, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) (fail_nth: 2)
13:06:12 executing program 4:
syz_mount_image$iso9660(&(0x7f0000000880), &(0x7f00000008c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="736d61636bd2987e65b2cd727221823e532d686673726f6f290a2b2c00"])
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)={0x77359400}}, 0x6)
[ 707.953403] FAULT_INJECTION: forcing a failure.
[ 707.953403] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 707.954733] CPU: 0 PID: 6010 Comm: syz-executor.5 Not tainted 6.2.0-rc1-next-20221226 #1
[ 707.955547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 707.956368] Call Trace:
[ 707.956642]
[ 707.956892] dump_stack_lvl+0x8f/0xb7
[ 707.957318] should_fail_ex.cold+0x5/0xa
[ 707.957770] _copy_to_user+0x2e/0x150
[ 707.958175] simple_read_from_buffer+0xd0/0x170
[ 707.958696] proc_fail_nth_read+0x19c/0x230
[ 707.959151] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 707.959661] ? security_file_permission+0xb5/0xe0
[ 707.960179] vfs_read+0x257/0x940
[ 707.960576] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 707.961099] ? __pfx_vfs_read+0x10/0x10
[ 707.961543] ? __fget_files+0x270/0x450
[ 707.962014] ksys_read+0x12b/0x260
[ 707.962417] ? __pfx_ksys_read+0x10/0x10
[ 707.962845] ? syscall_enter_from_user_mode+0x21/0x50
[ 707.963371] ? syscall_enter_from_user_mode+0x21/0x50
[ 707.963915] do_syscall_64+0x3f/0x90
[ 707.964327] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 707.964857] RIP: 0033:0x7f629f0b769c
[ 707.965252] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 707.966976] RSP: 002b:00007f629c67a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 707.967727] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f629f0b769c
[ 707.968421] RDX: 000000000000000f RSI: 00007f629c67a1e0 RDI: 0000000000000004
[ 707.969134] RBP: 00007f629c67a1d0 R08: 0000000000000000 R09: 0000000000000000
[ 707.969851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 707.970553] R13: 00007ffe3cb201ff R14: 00007f629c67a300 R15: 0000000000022000
[ 707.971309]
13:06:12 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:06:12 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xc000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:06:29 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:06:29 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:29 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
sendmsg$NL80211_CMD_CHANNEL_SWITCH(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000b80)={0x8f0, r1, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_CSA_IES={0x58, 0xb9, 0x0, 0x1, [@beacon_params=[@NL80211_ATTR_IE_ASSOC_RESP={0x20, 0x80, [@ht={0x2d, 0x1a, {0x2, 0x0, 0x0, 0x0, {0x2, 0x50, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x6, 0x3, 0x5}}]}], @NL80211_ATTR_CSA_C_OFF_PRESP={0x8, 0xbb, [0x20, 0x20]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0xe, 0xba, [0x60, 0x9, 0x3, 0x40, 0x6]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0x8, 0xba, [0x1, 0x3]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x12, 0xbb, [0xffff, 0x3, 0x80, 0x3, 0x4, 0xa2dd, 0x2]}]}, @NL80211_ATTR_CSA_IES={0x80c, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x14, 0xbb, [0xffff, 0x3250, 0x45de, 0x100, 0x3a34, 0x4, 0xa5c0, 0x6]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x8, 0xbb, [0x4, 0x3]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0xa, 0xba, [0x0, 0x6, 0x28ab]}, @beacon_params=[@NL80211_ATTR_IE={0x1f9, 0x2a, [@peer_mgmt={0x75, 0x16, {0x0, 0x6c3, @val=0x200, @void, @val="9f00400f36a669e87fcbc8477280986c"}}, @perr={0x84, 0xc8, {0x8, 0xc, [@not_ext={{}, @broadcast, 0x34, "", 0x29}, @ext={{}, @device_b, 0x36d3, @device_b, 0x22}, @ext={{}, @device_b, 0xb9, @device_a, 0x1}, @not_ext={{}, @broadcast, 0x0, "", 0x38}, @not_ext={{}, @device_a, 0x7f, "", 0x3b}, @not_ext={{}, @device_b, 0x7, "", 0xc}, @not_ext={{}, @broadcast, 0x4, "", 0x28}, @ext={{}, @device_a, 0x7fffffff, @device_a, 0xb}, @ext={{}, @device_a, 0x8fb1, @device_b, 0xd}, @ext={{}, @device_b, 0x9, @broadcast, 0x29}, @ext={{}, @device_b, 0x1, @device_a, 0x20}, @ext={{}, @device_a, 0x7, @device_a, 0x1e}]}}, @challenge={0x10, 0x1, 0xb2}, @ht={0x2d, 0x1a, {0x4000, 0x0, 0x3, 0x0, {0x4, 0xff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, 0x6, 0x20, 0x3}}, @ht={0x2d, 0x1a, {0x2, 0x3, 0x4, 0x0, {0x5, 0x1f, 0x0, 0x3, 0x0, 0x1, 0x1, 0x3, 0x1}, 0x1, 0x5, 0x7f}}, @measure_req={0x26, 0x50, {0x20, 0x13, 0x2, "e1a7d9afc5104529f4f75c65854ef95f3b5ba9ba337232ea9d6365d91ccd0ef8658dd6f53b9ef94d31387a6b349e6a8b7d46de8ad4af3633284776b02c0ae19a3d7b3022af36d0ea2931e1f9b0"}}, @preq={0x82, 0x62, @ext={{}, 0x8, 0xbf, 0x81, @broadcast, 0x7, @device_a, 0x9, 0x20, 0x6, [{{}, @broadcast, 0x5}, {{}, @device_a, 0x7fff}, {{}, @device_a, 0x7ff}, {{}, @broadcast, 0x7f}, {{}, @broadcast, 0x7}, {{0x1, 0x0, 0x1}, @device_b, 0x6}]}}, @ht={0x2d, 0x1a, {0x1, 0x0, 0x4, 0x0, {0x6, 0x9, 0x0, 0x9, 0x0, 0x1, 0x1}, 0x300, 0x1, 0x1}}, @peer_mgmt={0x75, 0x4, {0x1, 0xff80, @void, @void, @void}}]}, @NL80211_ATTR_IE_PROBE_RESP={0xc, 0x7f, [@mesh_id={0x72, 0x6}]}, @NL80211_ATTR_IE={0x1d, 0x2a, [@mesh_id={0x72, 0x6}, @supported_rates, @ibss={0x6, 0x2, 0x5}, @sec_chan_ofs={0x3e, 0x1, 0x1}, @channel_switch={0x25, 0x3, {0x1, 0x80, 0x1}}, @challenge={0x10, 0x1, 0x6e}]}, @NL80211_ATTR_BEACON_TAIL={0xf4, 0xf, [@mesh_config={0x71, 0x7, {0xffffffffffffffff, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x5, 0x9}}, @erp={0x2a, 0x1, {0x1, 0x1, 0x1}}, @tim={0x5, 0xbc, {0x0, 0xdb, 0x7, "85d083ecdef039b4616b0f2ddb4f620d5c20e75b9bff462c3f2ef7dfde457322b7f2547a089b45890115cd426561b129a44ebe8106a6f56e202b851419407f2fe05cfa1e833a4600668e3dae4f29b587ccc594b8b462059d310e38d2df22e5c3a622e2337829eb3d5749bdfd4c87a481647d3259421967e8db7f4be46ae01bc52f7879ace6ca312f343be8bc4b000c2f4d967c0f642651753044568a0cf22d0d8c90b9e8bd74e54f60b593c555fb4ff85e9de4dcb69e804be0"}}, @link_id={0x65, 0x12, {@random="7ae074587f95", @device_b}}, @mic={0x8c, 0x10, {0xa89, "6136a255e73f", @short="db0fea7cea911b46"}}]}], @beacon_params=[@NL80211_ATTR_IE={0x42, 0x2a, [@sec_chan_ofs={0x3e, 0x1}, @erp={0x2a, 0x1, {0x0, 0x0, 0x1}}, @prep={0x83, 0x1f, @not_ext={{}, 0xdc, 0x5, @broadcast, 0xffffffff, "", 0x8, 0x668000, @broadcast, 0x8a}}, @rann={0x7e, 0x15, {{0x1, 0x31}, 0x80, 0x6, @device_b, 0x7, 0x8e0, 0x8001}}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x175, 0x80, [@measure_req={0x26, 0xf4, {0xe8, 0x2, 0x1, "f256ad9db188ad6496162861a5c12661080ae5079c6a42e7dfde304d85f526a29e9e316c7a390ab6a2f904da4cf39ac48ea0f43a8d03b8e291d04f3d25f40fbb05265be41db6b945693cf1b4b7634ae63c465e123ec5ce9f33a99195dde641c2519cb6f941d565a3afeacc5c7e5a517bb49d82793e64210f766b6991f0130986d691ada09edf6ebfe302ceef38bf42ccf29c937fa8dfe3616dfe38123c95f99cdca5c339c29497c59bf4a68ae40a7e2fc411435c0c68dc3a9e67f0eb704c2043b2d11c0ff7c41a51923ae9d8a4309b182dee7ffe72a81cd5489051219fe7da1f5b6e1906a9876f15165e633ee1bb98d5d3"}}, @fast_bss_trans={0x37, 0x79, {0x3, 0x2, "91a38d029976b3fbe88f728e080f2548", "b30cd37c13aa490117ba24f3ee972bf5a40b23d78bac58a489a2103855000ab6", "a6d17ffb2b8bfd7351b7098841899b1d504b5b6589f34266bd80c3de870f0417", [{0x2, 0x1f, "c186afb203ebee67a0c4906c81df35880e29dc7948c75c8880152fa5279f97"}, {0x3, 0x4, "88a28b73"}]}}]}, @NL80211_ATTR_IE={0x14, 0x2a, [@ssid={0x0, 0x6, @default_ibss_ssid}, @mesh_chsw={0x76, 0x6, {0x3, 0x72, 0x34, 0x7}}]}, @NL80211_ATTR_FTM_RESPONDER={0x138, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x47, 0x2, "ce2477958be101af9540b6ae292547e6b2f3a7638800f5ccfa5bc90bd4cd1761b435565ff14af3a20717bfe7f8095b2b96269fc4746630d2750c86598c46457acdb4be"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x41, 0x3, "4eef5da00cd5330cb6814756c5c8bb28b49d0e9e27253393539790a7cb7c90afbd4620266d093f35a3bfc0b86abdd62cc5118c46d3a837d3c6d5234f7c"}, @NL80211_FTM_RESP_ATTR_LCI={0x83, 0x2, "e7551d2e4a3b14a28835de4568da89a9bed78dd299d15d9e2bd3970d1518f6094b2c49fbc6c5fa76bbab222c70d865f3f84da860fbae69bf14b85cafd29fea66fbb9ed8f68afde4291d7bf71a8b38eeafe9f3cc10241851c43d4e4d5b42bb80c5cef473f1d43a1bc9000f86fc5fe74f7d82463793d2afeb00d3ee3bf358f79"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x1c, 0x3, "34c7267f583d800ae6bb6a4bab9f864ad4031ecef191e5e0"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_BEACON_TAIL={0x1a1, 0xf, [@random_vendor={0xdd, 0xc2, "848b89030a7a870dc3ac796c686ea962fe507f080f657a59e4959dfdedbc7db36ee469e19be8f01faf47b1390849f84fdfbb371df8ada429ca91a421c14ad5740fa56c7be8527807500a8c5dbe06e56cfb60da52bf42dcec82b3bbbcf2bd9dee4ff85ca9405825df342cc3e1dfdf8d85914d491cdaa8f6a615c71c4b19e99409b4942d61b5eab8e80de7a1c73793b0f19f51f132030be7bebf1f6fbe4e0946bce5f7e5788ddc00964c1919480dc503da4663292f0368fe05e0225cf4dacb2036b8a5"}, @sec_chan_ofs={0x3e, 0x1, 0x1}, @random={0x8, 0x7a, "9cb5d0fa1d6086bf361b5c08fcec01072563ee67b8cc9a0aa50d564a6644666c7faa2829d54788c57fb0ade2e7397602bee9f7129476047e1921edba1cdca903be03e56288de345ba5fbc7239de226b2fd934d2c86fa053be645323da46aa7d9b6cb1cd5434b781fa414ab94d255cc1cf71ceb534f0c9573bd34"}, @mesh_chsw={0x76, 0x6, {0x9c, 0x64, 0x18, 0x1ff}}, @cf={0x4, 0x6, {0x5, 0xc0, 0x1, 0x4}}, @supported_rates={0x1, 0x5, [{0xb, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x1b}, {0x24}]}, @preq={0x82, 0x41, @ext={{}, 0x6, 0x9, 0x9f, @broadcast, 0x5, @broadcast, 0x8001, 0xff, 0x3, [{{0x1, 0x0, 0x1}, @device_a, 0x3f}, {{0x1}, @device_b, 0x7f}, {{0x1, 0x0, 0x1}, @device_a, 0xf4}]}}]}], @NL80211_ATTR_CSA_C_OFF_PRESP={0x16, 0xbb, [0x7, 0x4, 0x1000, 0x2, 0x1, 0x5, 0x401, 0x5, 0x6]}]}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x340}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xd}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4dce}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x200}], @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1ff}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2b}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}], @NL80211_ATTR_CSA_IES={0x20, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x14, 0xbb, [0x5, 0x4dc, 0x7, 0x7, 0x4a, 0x0, 0x1c, 0x5]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0x6, 0xba, [0xc99]}]}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x84}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0xf5}]}, 0x8f0}, 0x1, 0x0, 0x0, 0x20008085}, 0x4)
fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0))
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="030000000000000000007300000008000300", @ANYRES32=r4], 0x34}}, 0x0)
13:06:29 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:29 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
sendfile(r0, r0, 0x0, 0x100000)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'})
r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
recvmsg$unix(r2, &(0x7f0000001840)={&(0x7f00000001c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/45, 0x2d}, {&(0x7f0000001280)=""/246, 0xf6}, {&(0x7f0000001380)=""/32, 0x20}, {&(0x7f00000013c0)=""/205, 0xcd}, {&(0x7f00000014c0)=""/169, 0xa9}, {&(0x7f0000001580)=""/4, 0x4}, {&(0x7f00000015c0)=""/95, 0x5f}, {&(0x7f0000001640)=""/246, 0xf6}], 0x9, &(0x7f0000001800)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x40}, 0x40000000)
mount$9p_xen(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', &(0x7f0000000180), 0x401, &(0x7f0000001880)={'trans=xen,', {[{@access_uid={'access', 0x3d, r4}}, {@loose}, {@mmap}, {@cache_mmap}, {@posixacl}, {@loose}, {@privport}, {@afid={'afid', 0x3d, 0xffff}}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}})
fallocate(r3, 0x0, 0x0, 0x87ffffc)
13:06:29 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xc03e, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:06:29 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:06:29 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
fcntl$getown(r0, 0x9)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:29 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:29 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000040))
13:06:29 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:29 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x33fe0, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:06:29 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
[ 725.382947] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure
13:06:29 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}], 0x0, &(0x7f0000013e00)=ANY=[@ANYBLOB])
13:06:29 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:29 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040))
13:06:29 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:06:30 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x34000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:06:30 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
[ 725.630926] 9pnet: Could not find request transport: xen
13:06:30 executing program 5:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
r1 = syz_mount_image$iso9660(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x7, 0x9, &(0x7f0000002780)=[{&(0x7f0000000280)="1e118de0270bd8f396c627bcb875e624d949cfcaf465ac9505ddaa34f26d9fa73d97f9a4318bcd1766548f8eefd3f300667722b3a465a207e29e7a44e9aeb40cfc774cc1cdc2c5ee234b38afb64503062b4888c6cdfc27c42a58c52bc58f93b3853ac2c842f66935a0eb79eb93b69d6c6e960f05836579a6549af3bae838560aa98c01e7f6effdb42714950208ef5de17a58a4726324c8f01cacf84543db600e8d3a252f640b5fd8feac386ae70f65bf5960e1e9e36670f02b21539d81c9c3fb20ff1bcd8f1efefbab3bc572f81a6f4b19797fcf62874f5971f5b361cb4213672994f8d74d99c2422944127d2108f8", 0xef}, {&(0x7f0000000380)="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", 0x1000, 0x2e}, {&(0x7f0000001380)="e901f66498cd44", 0x7, 0x1}, {&(0x7f00000013c0)="e4174fce79d64a2e50a0575f9678fc3fe083fc3046fbb0aa64411190cd38cadb7e52e71b67e15f5c2454707a6b5c1739176569b1b989b624f63fe312d0c732c9a3a571c19b8755f8f1b98aa156ace328640b4f0b4cfbeae884561ba39c4ca0a5c206c0cdb130afcba40da189f79149a26fc65daccb9267ece5b0e5a8d6d25ae516405abe241905bf9444ba0efbf7f2957e86efa2989a57f3c7ee5bcc27c81fcf5f24f0114cf195a4cd6a63d56344473f3d76", 0xb2, 0xc1}, {&(0x7f0000001480)="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", 0x1000, 0xfffffffffffffffc}, {&(0x7f0000002480)="4a940ea4e35e2ed14edb41d1bbd9d451f6d54304b6fd2f926d44099a281ef264daa05773dbb6cb02f1712033323b5d115070ad7d3dfc7a306113a90822caabcc0f3060bcf6b7b3a9e85f74b09d2b95659292f378", 0x54, 0x101}, {&(0x7f0000002500)="78ccaeef006825fb200224cd9a5e259bca56752f20a92091256aad1402b525c38ca042faf68a38ae78cb6765ed9e7746ba62494390d132a72bf77addd01dec46d313e5d37e9f60fb3afc37b07bb0674ac31ecbecfd64837c30a0ba3f9001e17629d71a39d151603bbb2dc052cf7b1764882d76638a14e366cf12712c4b03b5740739f98fe40b17d016c2b4a9ff04e3ce6975b19d04b09ada44be0c8b13455ddc19ad8e39dc7a8c10b3551c7277aae0", 0xaf, 0x98f7}, {&(0x7f00000025c0)="ce3c2ac3330c4c0802ce6680adda95336e9959a32d59d74bb43a342389fc104d94b98e1a8c291b34e5f016289d6ea05584f1769f5c2aedde0724626ccc3693e52a55725b3987e68cd52b857dc23c6ae9cf40c7326e9588cf2ae5636d29c9480180a12cfa4e86c7602b015e1c5eaf429e18ba6008fbda5fc163f2dbf06507b63520852ff7cee7a24acf78086bde57462206e5715a99c9e81c78a8cbaf923e2b66dcdd09f25c78d36039bd96b5a2478b9cafce16f7eb6f3a0532861702159e9ab4a89794ad3216d4c0ade5711554cdee6977", 0xd1, 0x8001}, {&(0x7f00000026c0)="b280a802f801e9ca51535ea5ec9d503669440577bef34fb3d3b149b3d82f7dba7a5d3fd9ed2abcffabe4f247c7f1a7b1df2b14c62e52e0c88e5e2cd9dcda378e5474ef6cb4c16efc397d6946692ce79a6f460b0fb9ecc68f93fc8aef88e2030f2b34324265913e74dcc96a511342299c32064f2a64653305974317125c3783aa6e89", 0x82, 0x7}], 0x40, &(0x7f0000002880)=ANY=[@ANYBLOB="6f76657272696474667c08dd616b38", @ANYRESHEX, @ANYBLOB=',uid=', @ANYRESHEX=0xee00, @ANYBLOB=',uid>', @ANYRESDEC=0xee01, @ANYBLOB=',defcontext=system_u,\x00'])
