be655276929ff71cb3a9689f403c719dd87f9b56c813", 0x43, 0x2}, {&(0x7f0000000440)="08bca0725dc9b23199e313b40bb512a9c5aa4ffe376e3c33fdc185fb0dfe86ab89eb57c5584dbb2ca66b7f0af03c223f5dba440c7d7d4339cc273b9bb6aade5978f2c010a0574f3d46aad23ee632c5fda0bfae729353e31ef9b5f53697d57fcdfd07b11085342cbd43622ed8cd621284a59152f2dedf7118729625468c3042205265bebcb910ede4fbb2e4daa46a", 0x8e, 0x125}, {&(0x7f00000006c0)="722ac4f845952f451117af312359ecc669422c092b2b00479a64c7dceb3f1c75481f244f3a340be349e8c1b80888436167812ebac0b734ec4617e12adf4ac8f840f795b25008fb27236adfec57dabc9ff48c63f230114703225427076135df75774dc43d8ca2193e7cf51e2eedf1d061a6a97b5cb3751f75501f1db2469fe4b7b6587223485b20d53f03cbe6d0505b85f7afb6d9de67d6ecf0abc0cff963784e4fdad94a888800488400200d958fc730f6129d1a0552ab9b26b549bead5e76040cdbc1ad4f78d23f8b4b18a70c65cbdaa10807756dc42956d87af4b61c21e2f1920b1822aeee962fea99c37f9afee94d878da9144676e53b6aed82f6e8da09118d82f3667cb38505810101aab6d2bd92d17dfd862e8ea6647f595b2295baad340f1af4ba87e31e7c4430ca333ee17e9e4781806fd7b83bd0d5e55886202e2108a5f9f4a9d3b280c696bae4ac7aede692d804f232ce8f457a4b99dc25bd86e8fba2632799995cf7bf521778bc7c0c07b5a2d9f201a2099e53ea9b2e4a72d8b1c9d931903998f8025297f925ed7bbbe8a2894b16c30387cc56361cdd184e1eb1fb95865734d1d928d615366a252170f518456c8d83b328c93dba21d89fa9ec57dba3775b17d0e6e1b458c728a6875f900fe71f90cd62622297eadb4a50154999c89c26041474f46fb3422f404c04d84d885d1215095ed02ef3e92fa541fddd37b575c32860be25cf5d2e2afd224d371850bc60c1da9842b126c42f7395fe9af0b648c6b3955cad5ca46c306ae157c178f0963ef2c11d9968c40e9623a812b0faf0346dc80d9f19d98e3694a211970d121cbb89d39914e68c975cc331844d082159bd9cfd37c7fed45691facbff7eaa4c513ece6c53c499a391241af464fb98814fd5c7292d36aeede73bab5436d3b53a184b08eb51f1cce5486a7823053743b4289a1efe66ccfeaef0c1160835f30abda588f879874618dc4b2a3c3dcc5b01e56d6509a91a25cd664632d850c691794dfe851ed40e8def5b31d475796e456c1646685942d9288338629ab5c11ba071cf90775300e37c4ae0605e02ff39b07d269d62375d9d925f19b2f40a3c3bd0c50d2dc812dd2eb36ac1f61377e8ab81c33c242c7e0d11536a823c72dcd780fac97491bf503c21598504341f60e7860239b30bfbaf60a0b0b3c9535ed215bda7fbfd827ede810e838555437bb88a8aeba11f9f9fafef504d9aeb0d985d6ee8570b9bf3d6bb232bc66e6254b0ed1d60ba2bde5b6b3389f437e316e7c2ee4d32467a36c8d1553600e6727ec3cd93327465f4bedf123fb1bf0471937b024e259ef21ed68d2c8c50cdf61179f9899e3bc6bbdb065f09af9212e43dd72f63a3f9bad863b68747580b4b24c42050e16123c29e4243263016586c078f42f22bf963f4292e0fa0927e1c4660f5da6e7e78ce1039516d6417ce87d1bca520f596c92821aaa5966c09f0ba11c55b9dd3d3cda9e62728a0b0a5232aad14941e19bd3b1e700a11d32344bc4b707375026c17bd2cecca949111b8c464b015c93846645fadeb5f4fc1101d10b9bf70dea6b3820313139bdeb07346a63e3f3352e3836e79dbd8c204f1db00618a8892ffc0af3d0cf36c8247c2e3b98a5080d92312ce851ace7421331b74995ef4a68d9fa7257ee59760e2416a6b369962d61abf00b5576fa5c98177117969e5d9c5a59109ef3e34d372a61378932a29c418cbca680bf4549db970072d452e750357ac88cffc495707f45259b28b4e708642fa11ac5cfc3598f777d85b8e2f1b684a38ecd7ac6b4ffe9b37dd56aabe91e5e9450fe59b8587adc11bf7f7f55d9056ceea99f04b32d49583228f12fb76b20be0de2ca1cfac23933a5f752726cf7932b79d6fc6f28f36aa64dd21573b7d869673f3abd89d21d9d8cd5e99250864b8a7e1faf529974964995d6986ed23477bae4b1e89909bbdbf3fe3d8a80c798623d4f2aaf449f7fb57245d9bfe281d590d72ddf3143b328c148dee35f7d88133f6abaa05dd58312f6ca1d0aed53e1724faffa45a57f205f793a33e5be0c4e849b7a8e55c6f037b6de2fa916aa117b1285936275f909ea14dac1c2a7d41064e4e4d558b862e1f18f811b458e54f639978b7693a3ac27091ea978a4e6e892284e085716cb478d479ef2eaafdec35b76dcee0db6cbbcb68dafb91edf1ba0d6a83360f5edbfabf096e3ac14e689c215600a5efa33a0bc2c853ef2b8e6de7d917595482fe2fa4ff7d8231d0e6317da29c573c28e53a47df62f2ecf32bd392ecc1eab999cdf768ce1a5715efe9121ecbfd3dd7ec8964861bebbf6071854303fff2f614018c74a6bb5d646