sendfile(r0, r1, &(0x7f0000002900)=0x5, 0xffffffffffffffff)
r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = signalfd(r1, &(0x7f0000002940)={[0x6]}, 0x8)
openat(r3, &(0x7f0000002980)='./file0\x00', 0x4000, 0x44)
rename(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00')
r4 = getpgrp(0xffffffffffffffff)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf9, 0x81, 0xa8, 0x1f, 0x0, 0x1f, 0x80500, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x1, 0x0, 0x1, 0x3, 0x0, 0x100, 0x8, 0x0, 0x9}, r4, 0x8, r2, 0x3)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
[ 725.737010] 9pnet: Could not find request transport: xen
13:06:50 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000150a05000000000000000000411fba57"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000200)={{0x0, 0x1000, 0x6, 0x5, 0x107, 0x1, 0xda9, 0x6, 0x7, 0x10001, 0x7ff, 0x2, 0x4, 0x200, 0x400}, 0x20, [0x0, 0x0, 0x0, 0x0]})
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:06:50 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:50 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:50 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:50 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
r1 = dup(r0)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c)
sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0)
symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000004280)={0x0, 0x0, "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", "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"})
13:06:50 executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
truncate(&(0x7f0000002780)='./file1\x00', 0x0)
r0 = socket$inet6(0xa, 0x5, 0x2)
ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x6)
13:06:50 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:06:50 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x40000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:06:50 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:50 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x80000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:06:50 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x1f, 0x6, 0x0, 0x6, 0xc004, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfff, 0x71}, 0x1000, 0x7fff, 0x53, 0x6, 0xfffffffffffffff8, 0x7fffffff, 0xcef, 0x0, 0x10001, 0x0, 0x8000}, r0, 0xc, 0xffffffffffffffff, 0x8)
13:06:50 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:50 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x0, 0x1, 0xf0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0xf4}, 0x1410, 0x7f, 0x4, 0x5, 0x3f, 0x7, 0x800, 0x0, 0x2, 0x0, 0x9}, r2, 0x10, 0xffffffffffffffff, 0x8)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:06:50 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:08 executing program 2:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00')
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0})
perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x3b, 0xc, 0x37, 0x13, 0x0, 0x9, 0x800, 0xd, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x2ff, 0x5}, 0x10, 0x7fff, 0x9, 0x6, 0x5, 0x3, 0x1, 0x0, 0x6, 0x0, 0x5}, 0x0, 0x6, r1, 0x2)
r5 = getuid()
fsetxattr$system_posix_acl(r3, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r4}, {0x2, 0x1, r5}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0)
setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0x3f}, {0xffffffff}], r4}, 0x18, 0x0)
epoll_create1(0x0)
r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
lstat(&(0x7f0000000540)='./file1/file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0})
fsetxattr$system_posix_acl(r6, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r7}, {0x2, 0x1}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0)
setxattr$security_capability(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300), &(0x7f0000000340)=@v3={0x3000000, [{0x100, 0x400}, {0x9, 0x197}], r7}, 0x18, 0x0)
openat(r2, &(0x7f0000000380)='./file1\x00', 0x4400, 0x100)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000005d80)=ANY=[@ANYBLOB="010008000100000018000000", @ANYRES32=r0, @ANYBLOB="050000000000000000"])
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000240)={0x90000000})
mount(&(0x7f00000003c0)=@filename='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='hfs\x00', 0x2000010, 0x0)
13:07:08 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:08 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:08 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:08 executing program 5:
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r0 = syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7ff, 0xa, &(0x7f0000000780)=[{&(0x7f0000000180)="8e2429efd2303757f182663bf3fa49266d48020acaa859f10bd9ae724a141d2e1f3423a090493acfe595d795b155e13b52500ce91e06dbe1b820a1e0a88dfa", 0x3f, 0x10000}, {&(0x7f00000001c0)="9431c3dc421be776b3664e5d40a79835085090bfc381e9d671d0a06ed38224994defeae48cc77b1b642766c138b446b608b10a661a5b37f55f9def6828cbded14fdc4bb4523f4afa02fb9484d93952e8b8eebc3f3694d4aa4480cf45886f02628c6edc0ac84cdd29e21b421b10013d916b484c7e418553ec2793228168990885ea6a9836797b4e9cbffb70eff4698bde5489390666452601c6", 0x99, 0xff}, {&(0x7f0000000280)="380003c9afcca27af1438ac63aa51e13d5d6adfface406b7e5f40f08f9c2ae869ffb4f971d2b983e7d31aaee9506650f17b1bb38df8cd52e4659c0f5324c83fe37c3b0e7f92243ee432af36ffb1a2373dd8d1cf3c5e626510bcb85afa2f0f122d699f2fe856dca444f6172f10fbbd77dfe86fc4b91ad19d47feb6d9fa2b69023475122", 0x83, 0x515c}, {&(0x7f0000000340)="564ec21c9ed4897a331c6edcb7b940a729748a793833bdc86f670b1fd6de605b836a4714fc565900424e9c8e1f0b29a85ccdef4b737e22775f4323675899f564c486ccf46d287d3493e86a6b2288f38edf206cecf8baeb7e7d3fa4add77b9ff3023b6d4b7364781a0a9b432664593a27daf65c03cf9190aa1644661b49e23569f178a5da1929e4c294cb13e104735eb4", 0x90, 0x2}, {&(0x7f0000000400)="405dcb6d82d1208cdc7669e1290cda07f121ad096c221f727671", 0x1a, 0x7e}, {&(0x7f0000000440)="88084f20cab821f019b5fd5b311cfd703989d4cebc8ebf16cc57708fd4e8ce53851e942c8a24f5e9b748f09d3e1392f3332291aa48013e3db8f1814571fff61bde4a94c690ad8f3f96916640e9a7d21fcf19da568c0a262ee374717f10dccb", 0x5f, 0x7}, {&(0x7f00000004c0)="c8cb5532063381934afc75dcc79678f48d46478a2fe3cc0d6790abdc36b74032f8ec8cb2cc5c559448ffb1f7e97c324354ae6b58bbe944e25cf9aaa220683efb40ea87874830b04a1b6da8cd78b64deed04ef0c08abe5e7a159e201c60b741f31597359298a43bd52be589ee8b4c45c1d8cd826d26f653c6ddd7e623e24105c9fd2adcb6b4cca342d3804cd51bdaa576470f9f5aa55b76c7ed929cfdd5aefdc600aaafc7a4ada9effc04b4a53f13de763c5af01c7fac28d396efb4c4500e74daa294ed79561d73daa0b34794278dee39ab95e407df0ec8d6511024dd1026b0ae1055ee742a61d1462d3c759f3fc61214acc60346795f632d95", 0xf9, 0x9}, {&(0x7f00000005c0)="7e03bcff683666372ed70b8a3c85838b1b9e6447318ba14cd7995de7ced6524f718bcd43d5c191e5e2e77b187cd86dd156403daf6d54fa51c3d290cdb40e0d899117cb092d456477fecbd6615c60106870ca63bfba06f81fb2268c7eacd911d0581863ec16e3bfa0c8b22d3f288a5f9dc004e2a911ba1c9b184f4ce28780b10947a4c2ef96a42be6af484209abd5d0e4ea6917d5719f4a2082782e2451bacda8b2b45a13be1d75816230b8015710d5d8", 0xb0, 0x1}, {&(0x7f0000000680)="621ffe87757ccfefe1340946636ebc9eaad0b937aec3523917c36630715ed1a60d3619b4b36a65a28cbef1e1e700e9845a7c47", 0x33, 0x2}, {&(0x7f00000006c0)="751b527880a6b645c4bf0a7f3405c57c00a1aa7c609dcfa01e91456430c64b5b2d8e3c1f348ab3f5a0b6c7aa7974d3e755e4709f333f0bbcef9116d8908d2a7c4f8946c08801c03110df0d86fd11ecd1a4ef57fbcc7192eb6a23401933b8758c3c883e222fb80358b9f4f65ad833c5fd6af33c99431c2703531424ce9e169fa293d0e3f12631748f63f769bc588a4cb7af06664f649ac946355ebac405b8b2fd7dd8da8687e059eb6272ead010ce72f1600621ea65", 0xb5, 0xc7ff}], 0x3000410, &(0x7f0000000880)={[{@nodots}], [{@fsname={'fsname', 0x3d, '.*.-'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@obj_type={'obj_type', 0x3d, '-'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_lt={'uid<', 0xee00}}]})
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r2, 0x0, 0x0, 0x87ffffc)
r3 = fcntl$getown(r2, 0x9)
perf_event_open(0x0, r3, 0x0, r1, 0x8)
capget(&(0x7f0000000080)={0x20080522, r3}, &(0x7f00000000c0)={0x3ff, 0x6, 0x1c, 0x100, 0x3a, 0x7f})
openat(r0, &(0x7f0000000940)='./file0\x00', 0x24840, 0x182)
13:07:08 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0xed, 0x3, 0x7f, 0x43, 0x0, 0x9, 0x40000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp, 0x48, 0x3, 0x1ff, 0x7, 0x9, 0x2, 0x4, 0x0, 0x5e, 0x0, 0x5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8)
io_setup(0x40, &(0x7f0000000240)=0x0)
r3 = eventfd2(0x8001, 0x0)
io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}])
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r4, 0x0, 0x220)
pipe(&(0x7f00000004c0)={0xffffffffffffffff})
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/timer_list\x00', 0x0, 0x0)
r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r7, 0x0, 0x220)
io_submit(r2, 0x6, &(0x7f0000000740)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1, r4, &(0x7f0000000200)="1de689dafc66b3fea26b26361d1abb56da153645c136de4b1e45ef9851c732f429921e1af74d6d227ffd24ae1830a7eaec6efc0bb3ce1b9e3b59afe878c017d1beb886f75ac24dfe029b9664b10161da7266685754cbe0ef36fc061dc32d4a208788ff098e0a91899f4f8d0a97d08fc4577c6d8948a4f92f9502608bb5c25659f98f727885fd3e15977ed1bd760000ed49787fbadb1d78f0", 0x98, 0x34e8, 0x0, 0x3, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x400, r0, &(0x7f00000003c0)="5f444e43e45619e3775e8951833aafb4daed9de6c9be39334c91ede15871dad562d87ead431e2c11825654bb2da8a8f43ef27c8555cbb456db092f542ececabc3c826db9c8a600be0348e61d2e5ed50a332ec5a308a6ba215da6989fbd64db76402cdacf3f56990a0adf7ac4c88f44d152fd328f66fb6949a0cc9699e58ffb3c2bb1b703f64e3b70cd71871f7ee2ab9d7719aa007c1da5fd2e0ed23afa3f57d1913687d4bb33eb6a99f183303d02555e8b2eb1b9646194bc4402ecd3b85d13d0aa27404397e73b3bd4ff625b5c7352fa104302a2f31e23b5a00653b01b55ee0d3b962f2f", 0xe4, 0x7, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x8b72, r0, &(0x7f0000000300)="57974c8d38546921688075e2a65c4ef89027e71695fe14779f95765966d96b0ff7cb03f65dbcd27ba35cff1983389ad34bc9ef3a91f7e361709f7382811618ff2b00fc6ef0ccea9c499dda19b8245440bbf7acc2a4e8b2677e815a41945639855e5dd81505", 0x65, 0x5, 0x0, 0x2, r5}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x6, 0x6, r0, &(0x7f0000000540)="eb5711f97a495f9c1a", 0x9, 0xfffffffffffffff7, 0x0, 0x3}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x2, r1, &(0x7f00000005c0)="2bd5687c923ca63170e8df", 0xb, 0x200, 0x0, 0x3, r6}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x1, 0x5, r7, &(0x7f0000000680)="e839fb984dc4e5200aec48deef5cf657dcb4d681119d1edfb1ee8d7a1d1906eee347f11f91c649467e3aa0f8ebf12d702cdea67691ed5dca345b2b41cb5f6677a47f6b5b7df9208cc6831ed5d1f9227b9e13222a3bbc0d6b7a7c3b0737eb9148af8fa6fd96445cccc48a7c58dcbcd95d93177c98dabaf5ca", 0x78, 0x9, 0x0, 0x0, r1}])
pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0)
r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000780)={'virt_wifi0\x00', @dev})
fallocate(r8, 0x0, 0x0, 0x87ffffc)
13:07:08 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x400300, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:07:08 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:08 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x1000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:07:08 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:08 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
fcntl$getown(r0, 0x9)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:08 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x3010000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:07:08 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc)
r2 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x80, 0xb4, 0x0, 0x1, 0x0, 0x1, 0x9, 0xe, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x0, 0x4, 0x5, 0x9, 0x5, 0x6, 0x0, 0xfffffff8, 0x0, 0x86c}, r1, 0x3, r0, 0x2)
signalfd(r2, &(0x7f0000000240)={[0x5]}, 0x8)
13:07:08 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:08 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:26 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:26 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, 0x0, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
pread64(r0, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0xf, 0x0, "4a8ae298b7fc295b7e19752629decc909c8938c6ad714d683e04c97520650a75154e721c5906ad1832aaccb9b7ec38ca3f886a3d93200087bb419e5776bb1f97c81bc338c5dc39d299dd4988dc0173f4"}, 0xd8)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x5, 0x0, "f2d9f528b3710ff65d6647ff8507ffd7c713301d1b235210d82f9fb111b3f358554f4e80c6fb989cabdadb962f69fece9c56fd2b0a21d29aaeb1cbd983af95ebf751f73960426d35d639a489e0f22845"}, 0xd8)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000001500)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x42, 0x0, "ae41ba3d08ae79cbef4c72343e141dc83dd4a24a447556e055d70b3b61fd7929acb571c66cd984146d66ae44bb567da9a6e26c17246bf5ac5a0b74d1cfdbac75e919f15f27d44a1e807ff95985c6f996"}, 0xd8)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000080000000000000000", @ANYRES32])
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4)
r2 = dup2(0xffffffffffffffff, r0)
perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x3f, 0x5, 0x3f, 0x9, 0x0, 0x1, 0x200, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001, 0x1}, 0x11580, 0x9, 0x5, 0x5, 0x401, 0x9, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0x8, r2, 0x0)
getpid()
creat(&(0x7f0000000000)='./file0\x00', 0x0)
fchdir(0xffffffffffffffff)
ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='?']})
openat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x800, 0x80)
open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x8000)
13:07:26 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:26 executing program 4:
syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff)
clone3(&(0x7f00000017c0)={0x12d00, 0x0, 0x0, 0x0, {0x1002}, 0x0, 0x0, 0x0, &(0x7f0000001780)}, 0x58)
13:07:26 executing program 5:
recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/217, 0xd9}, {&(0x7f0000000280)=""/62, 0x3e}, {&(0x7f00000002c0)=""/99, 0x63}, {&(0x7f0000000340)=""/70, 0x46}], 0x4, &(0x7f0000000400)=""/178, 0xb2}, 0x40}], 0x1, 0x0, &(0x7f0000000500))
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:07:26 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:26 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x4000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:07:26 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:26 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0, 0x0})
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x0, 0x1, 0x8, 0x0, 0xffffffff80000000, 0x68000, 0x7, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2807, 0x0, @perf_config_ext={0x7, 0xfffffffffffffffa}, 0x10002, 0x4, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, r0, 0x8)
13:07:26 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:26 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
fcntl$getown(r0, 0x9)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:26 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:26 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x11000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:07:26 executing program 4:
r0 = memfd_secret(0x0)
write$cgroup_type(r0, &(0x7f0000000140), 0x9)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000001900)={{0x0, 0x0, 0xffffffffad63a9c6, 0x9, 0x25e, 0x8001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x6, 0x0, 0x1ab3}})
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000004280)={0x0, 0x0, "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", "66e27c686346d463a5c12d237acff4192845608625de3e00c853ba6db99bdca8ce66b5d2986a3601702f62b704cdf1e3e8815d60724498fe310408bbef0fa4ee3ab93e2eee10adaf7fe25c3cd174494fbb8a8475418e3fd56d207055d4494ed2a34025e9ca172f7ae5388fa786c085f18ce46a27afa2957e87d3e2b1f1a9686e690a558e6d89141d831349af2a8102e281678f33db2f14ff8aea9281aa22c5bfc275faab2882f156fd38cc76835e391932300a5685e3c0ba9187f12117683de169cb3105f334435db81135dd318868c59a2fb19cd813914557f472377ad23a9b4dff26a50cde18a3a6d50b6abb2aec25324123cc37fac8238d63cd0c78d67c9eff7c8a1523b44f3cd514bffa001e05d3180fa830c0f090c6c7cebd2ffaa9546c5be56c3861313c7614c3298fca09c4a8e931e04b6ef44c5000923637dea858cabb882cd5df1252ba30a4b6e02f151375e481b0456ff7c7f97e846951ec0c7fd223df82548aeaf9d920e7539304fde028bb3ba90ef4e6f5d9be225e0ba4fae5988a87adfcfc7e1368edf8170955966e7cbf83657568dd2b1a3c42f0cc20b9190260cc6536051ecca8ffcc02a86267bf5718ad3c0ab285fd41bfa1e7154b3c24e377685a43be2406514cddc45d02ca954ace3729e27c2d3efc154465c248d6438ebecd96af55b9959797b08fc7571f8e053648b30baa53851d16a5418de7bc9831c08bcecd33cfead167fb360b77961331abfcc8ae6c20a4f7277ac081012eac8e2318d32d3bfb4c8bf6a844d467d52d02bf7807bd9704a3ca7ad184cea56f7f459c76652fe48930ca276bceb95b648f042b54ec2af8da5f38e8648e9ca2aacf7a5760e9148b445b6dbbaca8e420e026a7188466a832c8ebc22dda550c2fe1a6ae8f700d41792be7660821d962d995ddcd19e7e72040947c446df6b40618f985a935feb15485168caafc997ec2416908d48de441a6c444f33ac96f22d7f2b13963983e960622e2ffe27a4f496ed5d02eb0c8e28f09e554a38e252e8eb5066b38ff5524c5966c904bc20f5ff48f444ab9c4f54e0171de6ab92082293139ea1cde517b30f4dc8d9ba98256e31cc5ec20d6ca62cbe254b0f3897b58581c4e73b5777cfddd02bbe3b07d5d085d57f20a69f446bdd4b4ab41cd40a38069e0bea6a2717b02e51d139cb0a84a9f863b3ff89195b186bf439c2aacacbe2ef5784690d7028f80b66a10df4716354da85e8fbba87ee78aff91a9041b0a233b79dba28d754d818c84bdc8d96f3fff86566a1f15f4898fe070bc7b35c57ce8f93f58b80a3160985646bdc732934fade924d6e31c2c6e6a2ae643214c4c100b2f66ea6acec03b2cb40f39cb91be1e13211c0327d4d2daf59e414d8bed18bbbe05d85aee69ba68b83875df8b87f8bc90863c38e34c74e8f882bb992e7397ab8704002c14485d4d19915b840690ab13b9ed84d294a0aa74f7feb73ba7618bdd69243ef8670110044e32bd0ea079b745d6591cb61f18090045b426c07ee922ad93a16e209fc94ef8b21454830a65d764d8530f3137dd35a8a7c3b6f1c86721cebeefe01322fc91c3553d558d766b147d14ba6400f0dca309ae8c4865d730c33f3eaf0e2a60be6736a1ff5d2dcca550a700cc7f4d4378bb780dfa934254cd7d39b9d00a250f8f9539260645a0a0056690a454c7f9b31c9a358bed4271b5a192cc371178c0798eeba7c6cb14face65a8bacbb7d74b0b4bf56853b01bb86c937c814bee762933087a816966ac82c6b7d57ec3dfdf3a33834688829f20952020043d29863a4251ddd21e1ef6340f1e450042a82082c36e7e5032dafdd201494b84e5dd290f5bc545d90d0c3695bd5d89616e58b86dadce382fc1cc30c2c7f3f41c456a05e8d2bc8b500855697abd2c0e34e4bdf296fd65ea8213ee0115c661741ef7e60185491b54bc8623d8b8927f6411a324a20ca50043d35c26211faa3e6af590d56cd7b274a55420078b8e034888aee0489b070035c9b3aef475b4086e9ae5f4286aac3df3e5e9367af217a7de0575c7d9400c4a1ea12447c0e549e2ca4db225be99cc0e898b1f29b642575350fdb7c719e070077b210cd231c55cbeffea70cbf5449279d8809977f4d86de391dcd27b08a258963e27910a62da2228b88c33be770337974565e4dfdec85de7c8b46fb1264e5d1e5e7e4c3c490439555c6b550b710e0bed922fb97de7ea379d9308699707f92c3630981fcfac4d8321ab76441f7330135c1689a1e8f941104e4fecb1adcba63dcc1f3173488b1003a930c3b9bce9bd1eab45c3379ba449851c560c88d8e46bd419eac6c8b485db145ff40a417ac8639a74a71147218ee32fc023f5afcce9f223f6ca7da699d52e4b0cec6b354182b6bca7c983c265c348f8be6e45febd48389be41b288d91fa30e3e00fffd334b7b9542e47af657a841673c04ddecbc6df239abcea2d94cdb6fea72f84d43cf677270bd0c6e358add28ff32963509271987591d5f294f8a671881bc2b00f158c4c13c76825d361b810a77ac32d1f1dd7123ffcebb3df9b70cc213912885a80a7c29e0ed6ac492512075dff08bb042521c2495a163987970d2d02a2a4310f8ab5867d23603eab1a893558d04a0080f408ff536b47df5c12238819d7306e532ada3406e98fa9f14f913ec02022ee310662dd6c818d2996f51299764bcf67daf26501f4c79a5fc4d3d5ea1b9972e856789933361069acd6d2145251ab22b4403b1ad1d1c5df811b86fc0350eb771b214ff23419b321914b97b067d90e5a338c3de5bfcd81b638d8afb06ab2c3634420a3f8d6c45f54721b0b8b9ba4c0b12b436ee14cb6d50e623e4d9c594402f0b732b584917e28409a79924c23879762c34944badb44b385bbdcca73998830f9c826d7efcd585ee509491a219e5a8a4510df44db71df4d8576d30951b224748a0f4021998832a68af8b91c57d8631cfff32bd01b6555c33396d2fe8ce69be63480048b9257de136187d0b57c64578089d70b3e6c0b36eab0acc43bf0ebe5019fe4de0551299224480df52e989678157c8e443c7870e85913bce314ddfcd014ded8d172f95f2e2af7327e9380236e3c44e82c76ecca479227f34dbecc55629ffa0f65ee07c10f9de410f563120d07f91c3bd5dd39b053c5f9e4c8e63bf9edf56567bb64225093e76b7d018c348c7e11b86d859b6c5c71380665b93c9a6fca64e4a7da0f589355aca08c09d823caa551ee5cec74383a4d26f2c45cdf55941b4506a7c1068cf27628ceae486dc4a47d6940f99c5a8fa82187a6946fc39f37111ad723dca523ff0b9c38b30ba0bf505a53f85f4c3699c193036d6e5066efe6cb8c7f4f859c6890f72bb5c78f796f15015e97449691d7a61e473935e889c524df1bada8f4e351ac07229e904834081225f78af96585c7f03869d191330835f69581d181b365ffc1cbfe939a53f142e09f7546ee6286f877828e69a24c08c8d8f3b915c4dd34753f358e7283057047e52d930d4e3a40230daa9e47d66086a2d22d29e84d4237bba531e0ee90dadb80b245bc5c4059216616172e462f51d6775025f0f90ee51fcfa26ddbe4dd38cd8feb1bed1925e2f5e02958352ebb1305dc73b51d6c10acdea852ee6eb73e5b0c462fa3767992e5a6c65a742d60a75df9d77767e0ad609c9431530875f9c1a0fb5f43f8c3451a927cd8dad51aff7600a7fa04524b0a2b14d0c818ead49de6019d8a767e2d50c9934077ad437de691910213f846fb27bd1b855e3004035183500a271fae242c8dedd05530f98d9871999ae72c86b007ca1bfe0dfa96c2618aae8be099139574fc51cfcb5584fe956598e0d8ddc6d4f54b79f5ddd78be4153a58c96c20587c9021024940ac29e63b36bff65c2ce7cd78ec538b69b531f2ac3d04f91d1be8aab72c8abaa8a3e5449cd2a4b7d850c623952db3538094410f60c5c2d1f9e68c69d92684d1ea163494ce329c0423f18b15fd7e14e9b6f0c73d46231f2512e36dd15941eee58ffb17e75380259706332409dd35f707f75a42e0aa623492855688204e33fc09f1a28b0fdbb3fd3a6b29a8dd6a202aea102e8675a6084f23719f5641a7f69f4d0b163edc98f9c55731a5bc84d512cf2033eed5122b2fff56a6906186f4c318aa2e7fb7aa98c046ef42383a8647083211cf61cd3140a41259eb417f7f0f5301b4c0a1fe0331b2f19d71ac2692e4fa99ba5fc2803bc524df07f5da3c5d188bdc519bfb1ec419fec31ded4b3b0625840553f548cec8762a090000822371c7dd721b7ba21e0284df453af0b29cb92b6b928a7c73a291dff0c4e69777c50d11f7b4acca0322abb2adce8ba9ed9fa12db65bfa1120a5a618d4a3e3ea5185996337bf37f7618e0e13a6aac2f8400c551f9b79a98ac0dc06782d5ba5494bf0814a37565d1e0f88890ffb38abe2aa47822f3452cbab5e7e70ed13818c268616c1024d150a146963b531ba0e2b9727bdc25253d5489ff985f51bf4060c86d51c3517bbb9957ba81b36b98928d7ce0e710ee7915849fd36f5b16b38bba6333afc80a0da850aeba47bcca8414c0d5e3d8d89ab2424caccab759bea324f7b14f0d9765b773b1167a34067cc5727f3003bd5631b34103b819fff70476908ea3d9b6f679313555a84efd6673a101e51f48f322b3ce2dc80151264808d326a25d4034811b67d3a5ddf007137f777d09dc45e4cbb588bed918356e738e60a763bab026a30c330009ba63b06e0ddd8ca000fd11efe85b6c229ec28533b4b18a0c7dde0eac482a955214d890578d81ce433f6106f85affd8ad7f2601ee84fd2cc32926f1420a8b3063de2e0f24ca28917a57eb19b13401637ccfadca6a9d951df200e04f9160440386544b6e1d875408c0d40aadff96a0fc2b0efbd88c698ee1cae2d562ebf41e39a49ec8946d064697227cfdc1767a0cac59539721a22d5f765bdadb47f34804b7130e00b880e95b0898121d075af882b986fff3db66c96cbaece8461c2ca2734df3fbb394997308e594a237721b76fc52524bb5221170b4c6a0993740f427f3d979d21141696327ed0dcd2fa962c0c50389a20603b365cd77fc57701bc654734dc888da21a0036a9286487e6088fb5c884f6e374037d6447a0d2823342e5dcf7d13dcb0b2bd81a9153907a7a9a162f1433d194ef1be5689d027babbc1d817d63a955da150bd1961d5d761f311142d703ae175d87860b20466c01f6044aff4bff4e2e2d89ebba508413d8611b5a18b17de9c32620bd5905d1e6d559302c2930c16de1bf774697c1d199fe5975d95df394af45a76af933e3e6f699ade69d1ab4b6d5dafe9d284bdce322fce56a77d1885693112a6500a3039bbc0f573d068d6a42c113171b7370f5bfa27cdcf56fa95b7f7edd75b0eab5cfec348d841f"})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0))
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r3 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x94, 0x6, 0x81, 0x0, 0x0, 0x40000000, 0x200, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x401, 0x2, @perf_bp={&(0x7f0000000280), 0x5}, 0x8008, 0x1, 0x3, 0x3, 0x1ff, 0x7, 0x2, 0x0, 0x79, 0x0, 0x5}, 0x0, 0xf, r2, 0x2)
r4 = dup(r3)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c)
connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, 0x1c)
r5 = accept$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c)
setsockopt$inet6_group_source_req(r5, 0x29, 0x2d, &(0x7f00000017c0)={0x7, {{0xa, 0x4e20, 0x0, @private2, 0x1}}, {{0xa, 0x4e24, 0x1004001, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x207}}}, 0x108)
sendmmsg$inet6(r4, &(0x7f0000002880), 0x4000101, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00')
ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, &(0x7f0000000000)=0x20)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000019940)={{{@in=@local, @in6=@initdev}}, {{@in6=@private2}, 0x0, @in6=@private2}}, &(0x7f0000000100)=0xe8)
openat(r4, &(0x7f0000000240)='./file0\x00', 0x40000, 0x90)
13:07:26 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0)
perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x4, 0x4, 0xf7, 0x8, 0x0, 0x3a2, 0x400, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x1000, 0x4378a178, 0x8001, 0xe, 0x3f, 0x2, 0x200, 0x0, 0xc06, 0x0, 0x8}, 0xffffffffffffffff, 0x5, r1, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:07:26 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:26 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:26 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x5, 0x0, 0x7e, 0x0, 0x6, 0x10, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x7, 0x3ff}, 0x40000, 0x0, 0x7fffffff, 0x5, 0x800, 0x7, 0x1, 0x0, 0x80000001}, 0xffffffffffffffff, 0x6, r1, 0x2)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4202, 0x0)
13:07:39 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x4a010000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:07:39 executing program 4:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:39 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:39 executing program 7:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:39 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x578ef229)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300))
13:07:39 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:39 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
fcntl$getown(r0, 0x9)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:39 executing program 5:
r0 = accept(0xffffffffffffffff, &(0x7f0000000100)=@sco, &(0x7f0000000180)=0x80)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000005c0), 0x4)
recvmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)=""/70, 0x46}, {&(0x7f00000002c0)=""/219, 0xdb}, {&(0x7f00000003c0)=""/89, 0x59}, {&(0x7f0000000440)=""/45, 0x2d}], 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000180000000000000001000600f9ba0000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000240000000000000001000000010000000900000000000000641e7c29325bd4339bad4081c6e988e97868f9079780a70c131d1b3870f155d08faf8090fe89a8c69c96ed9aa0f46bd712a825c93f7ef8d5ae542f2afabe66738fdd29fe308aa3deeb6cb17f26dc998c1adebcfe1c112c0aa4f4eddfa4f479e999da5b388dc4bcf9945feb332d3f7f24c4127a4042f4a8964ea8a8f145b3b37bf2bd917069b58ac835f2e957857f00ab57ed7767a4a04c392cba7b23ec7939175bba12a4880e46f167feb3a1ccdd9f9ba99e14b9dcce9de25ea02bd1cf70fdecf81d863e2887a6ad3db028cb056a4b2b43d368ba2dc2ef6a", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x102)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
connect$unix(r1, &(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x0, 0x7, 0x0, 0x2, 0x0, 0x1})
r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r3, 0x0, 0x220)
ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000640)={r1, 0x1, 0x101, 0x1000000})
ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000600)={r2, 0x1, 0x3})
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r4, 0x0, 0x220)
syz_io_uring_setup(0x7dbf, &(0x7f0000000840)={0x0, 0x4273, 0x2, 0x3, 0x3a4, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000008c0), &(0x7f0000000900))
13:07:39 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:39 executing program 7:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:39 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:39 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:40 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:40 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x6e000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:07:54 executing program 7:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:54 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x803e0000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:07:54 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:54 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:54 executing program 5:
r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000001380)='./file1\x00', 0x20400, 0x199)
close_range(0xffffffffffffffff, r0, 0x2)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x800, 0x0, 0x0, 0x0, 0x38f6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x40010, r1, 0x81)
clone3(&(0x7f0000001300)={0x40090000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000012c0)=0x0, {0x33}, &(0x7f0000000240)=""/4096, 0x1000, &(0x7f0000001240)=""/113, &(0x7f0000000200)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x6}, 0x58)
r3 = openat(0xffffffffffffff9c, &(0x7f00000013c0)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r3, 0x0, 0x220)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x59, 0x80, 0x9, 0x0, 0x12, 0x4020a, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x2}, 0x10200, 0x9, 0x9e4, 0x1, 0x6b, 0xd774, 0x7f, 0x0, 0x3d4, 0x0, 0x9}, r2, 0xa, 0xffffffffffffffff, 0x3)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:07:54 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:54 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:54 executing program 4:
pipe2(&(0x7f0000000300), 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x428, 0x1, 0x0, 0x0, 0x6, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x2, 0xfd, 0x2, 0x47, 0x0, 0x8, 0x8000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xbd57}, 0x40, 0xf3, 0x9, 0x1, 0x9, 0xe7, 0x3, 0x0, 0x100, 0x0, 0x400}, 0xffffffffffffffff, 0x3, r0, 0x9)
r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$NFT_BATCH(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c90b1bbeb3f02a250800ff405e762ac6053f295d4ffc20d65892ef076a380e71c4fcaceb384300007d26af18e26c51db155af69e53f066816527ee897b6d5923e200"/91], 0x28}}, 0x0)
recvmmsg(r2, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
dup3(r1, 0xffffffffffffffff, 0x80000)
sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000020}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="7ae9ec44", @ANYRES16, @ANYRES64], 0x50}}, 0x885)
socket$inet6_udplite(0xa, 0x2, 0x88)
bind$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
eventfd2(0x5, 0x80000)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r3, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0)
creat(&(0x7f0000000240)='./file1\x00', 0x119)
13:07:54 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:54 executing program 7:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:54 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4)