867a5660c7859b19db0d1e986c90e073319c72e6e6e226cdaa57de553f58153efb9015782c608904698a6c1733e23bd91dd5800206fe55c27ddb96f83010a74090aa63e1d0c530a8f88f7dc383ff372f449babc955c7d1712b3e1c9261f40dcad40189f723f25c0d89fcd2eae99fda432c786d68c00c4fdf76d5ef7d9e2e8ee7781f76c8fd9f4581e435b8b2cb52d2ce995f82c74fdaf2153a7a680fdc5bba60fce03930532a194adfb272aa663cafdc3d87abf70ca678576a8464fc2dabe11abf720e0c7996466cadbc5f840505b79b8c9c75d0ad930cb73a4721d271f8bce41eb8e62b1e896807b9f8212064e6a9fdec2b1040916c05bcd2dba74fd77671e93f6f5a8d316fb69a91fe26ba0488b0988fba105dc339e292bcf686e584cbb9e3edd7da54fc6aa9ff3711871912b92a22dc78660f1a8cf6d49ee79a1b79cd66d212a3ac1860d932dd7d529d8f9139cc83449ee7fe72a85d92d647aa1d18236eec918a655bbbd7ad7258490d5de6252ccf13a2e4e964ac158b68449d30b06cb2d11d49734abca17e8f7f611b84fcbe7df821bc0524d53c23d10c728b7fb30319b0ee32663cd8cafd87a8acf06119c6608532bf981d50b81f0e20286ae59c57bc30f7830600ed463df3de0e28112326ca8a835458f69ea1e45eb3b477a7115ca4ba862c7b392c247feac4e112ee98ffa865f2fdc49701c6ccd90da7b7dd10fbda4602d2a4e266016654a7167c536c5cb56492264dc81ea704feba84e866a1ecbbdda6e2d1fa7788bdb51100ab04dba3fa89169b00f9111b06439c0688140ab82a79216d9a52beee5a759d35200bda25c36dea76e3ec07903a72f644ad0935778042fdab0fbf740dc238aff4d016adf896908904714c4de2a557ca36ae4cb5fb64185f392b1159edb07f15d45bd112fc45d0a69d5b7a491263fc6b06694b95a40f1ea295ade5fa15d52c607a361f7efa225e5c8a0bbc04aa3c18b5c53f526517814496cca6cc0facc5a90b0303448566aae8a954ebd60d2d15b4c9bd8bc63fa20e42a9fa2d5695d433d8947c7742f9f41b3e0a18f3bb141e39aa652cf0ef3a536095563c3e17b12b119c8b80421e09c0d807cdbec9b188de58d0e91c02aa0f4d7764d6a022b76e5503a2ab0a18fd7c5988387a1cb37f8d843ff80c32e31cfd989809320cc62f828922b03bcd36fcfaa4b616a431be3bbec49b2d41347507724c0f02dd44f4154bbe2adc711cfeb181f6100ffd1df8c2f966907f2f36ea54e267dc747853597da6e7d1dc69414fb105d02e3090c538359e40b24f66bfffc5ae79ce587442a5cc537befe15ef8860a85522753ad9a84108e47b8bb641a974e32ede6b3e8c1e5c783a21c9461c313158781d6a4f78ba61b6815383deda843c3b14837b8221cafa8778bbc9515e5427874bdaa2ffebf2ef282c9b5304b1ffc3a5603b509606045cc8601a5e257658e0ab59ae89354fe498edfc02941b4f675de75c5f1cf8ad3bfa6f7b6d236df012d25c0d9d7fab93fa6c16952b3c76722a12a5a11140e64e545ef93fd7ef4d91f118c0c95fe8b070693d7e64f622067e3aa57f8c4eac8e94914143d25294233cd97d15437b0a1291b0d12cc50bce5515973a09e3dd3b6e2df08704ba71bb17fda3bb608dce0f31f795c7a88bd2b6de2f1655a7920594f9e3b27e723e8b65f7486bbc9fb61e7b8df683ebd5c9dfed625fbf1cb8205a524fead49f82e407058b034214536c98e6fc86a0e33aa28f9e6cb000fc910eb9a35de129d000928944e12497966cff718de457d96e8badb7817ab8f30d81c83dc5cb59c95191867e625ba713f6b24786201937c1c4a76c21a5ba786b7f32246ef7f600bba492ba5792444c84afb4510aeab1476a9ccd41d7babe45ad76cd7df1c71f4d6864ca59d2b4833ee75ab2e754f1e2758906a0dcda7e411d9fe5bdf6d3b54b7351e54f307ebfda0aa01a428c0dcb877b30aacf295f6025e4667a72ecb9c97514bd27b77dff367ff6a56f00a16664dd3964e96047b9f17e462e7395e90e622ffd5a8ef03ab7d673b29ee5fff2f46fd815c66d6abcf160793e99e3e060a64c4fdd38d7a7b876a6fe324ad83c192059232f760436ecebfaf9f9a9903ad134df6c321d7b52b7c0553281ac105a93f1c3b0b06582b40cb77fafe021f17e08e5f9d20fb39fa54aaccd7103199b63a43e789f739bd2360c1234a3041bf62491b3c5ac38933affc93567c1ecaac4f7508ebd6fb1617226e53e356cc989bfc438cd8d0c7b42f114880a2918126d34c2a71ff1b3113d919065add66682018cbbed37ebf8e7d25266ba3afff49afe4b3e6b8008052f0b3fe251c49a0e41688777a1a80678c3769f263d4ccd5138b7c3870f6c645c7080d3bce2b976a9aa094a1011e24db232985d2838370783705eee3df5d2bed2993bd9f3e65cbd54ad571d724e9e83046a560a40bc50159d53bcae265c6bb8dd00ae659cb387ccbb966c54bb19558f8614b77bbea8a703f79cb5091e09e166d702f9c507246e9e8449d653a36028eba6622fd7c14071aec81a9cc0a79d8473ef55fb896884370e2c311fd1bcbdf68d6273131db63e119d38e6196f63bc77af4b4d1bcddc8e67a118c1e93cd3b1f4eb9f