13:07:54 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xc0000000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:07:55 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:55 executing program 7:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:55 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:55 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:55 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x2, 0x5, 0x6, 0xab, 0x0, 0x3ff, 0x8404, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0xffffffffffff38e5, 0xfffffffffffffffa}, 0x10c4, 0x2, 0x1ff, 0x3, 0x5, 0xfffffff8, 0xc000, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x14, r2, 0x8)
perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x1f, 0x9, 0x7f, 0x7, 0x0, 0x40003ff, 0x14062, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000180), 0x3}, 0xc85, 0xffffffff00000000, 0x3, 0x3, 0xabd, 0x9, 0x2, 0x0, 0x1, 0x0, 0x1}, 0x0, 0x10, r1, 0x1)
13:07:55 executing program 4:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x2, 0x20880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="140000001d0001000000000000000000040000009bd6b6fbef96f5a6675a1588a3374454086ae38aaffe5898dc2a6683a9c960e39eba219b6087d6b42b0fcd2cb0b80fee3ef95c1a84a490ceaf24f11d0411d1e98f0d877250a55e05fc4a3f4be0d0ea3bf10ba159ca540bdb"], 0x14}], 0x1}, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x72)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc)
syz_open_procfs(r2, &(0x7f00000001c0)='net/if_inet6\x00')
setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f00000000c0)=0x80, 0x4)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='timers\x00')
clone3(0x0, 0x0)
newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f00000014c0), 0x800)
setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4)
getpid()
stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0})
setresuid(0x0, r3, 0x0)
13:07:55 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:55 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:07:55 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:07:55 executing program 7:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:11 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x48277eabfdb4e962)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40000020)
pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00')
unlink(&(0x7f0000000440)='./file0\x00')
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0})
clock_getres(0x0, 0x0)
clock_getres(0x0, &(0x7f0000000040))
sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, 0x0, 0x0)
pselect6(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0xc189, 0x10000, 0x1, 0x7fff, 0xfffffffffffffffd, 0x8, 0x2}, &(0x7f0000000300)={0x77359400}, &(0x7f0000000380)={&(0x7f0000000340)={[0xffffffffffffd5cc]}, 0x8})
ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000680)={0x1, 0x3})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_open_dev$tty1(0xc, 0x4, 0x1)
stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0))
getuid()
setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0x3f}, {0xffffffff}], r1}, 0x18, 0x0)
mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f64ae006f90ca05dc83d8ed"], &(0x7f0000000200)='./file1\x00', &(0x7f0000000380)='nfs4\x00', 0x2000000, &(0x7f0000000540)='\x06\xf3\xa1\x9dP\xf7\b\x00\x00\x00\x00\x00\x00\x00@qR6\xd9\xfc\x1a\x16\xe5\xad\b\xbd%\x1c3fQP\xa4\x16\xa7\x1bW\x90\xac\xf6+H\xa7\v\x84\xe7\xcf\xe6H\x18h\xdb\xb9\x02R[Z\x05\x8dE\x9e6\xf5\x00'/74)
pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8)
13:08:11 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r1 = perf_event_open(&(0x7f0000000940)={0x4, 0x80, 0x3, 0x7f, 0xac, 0xae, 0x0, 0x2, 0x8218, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000900), 0x9}, 0x2, 0x5, 0x8, 0x2, 0x0, 0x1f, 0x1, 0x0, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x8)
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000100)={0x0, 0x0, {0x0, @struct, 0x0}, {}, {0x0, @struct}})
ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000500)={0x1f, 0x2, {0x9, @struct={0x7, 0x8000}, 0x0, 0x5, 0xa70d, 0x3f, 0x80000000, 0x5, 0x240, @usage=0x6, 0x2, 0x401, [0x3ff, 0x7, 0x1, 0xfffffffffffffff9, 0x9b, 0x7]}, {0x8001, @struct={0x7, 0xb5d}, r2, 0x5, 0x100000000, 0x8, 0x81, 0x2f8, 0x28, @struct={0x2, 0x7}, 0x5, 0x7, [0xffffffffffff0000, 0x2, 0x3, 0xffffffff, 0xffffffffffff0001, 0xfffffffffffffff9]}, {0x7fff, @struct={0xcd, 0xffffff00}, 0x0, 0x1, 0x42, 0x4, 0x400, 0x7fff, 0x62, @struct={0xec2, 0x40}, 0xffffff80, 0x5, [0x0, 0xffffffff, 0x4, 0x7, 0x4, 0x847]}, {0x1, 0xe3, 0x35}})
perf_event_open(&(0x7f00000009c0)={0x2, 0x80, 0x80, 0xfb, 0x9, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x1000, 0xfff}, 0x1480, 0x800, 0x7f, 0x3, 0x3545, 0x6, 0xfffc, 0x0, 0x7, 0x0, 0x5}, 0x0, 0x7, r1, 0x3)
13:08:11 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:11 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xc03e0000, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:08:11 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:11 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:11 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:11 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:08:11 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:11 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:26 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0x40, &(0x7f0000000240)=0x0)
r1 = eventfd2(0x8001, 0x0)
io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}])
io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x8000, 0xffffffffffffffff, 0x0, 0x0, 0x9}, &(0x7f0000000300))
openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_setup(0x40, &(0x7f0000000240)=0x0)
r3 = eventfd2(0x8001, 0x0)
io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}])
r4 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x145842, 0xe0)
write(r4, &(0x7f0000000200)='E', 0x140000)
write(r4, &(0x7f0000000080)="ee", 0x1)
ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r4, 0x80489439, &(0x7f0000000480))
io_submit(0x0, 0x2, &(0x7f0000000380)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x8, r1, &(0x7f0000000000)="fc941bc2f0b41b09484a3380beee9554318b35dfea55b86b4e1a68113be19d058ca5e47a560096", 0x27, 0x0, 0x0, 0x4}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="67f267ea6afdb7dc800193d95b6d11031b7af415598fd24fa0607e718b6c937e85864b9e7c161f8f8397e7db26a561a1afddf527f1a22eab37901cc0c9cc2ce5f01bfefc9fef7ce3116e750331ca2dfa5fad1a042772cbb97e1d63ac7b51631fffeaae014f425bbf18d95761ebc1350a9632ca59c05d39924fe88b2c625fab80e9c17acef6e0fbf569c6b07e44e02b6b530a8c555b99a3734264527cc98559800b592f30e102f4f31fe8955e522c0dcfe0e900517066da93c13aa6b6666fbf1d2b19ab", 0xc3, 0x2, 0x0, 0x5}])
sync()
13:08:26 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:26 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:26 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:26 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:26 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:08:26 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xe03f0300, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:08:26 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00')
ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000140)={0x0, 0x0, "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", "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"})
13:08:26 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xeffdffff, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:08:26 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:26 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x58091, 0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:08:26 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:26 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:26 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
tee(0xffffffffffffffff, r0, 0x1ff, 0x1)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x2dc2, @loopback, 0x3907}, 0x1c)
13:08:26 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xf6ffffff, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:08:26 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xef, 0x0, 0x0, 0x0, 0x2, 0x48210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x30fe00, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'veth0_macvtap\x00'})
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000003c0)={'veth0_macvtap\x00'})
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)=0x80, &(0x7f0000000300)=@isdn, 0x0, 0x80800}, 0x0)
syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'})
syz_io_uring_setup(0xa7b, &(0x7f0000000540)={0x0, 0xb480, 0x8, 0x2, 0x1ec}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000600))
syz_io_uring_submit(r3, 0x0, &(0x7f0000000680)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000001c0)="56c09b5d9ef8011a00bad5410a0730b27a5e58744a244c0d22f601d355c94d1a58b2ef59b00ffd553274e2426c71", 0x2e}, {&(0x7f00000006c0)="644e9dd123b0a524e4c820b98d31857d10b5623ceea6b484521658d73dfcce876ff8d37f1e9a6d711c3120066ad5bf0714a25951d54d55d0ee9805b487a9fa862b21e2bedd7cd2434a9fff5fe51d09ab171d2a1d217a6c159758212bf0332b5ce8b34f56f808732e10d287", 0x6b}, {&(0x7f0000000740)="6464a59c1f2daf23946b66605a821fc39256739ff85d12ad0ad29bbf027fe0537bcf5f10af9d077a48f955db63582c947049bd80bd28b2d0299ff0a429df86673eae4ca7a03872", 0x47}, {&(0x7f00000007c0)="29733e56900a861651bdf999ca2d428237be25973560b082fed80d09673262d64a12744e07ed9aada82afdc56e492f10bb3e4cc4005356d7a25f8c48a294bbfb51119201f134c17aacc4de2f228867905f909f8354cdc17655c3c66cf2b5a9a47bac7c58f586c9a4cc6c4797e9819fc32ec5f21be3ed03f82672ef9dbd28ed7fde0fb64b04a6ea2f433e54dfc37a79866aa38296614cd0a795ce669350e9a3b456c84d19009b1b4869310331c889a4ac4136b51d1790a7a39ba26008af38eb65", 0xc0}, {&(0x7f0000000880)="a16bc5b53d80b347b6456785d815646abfcab164d62f16dcf0e1e011a19144be7dae9d625319cd19505cefddf5135c7a8c11e1132a90fd24b026b6090d107cc1ca8a492ba11c775e75a3dd8e8321d012c66f85e769b7ca85eda6cdcd7faedb0b1e91e247c33a6b2a3388f1df5621383af88b1c87e718502f1d7a6783ce473fd0329bbac7e23bd7983a760b1e1909a3795dd38718203db9845187e74537f7826b4fd7377126baac64ad13ac5a4b83abf9c53224dd8a402a0a4098", 0xba}], 0x5}, 0x0, 0x48000}, 0xd1)
r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0)
perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x2, 0x1, 0x8, 0x4, 0x0, 0x1000, 0x10, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x87, 0x1, @perf_bp={&(0x7f0000000200), 0x8}, 0x40500, 0x3, 0xff, 0x6, 0x400, 0xacf, 0x9, 0x0, 0x5, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0xb, r1, 0x0)
ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)={'wlan1\x00'})
13:08:43 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xfffffdef, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:08:43 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:08:43 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:08:43 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x3, 0x80, 0x6, 0xff, 0x3, 0x40, 0x0, 0x203, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffff8, 0x2, @perf_config_ext={0x200000080003, 0x6}, 0x800, 0x4, 0x2, 0x8, 0x2, 0x1f, 0x1, 0x0, 0x8, 0x0, 0xfffffffffffffffb})
r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x65, 0x0, 0x1, 0x3f, 0x0, 0xffffffffffff261c, 0x100, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x6030, 0x4, 0x7, 0x6, 0x3, 0x3, 0x8, 0x0, 0xfffffffb, 0x0, 0x466011b0}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xb)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/slabinfo\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x81, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8000, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x5, 0x401}, 0x61, 0x3, 0x7fff, 0x0, 0x4, 0x2, 0x7da, 0x0, 0x4, 0x0, 0x80000001}, 0x0, 0x2, r2, 0x3)
13:08:43 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xffffff7f, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:08:43 executing program 3:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:08:43 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 4:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
ftruncate(r2, 0x800)
ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000000c0)={'wpan1\x00'})
write(r1, &(0x7f0000000080)="01", 0x292e9)
syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff)
ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000040))
sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x0)
13:08:43 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:43 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
capget(&(0x7f0000000100)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000140)={0xfffffffb, 0x5, 0xffff, 0x3, 0x1, 0x1})
13:08:43 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0xfffffff6, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:08:59 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:08:59 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa)
r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x2, 0x80, 0x58, 0x0, 0x8, 0x34008, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x6, @perf_config_ext={0xffffffffffff5673, 0x2}, 0x8, 0x8000, 0xffffffff, 0x1, 0x3, 0x107e, 0x1000, 0x0, 0xfff, 0x0, 0x200}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4})
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xa, 0xd9, 0xa2, 0x4, 0x0, 0x6, 0x80082, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x2, 0x9, 0x6, 0xffff, 0x1, 0x800, 0x0, 0x3}, 0x0, 0x10, r0, 0xa)
13:08:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:08:59 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x911d}}, './file0\x00'})
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0})
r4 = getuid()
fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r3}, {0x2, 0x1, r4}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0xa}, [{0x2, 0x6}, {0x2, 0x1}, {}], {}, [{0x8, 0x2, r5}, {0x8, 0x4}, {0x8, 0x2, r5}, {0x8, 0x1, r5}, {0x8, 0x2, r5}, {0x8, 0x4}, {0x8, 0x0, r5}, {0x8, 0x5, r5}, {0x8, 0x7, r5}], {0x10, 0x7}, {0x20, 0x4}}, 0x84, 0x2)
r6 = socket$inet_udp(0x2, 0x2, 0x0)
r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r7, 0x0, 0x220)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001a00)=0x0)
sendmsg$netlink(r1, &(0x7f0000001ac0)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbff, 0x8000000}, 0xc, &(0x7f00000019c0)=[{&(0x7f0000000100)={0x2a4, 0x2a, 0x10, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x15, 0x0, 0x0, @pid=0xffffffffffffffff}, @nested={0x80, 0x16, 0x0, 0x1, [@generic="03b7f3b3ffbbfb732b6b04b80999108eea3584d54922c8bfe26b135b2ed2fc2901e4812ecb3534cf361ea3c70dd5231da6b247c1332d4fce0ac3b45afa3167630df0068287400f7220bd590c64de7a46694fab155e9a3b17e9f6d6b6855f44f6efdde8d041598b76b5b3619d3aef540b4c30e2e1acaf3b2c5d180518"]}, @nested={0x20, 0x67, 0x0, 0x1, [@typed={0x8, 0x55, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x2e}}, @typed={0x14, 0x4d, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}]}, @generic, @typed={0x4, 0x11}, @nested={0x195, 0x3, 0x0, 0x1, [@typed={0x8, 0x6c, 0x0, 0x0, @ipv4=@empty}, @typed={0x4, 0x6}, @generic="75e9c70c3f0f689a187dc5d4235c781ad219b6d115fcf81ed20e766b68ecb027d05b8d6cb1fe6eeaef156d9f8fa6e00f39eb2491d110d5d559f134149923f7800b1578506c99b759eec2daddbe54042aaf69f3c21d96f753a0c41517e452ebd6bac0fdbaff4acca0137d2d007618d92e588d46440678eaf4bf6f82f3d1673bd9bd2ac92cd2142a9c2f1373df4aed756fec1c20c412fdffdc4effae5452ac88313a8ada979b6bec7db7f1687a85d923cdb598c0648b5370a3d7f25c039a6451a3d32f86cdae30b6e6c05087bd", @typed={0x32, 0x29, 0x0, 0x0, @binary="5b3a74a3f3aedc8df814b41debcdfec8e103f4d0bb251e7f339a593c5c2a8408efde33ded159f0d92a07b83eb5dc"}, @generic="19515be94090317fd6f88f17201eea29c62bf9215d950584aa68225176125f64bd3cea7b620612efa47dd958e3806677f410d5c5dd97f2cde0ebc618c63bc0f8d558dacb6eb796282a637065ef4c0c24e05cb37db9557aff49", @typed={0x14, 0x64, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @typed={0x14, 0x50, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @typed={0x4, 0x93}]}, @generic="4e14e108c291a8fae0bcb5ba7938bc111ba70e8ba9d6c35547f5cb437379caf75a9fa23d66798e78bb4891532e8ca371df5825e56a485e8b77121142a1b0e995756a208c73408c19194b1e685250fafb"]}, 0x2a4}, {&(0x7f00000003c0)={0x1600, 0x1e, 0x300, 0x70bd29, 0x25dfdbff, "", [@generic="0c29e43b81ec6389e069da9eb716b31edd58cd6e1a2477187b5575be5030a97d5caede1a6d8df72043e2895c61fbdfb5bd6dcfef3eff2b1ce58bbfe7ffcada028f6ab29be860e387f097e4a15e346a72d90008c9d2f804b82c988c6f30d15f72948b9337f9641141bc8826fe56da71b6235d664d116b176cf0133dfad8bfa879e29bb4473c2f3778e67b7435d43b629818fb380b1bd4df9d07924391aa706ee40b34a887a6c0df33a78c743a", @nested={0x1d0, 0x46, 0x0, 0x1, [@generic="01bf0ffdd28997fcd6fc814922846b105955cf43f382c2157dbb3dd56488802fbed0aea7736afcdb73efe16cc5d450a3dc2a9197d4a01b03a5b951927752fc9f7baa007e6a677fc70ecd139c882879315c2ebb06c862f3e934c33ff159faae71c364e60ae17918cc7161c8000411900a93aa1d2f725e60a3aed592ac7653de3cc6b98b7fe8a59ca0aec197ef0546ed44fd9ddb427d60564e0cb43abb", @typed={0x8, 0x83, 0x0, 0x0, @u32=0x5b1}, @typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@loopback}, @generic="a3d4b4ca9aa4c3dd412140dc4988060adac486c03f", @typed={0x8, 0xc, 0x0, 0x0, @ipv4=@private=0xa010101}, @typed={0x8, 0x6c, 0x0, 0x0, @uid=0xee01}, @generic="cc40894b56e3faee2d84dcab536badcad4d063ddadc9d8281cc32ddf9f17745070448ba4c6fb4f5430e53ecb030c9e04403df8af38dd0e1ec2887c2c8e846ed09d21804d8860ee4638a5604af2c7fb00465ebbc6756a72059f21a8cef95586885b2edb5705d5cd0e132baecd3b47bf3a52039c9b5e5b58da512b6eed59598b7b131f6d64e0048f13d2cdbe12b179bc72c1db6136c8d8b9d1825cd8c10dafb0e56ec6637396315536874fa74491d0f818c49c37a21f807a2b74a1da6166045507166c7b8b80ed41c4164f5fc8c05885ec5592702d1ffc11838972376a9401dc6d3e2668097005d5b4c6152af2b9440d011bfa9acb406fd1caaa85c8"]}, @nested={0x1268, 0x1d, 0x0, 0x1, [@generic="9f663a6db005413c88c9af4aadbd6ca550e143f964d6c437c5e4a1d7858980a1ff5fe226db46abc957bfffd99a36b2ed48e177d61fe07ea147d03b41e24d7d03cebd24b335454d0345aef488bed7ffacac54ff70f68bc760155857c8357970d729b9a4a4f6d6d0abdf99ecb05ba5110196eec34bf684959fda83cb592f09004ebb284a61483bf740e76f10400b9626e873e8c1", @generic="4fea14d700b173d8383ceadb9fcfdac34c6e963f95d0c4ed5bffea4290795510ea71be4ba9658367850dedbaa6d2c8cd560c27fd851f2a0b703675b0027695ea3163a970acf3d987906c2f0ed7185598cc728413ac070ee11732266c79fe6e7ec9cee37b642fb8c6954c3e7db2c2bfd84615467693f5e7d707eb7c46513262e553cfe04a64c5ee81723740f5a5203a8616a1814eebabb2490f41e01cbb8f436f50aeb0f6d19c39d2e27a76ade9d4c29768dbf9a5dd7e1c035959a90474c5e430118e8d9104d883ad0484", @typed={0x8, 0x59, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="36845fe700b0d5f74062f1d0eafac4d3988abba8", @generic="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", @generic="21bbb0c552e36bd2c6eaf9e3ee250491d17a66ea45eba064087567cab9b7542d61855a3c351d08ed71477e7ea0f39bf173374881b56a1273d182e62dabed3db8b23e5f601346156507f13315b6fe322bdf6bee5df56914bf2e69338caa07b7396dc587ae1c9931fbafd85e9f591c5fa5b543c01ce84b7c73cf9865e06ebea1ba37a42020db81fd850e3f9607513b7eb884bcb5fe9278513a6299bd96a008f0cb963d341df428e89f1d7e924d5892a5449bf1945bd85343286410e8a73624d687f9ec032dc4a418314915e3df8c036583e3e059e7b8408e78616d8965861e8aa84a9c7603622eda55086021"]}, @nested={0x99, 0x37, 0x0, 0x1, [@generic="97f36114717f0e16137b1642e23326d6dea8cd0f3f172216475f68071eb30dbf449934f0aeec1e4ebd710bdc237fd782338691cf91c8b37a048b73207ffb2fbda6f7d49cf8a6ece1b49e84865f5370381a98e2496fa5a6add46b585b1445f8595250d9cae7be46fb8cfce65ea581210139427344788dfc324919bf215d8471e38e910f899df6193f8e6ef7ced0", @typed={0x8, 0x22, 0x0, 0x0, @uid=0xee00}]}, @generic="4b0e4e5753011d73df2584dbe8d08173b32e3886c2e9faa3ed8bf87fb961163c0adabe0399b0ec5627f002f669771b771235899bc68c228cfd0b3adef74fc1ffc71a7d94f0e91c76b3cd8adc47a21a5e02b7857b9ab6cc720881350bbb60f63c3079e4ea8089510e078c0156cd67"]}, 0x1600}], 0x2, &(0x7f0000001a40)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3, r5}}}, @rights={{0x24, 0x1, 0x1, [r6, r7, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00, 0xee00}}}], 0x68, 0x8000}, 0x40080)
connect$inet6(r1, &(0x7f0000001b00)={0xa, 0x4e22, 0xb51, @mcast1, 0x4}, 0x1c)
r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000002140))
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_bt_hci(0xffffffffffffffff, 0x0, 0x0)
13:08:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:59 executing program 5:
sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1e0, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xfffffffd, 0x3d}}}}, [@NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_KEYS={0x160, 0x51, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x2c, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "9c8c524231"}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "736c91e63a84505a322ec6a8cf"}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0xc, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_DEFAULT_TYPES={0xc, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "a135b8b01a"}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_DEFAULT_TYPES={0x2c, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_IDX={0x5, 0x2, 0x3}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3cacb98cfcd7a39b8f194670d0"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "9f084cd334"}, @NL80211_KEY_DEFAULT={0x4}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_SEQ={0x11, 0x4, "610325376d019a75c12e8aea7c"}]}]}, @NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x66}, @NL80211_MESHCONF_CONFIRM_TIMEOUT={0x6, 0x2, 0xfb}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x6}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x8}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5, 0x11, 0x1}]}, @NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0xc, 0x3, 0x5, 0x0, {0x1, 0x6, 0x0, 0x3f8, 0x0, 0x0, 0x1, 0x2}, 0x6, 0x3ff, 0x6}}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0xb738}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x44800}, 0x4000)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:08:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x8}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:08:59 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:08:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:08:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:15 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:15 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:15 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:15 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xff, 0x1f, 0x5, 0xff, 0x0, 0xff, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x400, 0x0, 0x3ee, 0x6, 0xc88f, 0x0, 0x4, 0x0, 0x401, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x8, r0, 0xa)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
sendfile(r2, r1, &(0x7f00000001c0)=0x1f, 0xfff)
openat(r2, &(0x7f0000000200)='./file1\x00', 0x109000, 0x10)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0xfffffffd})
13:09:15 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x11}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:09:15 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:15 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:09:15 executing program 4:
r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x64cc2, 0x20, 0x1d}, 0x18)
ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000980)={0x0, 0x0, 0xcfc})
ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000140)={0x8, 0x1, {0x30a, @struct={0x0, 0x7fff}, 0x0, 0x8, 0x6, 0x2, 0x400, 0x3a02, 0x1, @struct={0x435b, 0x1}, 0x4, 0x16, [0x8, 0xac4, 0x3ff, 0x2, 0x7fffffff, 0xdb8]}, {0x1f, @usage=0x8000000000000, r1, 0xb9ba, 0x8, 0x5, 0x0, 0x7, 0x80, @usage=0x3, 0x5, 0xf08, [0xd1, 0x1, 0xff, 0x8a87, 0x1, 0x5]}, {0x6, @struct={0x81, 0x1}, 0x0, 0x2, 0x9dc8, 0x81, 0xffffffff, 0xfff, 0x14, @struct={0xf663, 0x4}, 0x0, 0x87, [0x3, 0xffffffffffffffb7, 0x4, 0x805, 0x3, 0xffffffffffffffc1]}, {0x9, 0x8, 0x5}})
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0})
r4 = getuid()
fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r3}, {0x2, 0x1, r4}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0)
mount$cgroup(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000540), 0x1205003, &(0x7f0000000580)={[{@subsystem='freezer'}, {@subsystem='pids'}, {@clone_children}], [{@pcr={'pcr', 0x3d, 0x2d}}, {@euid_eq={'euid', 0x3d, r3}}]})
mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0xa, 'system_u'}}]}})
13:09:15 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:15 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:09:15 executing program 0:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:15 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:15 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x6e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:09:15 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:09:32 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:09:32 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:09:32 executing program 0:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 4:
r0 = syz_open_dev$mouse(&(0x7f0000000340), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'})
fchownat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x400)
13:09:32 executing program 0:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 4:
sendmsg$NFNL_MSG_CTHELPER_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x4024}, 0x0)
sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000009c0)=ANY=[], 0x1c}}, 0x20008011)
sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)={0x70, 0x0, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:inetd_child_exec_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x1)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
dup2(0xffffffffffffffff, r0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000000))
dup2(0xffffffffffffffff, r2)
ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000003c0))
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x2, 0x40000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x75bf2694, 0x5}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x2a)
sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0)
perf_event_open(&(0x7f0000000800)={0x4, 0x80, 0x1, 0x3f, 0x9, 0x9, 0x0, 0x8, 0x10, 0x54a13a429fa1ccb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x104, 0x2, @perf_bp={&(0x7f00000007c0), 0x3}, 0x10, 0x8, 0x80000001, 0x9, 0x8, 0x6, 0x7fff, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x1)
sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="000829bd7400fddbdf254c0000000e00a80066697273746e616d650000000c00a70037b1ee28b653d58bca8f0609000000000000060000000009000000000000000f00a9007365636f6e646e616d65005716f8e4c69bde9bee041d0008000300020000000f00a8007341636f6e646e616d650000080001007063690011000200303030003a30"], 0x8c}, 0x1, 0x0, 0x0, 0x20008894}, 0x54)
13:09:32 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x103}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:09:32 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0})
ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000300)={r2, 0x0, "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", "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"})
13:09:32 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 0:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:09:32 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:32 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:09:33 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x14a}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:09:33 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:33 executing program 0:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:51 executing program 5:
modify_ldt$read_default(0x2, &(0x7f0000000100)=""/95, 0x5f)
modify_ldt$read_default(0x2, &(0x7f0000000180), 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0xcc, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
modify_ldt$read_default(0x2, &(0x7f0000000280)=""/82, 0x52)
modify_ldt$read_default(0x2, &(0x7f0000000300)=""/116, 0x74)
modify_ldt$read_default(0x2, &(0x7f0000000240)=""/60, 0x3c)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
modify_ldt$read_default(0x2, &(0x7f0000000180)=""/154, 0x9a)
13:09:51 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="130000000000000002000a000000"], 0x14}}, 0x0)
13:09:51 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:09:51 executing program 0:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:51 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:51 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x301}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:09:51 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:09:51 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:09:51 executing program 2:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:08 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:10:08 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:08 executing program 2:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:08 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:10:08 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:08 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:10:08 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffff}, 0x0, 0x0, 0x0, 0x0, 0x7ffffbff, 0x1, 0x4, 0x0, 0x2, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x81, 0xff, 0x4, 0x0, 0x9, 0x51000, 0x6, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x2, 0x1}, 0x20, 0x9, 0x8, 0x5, 0x8001, 0x0, 0x89, 0x0, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x5, r0, 0x2)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x8, 0x0, '\x00', [{0x3ff, 0xffffff7f, 0xf7, 0x81, 0x6, 0x6}, {0x6daf, 0x1000, 0x3, 0x2, 0x98d, 0x4}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']})
13:10:08 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0)
r1 = openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x404080, 0x106)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'})
ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000180)={{r2}, {@val, @actul_num={@val=0x2b, 0x1, 0x74}}})
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r4, 0x0, 0x220)
perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x81, 0x4, 0x7, 0x6, 0x0, 0xbdb3, 0x2001, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0xffffffff, 0x9}, 0x12504, 0x1, 0x2, 0x2, 0x6, 0x122, 0x0, 0x0, 0x400, 0x0, 0x7}, 0x0, 0xe, r4, 0x2)
mq_timedreceive(r3, &(0x7f0000000240)=""/119, 0x77, 0x3f, &(0x7f00000002c0)={0x77359400})
fallocate(r3, 0x0, 0x0, 0x87ffffc)
13:10:08 executing program 2:
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:08 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:08 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:08 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
inotify_init1(0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20860000}, 0xc)
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000440)={{}, 0x0, 0x30, @unused=[0x9, 0x0, 0x101, 0x10000000], @subvolid=0xc})
statx(0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0, 0x0, 0x0)
13:10:08 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x3e80}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:10:08 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:10:08 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0xa9, 0x3, 0x1f, 0x0, 0x5, 0x685835dfe38dfdac, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000140), 0x4}, 0x411c4, 0x7, 0x5, 0x6, 0x5, 0x7, 0x3, 0x0, 0x40, 0x0, 0x8000}, 0x0, 0xe, r1, 0x9)
fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100))
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e22, @broadcast}, 0x10)
13:10:08 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:08 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:10:08 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:08 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x3ec0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:10:08 executing program 4:
dup(0xffffffffffffffff)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
openat(r0, &(0x7f0000000000)='./file1\x00', 0x80000, 0x8f)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
syz_io_uring_submit(0x0, 0x0, 0x0, 0x0)
sendfile(r0, r0, 0x0, 0x100000)
13:10:23 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x80000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xff, 0x1, 0x6, 0x7, 0x0, 0x8a3, 0x0, 0xf, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0x401, 0x2}, 0x8, 0x1, 0x9, 0x8, 0xb7, 0x3, 0x1f, 0x0, 0x9, 0x0, 0x9}, r2, 0xf, r3, 0x1)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x8, 0x7f, 0xff, 0x7, 0x0, 0x0, 0x318b0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x8, 0x100}, 0x4040, 0xfffffffffffffffb, 0x19, 0x1, 0x9, 0x7, 0x0, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x1)
13:10:23 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:23 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300))
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x521a01, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1a23}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pidfd_open(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3, 0x1)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000140))
fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x5)
clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
13:10:23 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:23 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:10:23 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 1)
13:10:23 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:23 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4a01}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
[ 958.610064] FAULT_INJECTION: forcing a failure.
[ 958.610064] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 958.611015] CPU: 0 PID: 6831 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 958.611592] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 958.612168] Call Trace:
[ 958.612367]
[ 958.612546] dump_stack_lvl+0x8f/0xb7
[ 958.612858] should_fail_ex.cold+0x5/0xa
[ 958.613175] strncpy_from_user+0x38/0x3e0
[ 958.613502] __do_sys_request_key+0x85/0x3b0
[ 958.613840] ? __pfx___do_sys_request_key+0x10/0x10
[ 958.614218] ? syscall_enter_from_user_mode+0x21/0x50
[ 958.614604] ? syscall_enter_from_user_mode+0x21/0x50
[ 958.615002] do_syscall_64+0x3f/0x90
[ 958.615294] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 958.615683] RIP: 0033:0x7f1da7f6db19
[ 958.615961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 958.617242] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 958.617788] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 958.618295] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 958.618799] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 958.619304] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 958.619813] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 958.620357]
13:10:23 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:23 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x6e00}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:10:23 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 2)
13:10:39 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
r1 = socket$packet(0x11, 0x2, 0x300)
r2 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0})
sendmmsg(r1, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x4, r3}, 0x80, 0x0}}], 0x1, 0x0)
ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@private2, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8001, 0x4, 0x100, 0x100, 0x1, 0x810000, r3})
r4 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108)
r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r5, 0x0, 0x220)
getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8)
close_range(r0, 0xffffffffffffffff, 0x0)
13:10:39 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:39 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:39 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
r1 = syz_open_dev$mouse(&(0x7f0000000140), 0xfd5d, 0x111003)
ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f00000001c0)={{r1}, 0x0, &(0x7f0000000180), 0x8, 0x8, [0x8, 0x3f, 0x40, 0x2006]})
r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
finit_module(r2, &(0x7f0000000100)='.&-{-\x00', 0x1)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e21, 0x8, @local, 0x101}, 0x1c)
13:10:39 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 3)
13:10:39 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x803e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:10:39 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:39 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:10:39 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:39 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 4)
13:10:39 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:10:39 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:39 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
[ 974.920647] FAULT_INJECTION: forcing a failure.
[ 974.920647] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 974.921633] CPU: 0 PID: 6900 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 974.922210] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 974.922788] Call Trace:
[ 974.922984]
[ 974.923158] dump_stack_lvl+0x8f/0xb7
[ 974.923466] should_fail_ex.cold+0x5/0xa
[ 974.923787] _copy_from_user+0x2e/0x180
[ 974.924089] memdup_user+0x72/0xd0
[ 974.924366] strndup_user+0x78/0xe0
[ 974.924662] __do_sys_request_key+0x107/0x3b0
[ 974.925013] ? __pfx___do_sys_request_key+0x10/0x10
[ 974.925395] ? syscall_enter_from_user_mode+0x21/0x50
[ 974.925791] ? syscall_enter_from_user_mode+0x21/0x50
[ 974.926187] do_syscall_64+0x3f/0x90
[ 974.926465] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 974.926850] RIP: 0033:0x7f1da7f6db19
[ 974.927125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 974.928366] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 974.928925] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 974.929437] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 974.929944] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 974.930445] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 974.930954] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 974.931498]
13:10:39 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
capset(&(0x7f00000001c0)={0x19980330}, &(0x7f0000000200)={0x9, 0x4, 0x8, 0x1, 0x8, 0xdb20})
capget(&(0x7f0000000140)={0x20071026, 0xffffffffffffffff}, &(0x7f0000000180)={0x2, 0x39, 0x8000, 0x8, 0x5, 0x1f})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0)
sendfile(r1, r2, &(0x7f0000000100)=0x9, 0x8)
13:10:39 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r0, r0, 0x0, 0x100000)
r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r3)
write$binfmt_script(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0xb)
perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x9)
ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x2f, 0xfe, 0x40, 0x5, 0x7f, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x3}})
io_setup(0xd29, &(0x7f0000000780)=0x0)
r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x8, 0x8, 0x0, r5, 0x0}])
close(r5)
socket$inet6_udp(0xa, 0x2, 0x0)
socket$nl_audit(0x10, 0x3, 0x9)
r6 = gettid()
ftruncate(r2, 0xfffffffeffffffff)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0x5, 0xfffffffffffffffe}, 0x26, 0x661, 0x0, 0x0, 0x0, 0xffffffff}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
13:10:39 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:39 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:10:39 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:39 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 5)
13:10:39 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc03e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:10:53 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:53 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:53 executing program 4:
mknodat$loop(0xffffffffffffffff, 0x0, 0x9510, 0x1)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0)
sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x1, 0x4, 0x201}, 0x14}}, 0x0)
sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0xf, 0x6, 0x801, 0x0, 0x0, {0xc, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000884}, 0x0)
socket$nl_audit(0x10, 0x3, 0x9)
13:10:53 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:53 executing program 5:
iopl(0xff)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x79ea}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:10:53 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:10:53 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x33fe0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:10:53 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 6)
13:10:53 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:53 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:53 executing program 5:
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:10:53 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:10:53 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:08 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 7)
13:11:08 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000}, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x8, 0xffffffffffffffff, 0x0)
clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
13:11:08 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:08 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:11:08 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:11:08 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:08 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:08 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r2, 0x0, 0x0, 0x87ffffc)
r3 = fcntl$getown(r2, 0x9)
perf_event_open(0x0, r3, 0x0, r1, 0x8)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0x6, 0x1, 0x1, 0x0, 0x0, 0x2400, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x40000, 0x8, 0x400, 0x7, 0x5, 0x4, 0xffff, 0x0, 0xfffffff9, 0x0, 0x1ff}, r3, 0xb, r0, 0x1)
[ 1003.974218] FAULT_INJECTION: forcing a failure.
[ 1003.974218] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1003.975847] CPU: 1 PID: 6994 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1003.976936] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1003.978002] Call Trace:
[ 1003.978353]
[ 1003.978678] dump_stack_lvl+0x8f/0xb7
[ 1003.979222] should_fail_ex.cold+0x5/0xa
[ 1003.979775] _copy_from_user+0x2e/0x180
[ 1003.980308] memdup_user+0x72/0xd0
[ 1003.980788] strndup_user+0x78/0xe0
[ 1003.981286] __do_sys_request_key+0x146/0x3b0
[ 1003.981896] ? __pfx___do_sys_request_key+0x10/0x10
[ 1003.982546] ? trace_rcu_dyntick+0x1a7/0x250
[ 1003.983148] ? syscall_enter_from_user_mode+0x21/0x50
[ 1003.983826] ? syscall_enter_from_user_mode+0x21/0x50
[ 1003.984522] do_syscall_64+0x3f/0x90
[ 1003.985042] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1003.985728] RIP: 0033:0x7f1da7f6db19
[ 1003.986212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1003.988546] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1003.989573] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1003.990478] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1003.991377] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1003.992290] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 1003.993194] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1003.994132]
13:11:08 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:08 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(0x0, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:08 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:11:08 executing program 4:
syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x410, &(0x7f0000000140)=ANY=[])
lgetxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="75734f912e5c5c2c5d5b5e272a2f2c2baa9b43e178a51097068e92009f66ea6dd0eeb9051285a11c2288770b97402aa84a0a26a11461b19079673c6f479c05b8b558151a9114385ec24cc1800257a1bdea55259c92766a94cde2593d60a82c44904d4d07e73f8f480d2b3c0492ee5a172626ea51ba1046f4b988124cb3d22f07e87dc2a46b6ffafb"], 0x0, 0x0)
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xec465000)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
write$bt_hci(0xffffffffffffffff, 0x0, 0x13)
openat(r0, &(0x7f0000000040)='./file0\x00', 0x800, 0x25)
r2 = creat(&(0x7f0000000180)='./file0\x00', 0x11c)
pwritev(r2, &(0x7f0000000680)=[{&(0x7f00000003c0)="96d2c46c4469f48fb25175a44a1e67ccf41b2eff39c06a7106719880d782c05b613535b4d8b01c1d9b1dc24bd8ed1edb197c2cfd261d0d512280655ab0b9aa7b12828a0ff10cffd3135162ed541cefe513524f4d7345d0da1e86901e0d42e7471d7138f8d0caf8fd292023d3883c7367e64a5024", 0x74}, {&(0x7f0000000440)="466655356874ebfd90234ba38eb742e271e252f200142e53ed4024a0d5347a251f23961080011adc5343d30583b7040b71424886f3f1f8d37ac85b6487a3ada565941ad660f03328c9304c3c9f1d22703044460d8d610fcce38d71866ba12352b6a763a52efaab11376f3c6ebad4d5465a78d2b4840e6b522429deb8b3a3c57f110a9372f72f0fd5d41ca1", 0x8b}, {&(0x7f00000001c0)="79a900cd6e75c83655f0902d37427034973d39d6aca88a44747a57e69cd47503dee9fe31edb1860f75bb35e5ae90435276380336b674f01c", 0x38}, {&(0x7f0000000500)="cd7ab6b6a2be11d6b01baea3e647111cee2cc0c66f0e0d4424635379807e1c9cdf354edab4df1a199256c87ea60eb0fa8112bf35a71cd32c4795601f1a37f17d1c9b2c4b43b16a27f4c8d06394e1365eb856ba12625867db36b379e85fe086d553a1e9cc12a85ab60d17a9c29c16c3fb61790b9d071c9aa73ac80895b12826dfe3dd80c5ac9d7ad642c616ee0d", 0x8d}, {&(0x7f00000005c0)="08ffae018a719dc2c93208bd3f25b1652643438eeeabbdee19c9b53e312c77a8a52728e6e66d07508b987e57a9efebc67855a274dcd387125a65d7b3adb4b37d11653b48aa6fd6166a49d52e387eab82580fef9339f578bedf477ff2fed0a5e73a6fb05237c09815999f56d96d37a78d24bcbe394383e588fc31bb7944e9558856506a06e8864a08702977", 0x8b}], 0x5, 0x400, 0x9)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r3, 0x0, 0x220)
open_tree(r3, &(0x7f0000000240)='./file0\x00', 0x80100)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, 0x0, 0xfffffdef)
13:11:08 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 8)
13:11:08 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:08 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x80, 0x2, 0x4, 0x1, 0x0, 0x2, 0x100, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0xffff}, 0x200, 0x100000000, 0x5, 0x5, 0x9, 0x854, 0x5628, 0x0, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0x10, r1, 0x5b12c46c42812bc9)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x5, 0x81, 0x3, 0x7, 0x0, 0x4, 0x4000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x3040, 0x8, 0x8, 0x7, 0x8482, 0x8, 0x8000, 0x0, 0xfff, 0x0, 0x7f}, 0x0, 0x10, r0, 0x0)
13:11:08 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {0x0, 0x0, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
[ 1004.296745] FAULT_INJECTION: forcing a failure.