98816104b02a1f5a045ff5bf35c6b2e5e5eace9fcc0a84e10c20effdff6deb4b7c63ce170ec8087d7978b4d3410e5023b9ab7abe885ff5786019306fad637608c0d49ef939e409e692f11dd9818c5a4ee25f43e0fdf70b13feae844079d78cb2c5d44b2d8e973db49104bb316502c5c33c38383a03b6792522551ce510aa1e31237f8a0971a537c8f5c899a9801925fe34142633a01d76f904cd2e9bdf25e0cd9b2865e29cea06c361056cf5227e32c8ebfd18c378992549260f4af32c6b11643190ea00befbe150232fd54598d000006cd09a94b2a1ebed61fe7d214ee9d350282da342de2b364177095cebdd171abdd9784909a2390a96e1765441989ce4e168c96d859de49a22c4d243cfc474a49c041b366dbb30d9007bf5ddfea52e98c298858f184b997b88fba884933b770c5fe64e99da29436b0d99709d458707ba88b6f4ab44f3ef20e123241181fd6ad2276a33fa84376f51d27052b556a70f98d690d474cceb26101e8033712c606a8a9eef5664b0da65fdbfb51dbfa96951faac968e9ef27502ab13236e94876518af4e3d6261dccd0bb479317d3f3b518691e975d43a64806d6eaeb0c7553d084481514e6fe4489c1294b1ccac167ed870306561482650fa801c95a8154c3fc6ea3eaa9f0a84d15d7c508ea840a123e31bd46b57771056e4c73e3eaa1024d98c07c7d4ff8dca56c9abe6cdadcbc476406c9e2e755437f1b0a631a74beb945d22fe73e6db2ed092f33b69e3f91775a4f7b01b07cbdcdc76df6af9f49d3c9d7a82181eeebd22ed14505ac6ada8cc64418ac9da80730305d8ecc67b", 0x1000, 0x1}], 0x0, &(0x7f00000005c0)={[{@journal_checksum}, {@init_itable}], [{@fsmagic={'fsmagic', 0x3d, 0x80000001}}]}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) 13:28:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x4) openat(r0, &(0x7f0000000380)='./file0\x00', 0x0, 0x10) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) r1 = syz_io_uring_setup(0x0, &(0x7f0000000200)={0x0, 0xdd89, 0x2, 0x2, 0x392}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000400)) clone3(&(0x7f0000000440)={0x80202800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000500), {0x3f}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000004c80)=""/102400, &(0x7f0000000100)}, 0x58) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_aout(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="0b018001800300007d02000001000000cd010000f63900000000000000000000d130c4f232a886e5b28ff1391a08808fd9c6a11b9c78e297d6f7c54d76d6100aad720876ae3f2988df6c3814c0834f171f15ff0fb7bc57bd16f6ecac769e767384ab42fb1c98d63d08a6956c0da279ebd6709e8216a497887fa1437e1a93df09c57039fdb6ac93effb7074455c3fd237d1593dc6e2f3d0754412cb00"/1435], 0x5aa) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) perf_event_open(&(0x7f0000000b00)={0x1, 0x80, 0x9, 0x3e, 0x7, 0x8, 0x0, 0x401, 0x8100, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7ff, 0x1, @perf_config_ext={0xff, 0x5096ba50}, 0x12062, 0xffff, 0x4ad, 0x7, 0x7, 0x2, 0x4, 0x0, 0x1ff, 0x0, 0x6}, 0x0, 0x3, r2, 0x6) 13:28:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xeffdffff}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 2073.370073] random: crng reseeded on system resumption 13:28:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, 0x0, 0x984d22dfff7f1e43, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x40, 0x20, 0x6, 0x6, 0x0, 0x7, 0x20004, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x221, 0x4412da89, 0x80, 0x3, 0xfffffffffffffffe, 0xfffffff8, 0x4, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x2) [ 2073.396446] Restarting kernel threads ... done. 13:28:57 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x0, r1, 0x8) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x8, 0x8, 0x4, 0x0, 0x0, 0x4, 0x20e2d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x87f, 0x2, @perf_config_ext={0x4, 0x101}, 0x2400, 0x3, 0x8, 0x2, 0x80, 0x2, 0xfffd, 0x0, 0x3, 0x0, 0x7}, r3, 0x7, r0, 0xa) 13:28:57 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:28:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:58 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40a80, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r4, 0x0, 0x0, 0x87ffffc) r5 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r5) r6 = fcntl$getown(r4, 0x9) perf_event_open(0x0, r6, 0x0, r3, 0x8) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, 0x0, 0x220) ioctl$KDFONTOP_COPY(r7, 0x4b72, &(0x7f0000000040)={0x3, 0x1, 0x1f, 0x1a, 0xeb, &(0x7f0000000ac0)}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100898b6a0c0000", @ANYRES32=r4, @ANYBLOB="01000000000000002e2f66696c653100"]) fsetxattr$trusted_overlay_redirect(r8, &(0x7f0000000340), &(0x7f0000000380)='./file1\x00', 0x8, 0x2) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x81, 0x0, 0x0, 0x0, 0xa3, 0x200, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x4120, 0xffff, 0x69d, 0x0, 0x3f, 0x4, 0x7, 0x0, 0xd0, 0x0, 0x4}, r6, 0x7, 0xffffffffffffffff, 0x0) fchmod(r1, 0x81) r10 = dup2(r9, r0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x1, 0x3, 0x20, 0x0, 0x0, 0x2, 0x31420, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180)}, 0x280, 0x6, 0x6, 0x4, 0x95, 0x5, 0x81, 0x0, 0x4, 0x0, 0x10000}, 0xffffffffffffffff, 0x3, r10, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f00000003c0)='@\x00') 13:28:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x129) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f0000000040)=0x1c, 0x80000) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:28:58 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x6, 0x2300) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000240)=0x5) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ab2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e21, 0x0, @loopback}}, 0x0, 0x0, 0x44, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0xffffffff, @local, 0xfffffffd}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r1, 0xb58a, 0x100000001, 0x2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r4, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r5, 0x0, 0x0, 0x87ffffc) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x410840, 0x144) 13:28:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xf6ffffff}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:29:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0x3f, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b8000000190001000000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000a00008000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff00"/109], 0xb8}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp\x00') pread64(r2, &(0x7f0000000300)=""/138, 0x8a, 0x7) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0xa2800, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=@other={'lock', ' ', 'mem'}, 0x9) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000280)) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:29:15 executing program 5: chdir(&(0x7f0000000440)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) pwrite64(r2, &(0x7f0000000480)='>', 0x1, 0x803fffd) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400020, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7690}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendfile(r3, r0, 0x0, 0xfffffdef) statx(r3, &(0x7f0000000000)='./file1\x00', 0x100, 0x8, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) pwritev(r4, &(0x7f0000000400)=[{&(0x7f0000000080)="e0f7afb95c820d7ac8a1e22a595a5006828282ab2aaa8620d51fb4ae7e6fc53696252c8edb43f99ba10600b1499f12b2", 0x30}, {&(0x7f0000000300)="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", 0xfd}], 0x2, 0x80000000, 0x3ff) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0x7, 0xffffffffffffffde) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x80000, 0x43) ftruncate(r5, 0x2) 