[ 1004.296745] name failslab, interval 1, probability 0, space 0, times 0
[ 1004.298307] CPU: 1 PID: 7016 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1004.299333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1004.300355] Call Trace:
[ 1004.300693]
[ 1004.301035] dump_stack_lvl+0x8f/0xb7
[ 1004.301562] should_fail_ex.cold+0x5/0xa
[ 1004.302109] ? prepare_creds+0x2f/0x6f0
[ 1004.302635] should_failslab+0x9/0x20
[ 1004.303144] kmem_cache_alloc+0x5a/0x410
[ 1004.303701] prepare_creds+0x2f/0x6f0
[ 1004.304203] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 1004.304888] lookup_user_key+0x387/0x1260
[ 1004.305442] ? lock_release+0x3b6/0x750
[ 1004.305976] ? __pfx_lookup_user_key+0x10/0x10
[ 1004.306564] ? __pfx_lock_release+0x10/0x10
[ 1004.307130] ? trace_lock_acquire+0x14c/0x1c0
[ 1004.307737] ? __pfx_lookup_user_key_possessed+0x10/0x10
[ 1004.308457] ? _copy_from_user+0xf6/0x180
[ 1004.309010] ? memdup_user+0x89/0xd0
[ 1004.309515] __do_sys_request_key+0x1a4/0x3b0
[ 1004.310118] ? __pfx___do_sys_request_key+0x10/0x10
[ 1004.310770] ? syscall_enter_from_user_mode+0x21/0x50
[ 1004.311445] ? syscall_enter_from_user_mode+0x21/0x50
[ 1004.312129] do_syscall_64+0x3f/0x90
[ 1004.312638] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1004.313333] RIP: 0033:0x7f1da7f6db19
[ 1004.313820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1004.316092] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1004.317090] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1004.318015] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1004.318944] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1004.319862] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 1004.320789] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1004.321769]
13:11:26 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:26 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x80000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:11:26 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:26 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 9)
13:11:26 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000100)="fd87d09a5c811a9f114cc1c6c40abb7c4675a3b033398a0d0f5ad608dab1eb64e4f3a8c9c1916c47e6a6bb633a6f248645b96a7db16793542fc111c5abc6a7d95f9bcbcc43e58222a4c9689a01456341c8ddcba56560b4697b1eeed5c9f5ac34a4c9ecd637574449ba085910d27fe8d9fa38b311d71de739b49e517ddc63ae43ecb8bea4982ff8b1bb3efe206393c768af33e65c86038f7fd26c5073cbe414ae4e7d0e23c93d69e0aab158cc28866b844ff6579e229539189103e1224e337d9f7b4360", 0xc3}, {&(0x7f0000000200)="220ecf3471d1e5a11544ebaa6e29dffb1cfc3313f7111e5c02bca29450a384031b81906dfcbcf8ef134d0b28ceee57c721a26ed73106b04ad53f6b97fbdef1c9914f4b94fe4ec7639865a6a66282d9b29360462a6c21a9f09a820afda67d988a43e57bd49dce6550a8971d7de57aa27678e07d19", 0x74}], 0x2, 0x7fffffff, 0x5)
ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000002c0)=0x5)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x1, 0x1f, 0x0, 0x4000, 0x8040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0xfffffffe, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
readahead(r0, 0x80000000, 0x1000)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300), &(0x7f0000000340)=0x14)
13:11:26 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:26 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {0x0, 0x0, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:11:26 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00')
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0})
r3 = getuid()
setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=@v3={0x3000000, [{0x61000000, 0x1}, {0x7fff, 0x5}], r3}, 0x18, 0x2)
fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r2}, {0x2, 0x1, r3}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0)
r4 = epoll_create1(0x0)
dup2(r4, r4)
r5 = socket$inet6_udp(0xa, 0x2, 0x0)
r6 = dup(r5)
connect$inet6(r6, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c)
sendmmsg$inet6(r6, &(0x7f0000002880), 0x4000101, 0x0)
finit_module(0xffffffffffffffff, &(0x7f0000000480)='\x00', 0x0)
ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000400)={0x1, 0x0, 0x1000, 0xdf, &(0x7f0000000300)="b224337e70d2cd0e51711ca09aa7129bf09ae25a25c69a1f2c03ad51bad5dbc1c3b6ecada919f6be87e4031a9f74c0ee5cf9c1684a0790dad073abeb2ebe7d80d5ae4246854fca85b56b299894e114aa0070d62c3f1d509dbefddc56d21531ffc6719c168c4169c4322e0647736698c4f9d83ee352f4ac518c9002a0c7efe0cc5068085914dc872233fa18f3cf3623dae571217a6be50f67bcac77bd844d137b5d29793622185f56448bd3523bc83e966e91ea04c40eabc50a0d8cc74d51061011a10b8bcbfca9546f735c647fe8335b56790515984982d3192b4505bb2a56", 0x13, 0x0, &(0x7f0000000240)="7cba72e777b46ef9643162f0987a1895a65504"})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000005d80)={{0x1, 0x1, 0x18, r0, {0x5}}, '\x00'})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
13:11:26 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:26 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:11:26 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:26 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:26 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:26 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 10)
13:11:26 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r3, 0x0, 0x220)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x4, 0x1, 0x3, 0x0, 0x0, 0xa00, 0x6, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000100), 0x5}, 0x4c, 0x1, 0x5, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x81, 0x0, 0x800}, r2, 0xffffffffffffffff, r3, 0x3)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="010000f0f2ad3e2cd9063d131db940e4726f59988067f7ecb8ee6ccb6dbf13bce7ff477f331f8069cc159ba9657990f1753fb5dc449bff686e0dfbbb3703fe3768382e0f05bc0e382ecaafbeed3d3c6d4418f0ddf1c1f84ce2f41692d53bc3fd13a84109c7d7ae06226cf0a93cf06cc3eda3b7312d0b829785c5d3de8e3222dde6d8832d29beb4cb288ccb7c55a6daf7288ea5f977a89762f3d5f7d7d07ace452e5367f342f52ab88cb847ce96b1ac5008c1af8693fd0320662b942050c76b99d60450561712ce7362757a9c20871d12891889f76b0acd0bde99c88bdb138a37f01fc336753fa16bc851bed9e11a74684b7900f4637ffd1ed3cc0a1d0b9eedb4", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00'])
13:11:26 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
[ 1022.181722] audit: type=1400 audit(1672751486.660:24): avc: denied { tracepoint } for pid=7044 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 1022.197130] FAULT_INJECTION: forcing a failure.
[ 1022.197130] name failslab, interval 1, probability 0, space 0, times 0
[ 1022.198780] CPU: 0 PID: 7071 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1022.199821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1022.200863] Call Trace:
[ 1022.201220]
[ 1022.201536] dump_stack_lvl+0x8f/0xb7
[ 1022.202076] should_fail_ex.cold+0x5/0xa
[ 1022.202642] should_failslab+0x9/0x20
[ 1022.203169] __kmem_cache_alloc_node+0x5b/0x400
[ 1022.203787] ? security_prepare_creds+0x116/0x190
[ 1022.204451] ? security_prepare_creds+0x116/0x190
[ 1022.205102] __kmalloc+0x46/0xc0
[ 1022.205612] security_prepare_creds+0x116/0x190
[ 1022.206262] prepare_creds+0x509/0x6f0
[ 1022.206786] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 1022.207474] lookup_user_key+0x387/0x1260
[ 1022.208043] ? lock_release+0x3b6/0x750
[ 1022.208581] ? __pfx_lookup_user_key+0x10/0x10
[ 1022.209215] ? __pfx_lock_release+0x10/0x10
[ 1022.209808] ? trace_lock_acquire+0x14c/0x1c0
[ 1022.210455] ? __pfx_lookup_user_key_possessed+0x10/0x10
[ 1022.211194] ? _copy_from_user+0xf6/0x180
[ 1022.211748] ? memdup_user+0x89/0xd0
[ 1022.212264] __do_sys_request_key+0x1a4/0x3b0
[ 1022.212891] ? __pfx___do_sys_request_key+0x10/0x10
[ 1022.213559] ? trace_rcu_dyntick+0x1a7/0x250
[ 1022.214171] ? syscall_enter_from_user_mode+0x21/0x50
[ 1022.214865] ? syscall_enter_from_user_mode+0x21/0x50
[ 1022.215574] do_syscall_64+0x3f/0x90
[ 1022.216098] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1022.216786] RIP: 0033:0x7f1da7f6db19
[ 1022.217280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1022.219543] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1022.220534] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1022.221446] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1022.222343] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1022.223232] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1022.224132] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1022.225095]
13:11:26 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:26 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {0x0, 0x0, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:11:26 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:41 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:41 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000), 0x0, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:11:41 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:41 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
pipe(&(0x7f0000000000))
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00')
dup3(r0, r1, 0x0)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x0)
r2 = syz_open_dev$vcsa(&(0x7f0000000140), 0x200, 0x201000)
ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000180)=0x7)
13:11:41 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x3010000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:11:41 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 11)
13:11:41 executing program 5:
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:11:41 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:11:59 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 12)
13:11:59 executing program 4:
sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x1)
perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x6, 0x8, 0xe0, 0x3f, 0x0, 0x4bbd, 0x8000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x400, 0xffffffffffff8001}, 0x3, 0x9c, 0x0, 0x5, 0x6, 0x2, 0xd7, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xb)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
shutdown(r1, 0x0)
recvmmsg(r1, &(0x7f0000002800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000000)={0x80001014})
r2 = syz_open_dev$vcsu(&(0x7f0000000100), 0x9, 0x400d00)
sendmsg$NL80211_CMD_NEW_MPATH(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYRES64=r0, @ANYRES16], 0x68}, 0x1, 0x0, 0x0, 0x82855}, 0x41041)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00'})
openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r3, 0x0, 0x220)
sendmmsg$sock(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x3, 0x2}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000600)="75ba41887bdb5262cebeaea2796e953c054723a32acc788e19182898de6903a851a1ce88d6fe6186cda79b5ade91b51ed24639bf831b21ee92d8da49fdf8b12d4f8ba133916e49ab43", 0x49}, {&(0x7f0000000680)="74a2ac0cfcc7d5defc3c98741bdb3bd947280cfda1337ddbeb239161e86af85d0048f564baef63a65f78d097bc99cabd934e95d7ec1825244637278aa91992399f77806c048381cc6bd6c5a945a5", 0x4e}, {&(0x7f0000000380)="35f1f78cea4dae6f2b9b1499d93ba218a73fe477e3d617acc3d643fb23e190dabf84ccccabb82e7c70dcb625bdd3cfacd09c8d", 0x33}], 0x3}}, {{&(0x7f0000000700)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e23, 0x6, @rand_addr=' \x01\x00'}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)="209ca708f3ef628530dbd5088a5102ad618fbff15cba18d851ce779b13b901b6681c7729f982412e4edbaabfb1b5c420a7f2e531a7485e4c2df55d5374c66a70cd7aed5deaeef4ece675801142727bbe960769e829e62fb4aa417b100abc7c3e826c87cfb43d47bd517e8fc0b90292a06b1795274c87d87ee49943def16cb0ad71fa59544229f635130720c8dea8e90b52cb80fc1fb1929db4c8e3a6a824327b128d218d9afdd95802f2b7d619aac1c2a5779179952b00fce5a0cf35fb4de963d3fda5b9238a3a1319dca0441bcf28162bb5d5a4bcf68736ceff7f224ca149a555760f441498f26787b912bf7948debff366a129c9", 0xf5}], 0x1, &(0x7f00000008c0)=[@timestamping={{0x14}}, @mark={{0x14, 0x1, 0x24, 0xfffffff7}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xb6b4}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x90}}], 0x2, 0x400c0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, 0xffffffffffffffff, 0x0)
ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000140))
close(0xffffffffffffffff)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x80000f, 0x11, 0xffffffffffffffff, 0x0)
syz_io_uring_setup(0x7668, &(0x7f00000003c0)={0x0, 0x132c, 0x10, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000440), &(0x7f0000000480))
13:11:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000), 0x0, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:11:59 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x77, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xfffffffffff7fffd, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
fallocate(r0, 0x44, 0x3, 0x5)
r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80960, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r2, 0x0, 0x0, 0x87ffffc)
r3 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000300)=0x80, 0x80800)
connect$inet6(r3, &(0x7f0000000340)={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x2}, 0x1c)
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x5adc00, 0x43)
write$binfmt_aout(r4, 0x0, 0x220)
connect$inet6(r2, &(0x7f0000000500)={0xa, 0x4e24, 0x7, @private2, 0xd2d7}, 0x1c)
getgroups(0x7, &(0x7f0000000380)=[0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0xee00])
write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x2, {0x18d2, {0x0, 0x3}, 0x80, 0x0, r5, 0x1, 0x7, 0x9, 0x100, 0x3, 0x9, 0x10001, 0x8, 0x10000000, 0xba, 0x8, 0x8, 0x1, 0x1000, 0x8}}, 0xa0)
r6 = fcntl$getown(r2, 0x9)
perf_event_open(0x0, r6, 0x0, r1, 0x8)
capget(&(0x7f0000000200)={0xaf04b395ff6d1e40, r6}, &(0x7f0000000240)={0x9a9, 0x10000, 0xa85c, 0x3c, 0x8, 0x3})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/key-users\x00', 0x0, 0x0)
r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x94400, 0x0)
connect$inet6(r8, &(0x7f00000004c0)={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x3}, 0x1c)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x9, 0x8, 0x7, 0x0, 0x6, 0x21003, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x415a1, 0x5, 0x0, 0x8, 0x1, 0x200, 0x1, 0x0, 0x101, 0x0, 0x3}, 0x0, 0xe, r7, 0x0)
13:11:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:11:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:11:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
[ 1054.962649] FAULT_INJECTION: forcing a failure.