13:29:15 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:29:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:29:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:29:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:29:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xffffff7f}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:29:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7fe0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) r1 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)='syz', r1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0xa7, 0x9, 0x1, 0x0, 0x4, 0x9800, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0xe10, 0x8, 0x5, 0x7, 0x80000001, 0x6, 0x2ffb, 0x0, 0x7, 0x0, 0x1}, r0, 0xf, 0xffffffffffffffff, 0xa) 13:29:16 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:29:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x1, 0x8, 0x1f, 0x0, 0x5, 0x4000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80000001, 0x2, @perf_config_ext={0x9, 0x6}, 0x13000, 0xd061, 0x1, 0x6, 0x6, 0x9b, 0xfff, 0x0, 0x12, 0x0, 0x4}, r0, 0xd, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:29:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x101042, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/rcu_normal', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file2\x00', 0x8021, 0x2) sendfile(r0, r1, 0x0, 0x3) 13:29:32 executing program 6: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0) syz_open_dev$vcsa(0x0, 0x496, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) 13:29:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:29:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) io_setup(0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_submit(0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) r2 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$notify(r2, 0x402, 0x80000009) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000001c0)=[0x0]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000440)=ANY=[@ANYBLOB="00010000000000000a004e2100080000fe8000000000000000000000000000bb010000000000000000000000008000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000a004e2200000007fe8000000000000000000000000000bb02000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000040fe800000000000000000000000000023d60a00"/400], 0x190) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) statx(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x6000, 0x7ff, &(0x7f0000000880)) 13:29:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xfffffff6}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:29:32 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_WDS_PEER(r1, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0101000000000000000242001b0008000300273445ba7a3cfb99efac5eb558b83f727cffd111c04b465bb4608013", @ANYRES32=0x0, @ANYBLOB="0c00990000000000000000000a000600ffffffffffff0000"], 0x34}}, 0x0) 13:29:32 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000480)={0x40010000, &(0x7f0000000180), &(0x7f0000000300)=0x0, &(0x7f0000000340), {0x12}, &(0x7f0000000380)=""/185, 0xb9, &(0x7f00000006c0)=""/4096, &(0x7f0000000440)=[r1, r1, 0xffffffffffffffff, r1], 0x4}, 0x58) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, 0x0, 0x220) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xe5, 0x7, 0x7f, 0x0, 0x4, 0x400, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x7}, 0x10800, 0xf36, 0x2, 0x5, 0x6, 0x58ae, 0xec, 0x0, 0x7, 0x0, 0x200}, r3, 0x2, r4, 0x2) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r6, 0x0, 0x0, 0x87ffffc) r7 = fcntl$getown(r6, 0x9) perf_event_open(0x0, r7, 0x0, r5, 0x8) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r8, 0x0, 0x220) kcmp(r1, r7, 0x3, r8, r2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x4010, r0, 0xe4452000) write$binfmt_aout(r9, 0x0, 0x220) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000100)={0x5, 0x80, 0x6, 0x1, 0x38, 0xff, 0x0, 0x1, 0x80a22, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x200, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x80, 0x0, 0x5, 0x1, 0x1000, 0x401, 0x9, 0x0, 0x80, 0x0, 0x3}) 13:29:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r3, 0x0, 0x0, 0x87ffffc) r4 = fcntl$getown(r3, 0x9) perf_event_open(0x0, r4, 0x0, r2, 0x8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r5, 0x0, 0x220) clone3(&(0x7f0000000380)={0x20000080, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240), {0x15}, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=""/73, &(0x7f0000000340)=[r4, r0], 0x2, {r5}}, 0x58) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r1, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)=@keyring) getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000280), &(0x7f0000000480)=0x4) request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000040)='%{!,[,\x00', r1) 13:29:32 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, 0x0, 0x220) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, 0x0, 0x220) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) recvmmsg$unix(r0, &(0x7f0000000dc0)=[{{&(0x7f0000000340), 0x6e, &(0x7f00000007c0)=[{&(0x7f00000003c0)=""/21, 0x15}, {&(0x7f0000000400)=""/228, 0xe4}, {&(0x7f0000000500)=""/195, 0xc3}, {&(0x7f0000000600)=""/72, 0x48}, {&(0x7f0000000680)}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/82, 0x52}], 0x7, &(0x7f0000000840)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000900)=""/234, 0xea}], 0x1, &(0x7f0000001000)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001000000000000000010000000100000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="350c80a9ffffffffffff0000000000"], 0x78}}, {{&(0x7f0000000ac0), 0x6e, &(0x7f0000000c80)=[{&(0x7f0000000b40)=""/140, 0x8c}, {&(0x7f0000000c00)=""/70, 0x46}], 0x2}}, {{&(0x7f0000000cc0), 0x6e, &(0x7f0000000d80)=[{&(0x7f0000000d40)=""/4, 0x4}], 0x1}}], 0x4, 0x0, &(0x7f0000000ec0)={0x0, 0x3938700}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300), 0x40, &(0x7f0000000f00)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@fscache}, {@access_uid={'access', 0x3d, r3}}, {@access_uid={'access', 0x3d, 0xee00}}, {@afid={'afid', 0x3d, 0x9}}], [{@obj_type={'obj_type', 0x3d, '%{!,[,\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '.%!,\'-\xc8[:-,-'}}, {@subj_role={'subj_role', 0x3d, '\xcf%$@'}}, {@dont_appraise}]}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x0, r0, 0x7258, 0x80000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x7, 0x5, 0x3, 0x38, 0x0, 0x101, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0xa002, 0xf2b6, 0x7fff, 0x4, 0x6, 0x6, 0x40, 0x0, 0x6, 0x0, 0xffffffffffffda83}, r4, 0x1, 0xffffffffffffffff, 0x8) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) [ 2107.676240] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2107.694833] device lo left promiscuous mode [ 2107.710769] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2107.725449] device lo entered promiscuous mode 13:29:32 executing program 5: prctl$PR_GET_NAME(0x10, &(0x7f0000000200)=""/133) syz_emit_ethernet(0x24e5, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0xc5, 0x7, 0x6, 0x0, 0xfffffffffffffffa, 0x1, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0xffffffffffff023c, 0x3}, 0x40, 0x2, 0x98, 0x9, 0xfffffffffffffffd, 0xffffffe2, 0x3ff, 0x0, 0x8dd, 0x0, 0x34}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x2) 13:29:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x2, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 13:29:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x11, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x7, 0x0, 0x0, 0x0, @str='{:\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @uid=0xee00}]}, 0x24}}, 0x0) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, 0x0, 0x220) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000080)={r2, 0x9, 0x100000001, 0x3}) 13:29:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) 13:29:32 executing program 4: io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x20010, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0xba, 0x6, 0x3f, 0x5, 0x0, 0x200, 0x40000, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfc, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0xa0, 0x3, 0x40100000, 0x6, 0x2, 0x486ca9f7, 0x7, 0x0, 0x623, 0x0, 0x40000000000}, 0x0, 0xc, r0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x35c3, &(0x7f0000000180)={0x0, 0xa33e, 0x4, 0x3, 0x1f4}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0xa94, &(0x7f0000000440)="93671705d9f115264e075b05bb65fc2504540c184395841eb8d7e9c58c2ded9b96842b0fb61aa34e41bad7678599e10bd5bef89dee98ec4db8e108") ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) copy_file_range(r6, &(0x7f0000000300)=0xffffffffffffffc0, 0xffffffffffffffff, 0x0, 0x1, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) copy_file_range(r7, &(0x7f0000000040)=0xffffffffffffffc0, r7, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r5, 0x5, 0x0, 0x0) gettid() socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000240)=[r4, r3, 0xffffffffffffffff, r7], 0x4) [ 2108.026213] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2108.042250] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:29:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r4, 0x0, 0x0, 0x87ffffc) r5 = fcntl$getown(r4, 0x9) perf_event_open(0x0, r5, 0x0, r3, 0x8) r6 = fsmount(r0, 0x1, 0x2) clone3(&(0x7f0000000400)={0xc4084180, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x41}, &(0x7f0000000280)=""/202, 0xca, &(0x7f0000000180)=""/57, &(0x7f00000003c0)=[r2, r2, r1, r1, r5], 0x5, {r6}}, 0x58) VM DIAGNOSIS: 13:34:33 Registers: info registers vcpu 0 RAX=ffffffff844094f0 RBX=ffffffff854328c0 RCX=ffffffff843ea842 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000000 RSP=ffffffff85407e20 R8 =0000000000000001 R9 =ffff88806ce34f03 R10=ffffed100d9c69e0 R11=0000000000000001 R12=fffffbfff0a86518 R13=ffffffff85d09410 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff844094ff RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe541d058000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe541d056000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f5af3874010 CR3=000000000cdb0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffff00000006be203b5c2da5cff3d146 XMM02=6d723ac76396648541f84f5252376e43 XMM03=8f9c0a5081d6a979ad44b98d3818f2cc XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=0e0d0c0f0a09080b0605040702010003 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff844094f0 RBX=ffff888008d85040 RCX=ffffffff843ea842 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000001 RSP=ffff888008df7e58 R8 =0000000000000001 R9 =ffff88806cf34f03 R10=ffffed100d9e69e0 R11=0000000000000001 R12=ffffed10011b0a08 R13=ffffffff85d09410 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff844094ff RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe6662c0d000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe6662c0b000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f1da545f718 CR3=0000000015a3c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004190cf61e0000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000