[ 1054.962649] name failslab, interval 1, probability 0, space 0, times 0
[ 1054.963491] CPU: 0 PID: 7141 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1054.964077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1054.964639] Call Trace:
[ 1054.964839]
[ 1054.965021] dump_stack_lvl+0x8f/0xb7
[ 1054.965323] should_fail_ex.cold+0x5/0xa
[ 1054.965646] ? key_alloc+0x3d5/0x1280
[ 1054.965931] should_failslab+0x9/0x20
13:11:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
[ 1054.966223] kmem_cache_alloc+0x5a/0x410
[ 1054.966725] key_alloc+0x3d5/0x1280
[ 1054.967017] ? lock_is_held_type+0xdb/0x130
[ 1054.967347] ? __pfx_key_alloc+0x10/0x10
[ 1054.967647] ? security_prepare_creds+0x116/0x190
[ 1054.968005] ? rcu_read_lock_sched_held+0x42/0x80
[ 1054.968379] ? trace_kmalloc+0x2d/0xe0
[ 1054.968671] ? __kmalloc+0x73/0xc0
[ 1054.968942] ? selinux_cred_prepare+0x13/0x170
[ 1054.969290] keyring_alloc+0x46/0xc0
[ 1054.969598] lookup_user_key+0xbef/0x1260
[ 1054.969914] ? __pfx_lookup_user_key+0x10/0x10
[ 1054.970250] ? __pfx_lock_release+0x10/0x10
[ 1054.970577] ? trace_lock_acquire+0x14c/0x1c0
[ 1054.970917] ? __pfx_lookup_user_key_possessed+0x10/0x10
[ 1054.971330] ? _copy_from_user+0xf6/0x180
[ 1054.971640] ? memdup_user+0x89/0xd0
[ 1054.971933] __do_sys_request_key+0x1a4/0x3b0
[ 1054.972274] ? __pfx___do_sys_request_key+0x10/0x10
[ 1054.972682] ? syscall_enter_from_user_mode+0x21/0x50
[ 1054.973077] ? syscall_enter_from_user_mode+0x21/0x50
[ 1054.973482] do_syscall_64+0x3f/0x90
[ 1054.973789] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1054.974194] RIP: 0033:0x7f1da7f6db19
[ 1054.974482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1054.975784] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1054.976335] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1054.976845] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1054.977363] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1054.977900] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1054.978433] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1054.978987]
13:11:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:11:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:11:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000), 0x0, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:11:59 executing program 5:
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x51, 0xff}, 0x0, 0x0, 0x3, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x39, 0x8500)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6f, 0xdd, 0x2, 0xca, 0x0, 0x0, 0x10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x842, 0x8, 0x7, 0x4, 0x5, 0x9, 0xfff, 0x0, 0xffffffff, 0x0, 0x896}, 0xffffffffffffffff, 0x8, r0, 0x9)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
capget(&(0x7f0000000200)={0x20071026}, &(0x7f0000000240)={0x1, 0xfffffff9, 0x7, 0x7ff, 0x20, 0x76f})
13:11:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:11:59 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 13)
13:11:59 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00')
read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9)
io_uring_enter(0xffffffffffffffff, 0x58df, 0x0, 0x0, 0x0, 0x0)
r1 = syz_io_uring_setup(0x180, &(0x7f0000000540)={0x0, 0x0, 0x2, 0x0, 0x27e, 0x0, 0x0}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240))
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ftruncate(r2, 0x2)
perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x4d, 0x1, 0x3f, 0x8, 0x0, 0x200, 0x0, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x1}, 0x10002, 0x8, 0xfffffff8, 0x2, 0x100, 0x5, 0x4, 0x0, 0xffff, 0x0, 0xe707}, 0x0, 0x5, r2, 0x0)
ioctl$AUTOFS_IOC_SETTIMEOUT(0xffffffffffffffff, 0x80049367, &(0x7f0000000400)=0x2)
openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x14b03, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000300)={@id={0x2, 0x0, @auto="0059685263ded7d1b41834e2062127e6"}})
ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140)={0xa49, 0x4, 0x5, 0x0, 0xb0000000})
syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00')
syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00')
13:11:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4a010000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:11:59 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'})
connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2}, 0x1c)
13:11:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 1)
13:11:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9", 0x12, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
[ 1055.282300] FAULT_INJECTION: forcing a failure.
[ 1055.282300] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1055.283291] CPU: 0 PID: 7181 Comm: syz-executor.3 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1055.283843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1055.284396] Call Trace:
[ 1055.284587]
[ 1055.284755] dump_stack_lvl+0x8f/0xb7
[ 1055.285050] should_fail_ex.cold+0x5/0xa
[ 1055.285358] strncpy_from_user+0x38/0x3e0
[ 1055.285678] __do_sys_request_key+0x85/0x3b0
[ 1055.286009] ? __pfx___do_sys_request_key+0x10/0x10
[ 1055.286377] ? syscall_enter_from_user_mode+0x21/0x50
[ 1055.286751] ? syscall_enter_from_user_mode+0x21/0x50
[ 1055.287131] do_syscall_64+0x3f/0x90
[ 1055.287415] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1055.287791] RIP: 0033:0x7fe3ed5a5b19
[ 1055.288056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1055.289244] RSP: 002b:00007fe3eab1b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1055.289773] RAX: ffffffffffffffda RBX: 00007fe3ed6b8f60 RCX: 00007fe3ed5a5b19
[ 1055.290261] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1055.290743] RBP: 00007fe3eab1b1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1055.291218] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 1055.291698] R13: 00007ffe3d8a527f R14: 00007fe3eab1b300 R15: 0000000000022000
[ 1055.292211]
13:12:16 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 2)
13:12:16 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:12:16 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x4}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
sendmsg$802154_dgram(r2, &(0x7f0000000680)={&(0x7f00000005c0)={0x24, @short={0x2, 0x1, 0xaaa0}}, 0x14, &(0x7f0000000640)={&(0x7f0000000600)="c60f", 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x4004800)
pwritev2(r1, &(0x7f0000000580)=[{&(0x7f0000000bc0)="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", 0x1000}], 0x1, 0x0, 0x36, 0x4)
r3 = clone3(&(0x7f00000004c0)={0x400, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0xf}, &(0x7f00000002c0)=""/229, 0xe5, &(0x7f00000003c0)=""/155, &(0x7f0000000480)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x58)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x80, 0xc1, 0x6, 0x0, 0x63, 0x80008, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000140), 0x9}, 0x40000, 0x81, 0x3, 0x9, 0x200, 0x36e, 0x787, 0x0, 0x0, 0x0, 0x3}, r3, 0x10, r0, 0xb)
r4 = syz_open_dev$mouse(&(0x7f0000000840), 0x1, 0x100)
r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r5, 0x0, 0x220)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r4, 0x8008f513, &(0x7f0000000540))
lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="08000501", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r6, @ANYBLOB="10000700000000002000040000000000"], 0x84, 0x2)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01, r6}}, './file0\x00'})
13:12:16 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:12:16 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 14)
13:12:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x6e000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:12:16 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0)
r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000380), 0x4080, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32])
ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x80000001)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0xf6, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x0, 0x100000001, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0xffffffffffffbb9b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000380)={r0, 0x8, 0x1, 0x400})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000))
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000))
r4 = eventfd2(0xae, 0x0)
ioctl$AUTOFS_IOC_EXPIRE(r4, 0x810c9365, &(0x7f00000003c0)={{0x2, 0x26c}, 0x100, './file1\x00'})
r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0)
sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000240)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}}, 0x0)
fallocate(r5, 0x0, 0x0, 0x87ffffc)
socket$nl_xfrm(0x10, 0x3, 0x6)
r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
write(r6, &(0x7f0000000080)="01", 0x292e9)
13:12:16 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9", 0x12, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:12:16 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
[ 1071.806746] FAULT_INJECTION: forcing a failure.
[ 1071.806746] name failslab, interval 1, probability 0, space 0, times 0
[ 1071.808748] CPU: 1 PID: 7199 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1071.809890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1071.811019] Call Trace:
[ 1071.811402]
[ 1071.811755] dump_stack_lvl+0x8f/0xb7
[ 1071.812360] should_fail_ex.cold+0x5/0xa
[ 1071.812965] ? key_alloc+0x433/0x1280
[ 1071.813533] should_failslab+0x9/0x20
[ 1071.814101] __kmem_cache_alloc_node+0x5b/0x400
[ 1071.814787] ? key_alloc+0x433/0x1280
[ 1071.815359] ? key_alloc+0x433/0x1280
[ 1071.815927] __kmalloc_node_track_caller+0x43/0xb0
[ 1071.816656] kmemdup+0x2c/0x60
[ 1071.817147] key_alloc+0x433/0x1280
[ 1071.817709] ? lock_is_held_type+0xdb/0x130
[ 1071.818359] ? __pfx_key_alloc+0x10/0x10
[ 1071.818952] ? security_prepare_creds+0x116/0x190
[ 1071.819664] ? rcu_read_lock_sched_held+0x42/0x80
[ 1071.820368] ? trace_kmalloc+0x2d/0xe0
[ 1071.820967] ? __kmalloc+0x73/0xc0
[ 1071.821503] ? selinux_cred_prepare+0x13/0x170
[ 1071.822198] keyring_alloc+0x46/0xc0
[ 1071.822764] lookup_user_key+0xbef/0x1260
[ 1071.823381] ? __pfx_lookup_user_key+0x10/0x10
[ 1071.824034] ? __pfx_lock_release+0x10/0x10
[ 1071.824678] ? trace_lock_acquire+0x14c/0x1c0
[ 1071.825368] ? __pfx_lookup_user_key_possessed+0x10/0x10
[ 1071.826163] ? _copy_from_user+0xf6/0x180
[ 1071.826789] ? memdup_user+0x89/0xd0
[ 1071.827364] __do_sys_request_key+0x1a4/0x3b0
[ 1071.828050] ? __pfx___do_sys_request_key+0x10/0x10
[ 1071.828813] ? trace_rcu_dyntick+0x1a7/0x250
[ 1071.829493] ? syscall_enter_from_user_mode+0x21/0x50
[ 1071.830279] ? syscall_enter_from_user_mode+0x21/0x50
[ 1071.831053] do_syscall_64+0x3f/0x90
[ 1071.831628] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1071.832388] RIP: 0033:0x7f1da7f6db19
[ 1071.832940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1071.835485] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1071.836553] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1071.837555] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1071.838584] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1071.839624] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1071.840651] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1071.841711]
13:12:16 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 3)
13:12:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x803e0000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:12:16 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:12:16 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(0x0, &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:12:16 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa8088, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0xcc80, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0)
r0 = syz_io_uring_setup(0x4cdd, &(0x7f0000000140)={0x0, 0x6c4c, 0x0, 0x2, 0x20f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000300))
syz_io_uring_setup(0x2c86, &(0x7f0000000600)={0x0, 0x0, 0x2, 0x6, 0x210}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000480), &(0x7f0000000800))
r1 = getpid()
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000004, 0x2811, r2, 0x0)
get_robust_list(r1, &(0x7f00000007c0)=&(0x7f0000000740)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)}}, &(0x7f0000000840)=0x18)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000340), &(0x7f00000005c0))
perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x7, 0x3, 0xa6, 0x0, 0x2381, 0x400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x393a, 0x4, @perf_config_ext={0x7, 0x101}, 0x5209, 0x7, 0x9, 0x4, 0x0, 0x2, 0x3, 0x0, 0x2, 0x0, 0x3ff}, r1, 0x7, 0xffffffffffffffff, 0x1)
fallocate(r3, 0x0, 0x0, 0x87ffffc)
r4 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100000, 0x95)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0xffffffffffffff0e, 0x7, 0x6, 0x7})
close(r2)
syz_io_uring_setup(0x6f33, &(0x7f00000004c0)={0x0, 0xffffffff, 0x20, 0xfffffffd, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000380))
syz_io_uring_setup(0x800c07, &(0x7f0000000680)={0x0, 0x4d14, 0x20, 0x2, 0x3b7, 0x0, r0}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000700), &(0x7f0000000780))
ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/47)
13:12:16 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9", 0x12, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:12:16 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 15)
13:12:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc0000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:12:16 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:12:31 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 4)
13:12:31 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc03e0000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:12:31 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x141042, 0x0)
pwritev(r3, &(0x7f0000000640)=[{&(0x7f00000002c0)="02", 0x1}], 0x1, 0x0, 0x0)
ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0)
perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x2, 0x1, 0xa, 0x2, 0x0, 0x100000000, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0xa805, 0xf000000000000000, 0xfffffc00, 0x5, 0x10001, 0x400, 0x2, 0x0, 0x8, 0x0, 0x400}, r4, 0x0, r1, 0xa)
sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x0)
r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000000)={0x0, r3})
13:12:31 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:12:31 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:12:31 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 16)
13:12:31 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687", 0x1b, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:12:31 executing program 5:
fork()
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)=0x5)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x30, 0x8, 0x0, 0x20, 0x0, 0x80, 0x35291, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x2, 0xb06}, 0x400, 0x81, 0x5bb5, 0x1, 0x1ff, 0x6, 0x40, 0x0, 0x8, 0x0, 0x401}, 0xffffffffffffffff, 0xf, r0, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000001c0)={0x0, @adiantum, 0x0, @desc3})
[ 1086.948224] FAULT_INJECTION: forcing a failure.
[ 1086.948224] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1086.949169] CPU: 1 PID: 7258 Comm: syz-executor.3 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1086.949749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1086.950308] Call Trace:
[ 1086.950502]
[ 1086.950679] dump_stack_lvl+0x8f/0xb7
[ 1086.950980] should_fail_ex.cold+0x5/0xa
[ 1086.951293] _copy_from_user+0x2e/0x180
[ 1086.951588] memdup_user+0x72/0xd0
[ 1086.951856] strndup_user+0x78/0xe0
[ 1086.952129] __do_sys_request_key+0x107/0x3b0
[ 1086.952471] ? __pfx___do_sys_request_key+0x10/0x10
[ 1086.952845] ? syscall_enter_from_user_mode+0x21/0x50
[ 1086.953221] ? syscall_enter_from_user_mode+0x21/0x50
[ 1086.953605] do_syscall_64+0x3f/0x90
[ 1086.953891] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1086.954283] RIP: 0033:0x7fe3ed5a5b19
[ 1086.954555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1086.955778] RSP: 002b:00007fe3eab1b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1086.956304] RAX: ffffffffffffffda RBX: 00007fe3ed6b8f60 RCX: 00007fe3ed5a5b19
[ 1086.956793] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1086.957293] RBP: 00007fe3eab1b1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1086.957794] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 1086.958306] R13: 00007ffe3d8a527f R14: 00007fe3eab1b300 R15: 0000000000022000
[ 1086.958857]
13:12:31 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 5)
[ 1087.028949] FAULT_INJECTION: forcing a failure.
[ 1087.028949] name failslab, interval 1, probability 0, space 0, times 0
[ 1087.030552] CPU: 0 PID: 7268 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
13:12:31 executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0)
openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/shm\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@mmap}, {@version_u}, {@version_L}, {@aname={'aname', 0x3d, 'vfat\x00'}}, {@cache_none}, {@dfltgid}], [{@fowner_lt}, {@measure}, {@appraise}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}]}})
flock(0xffffffffffffffff, 0x0)
[ 1087.031623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1087.032830] Call Trace:
[ 1087.033181]
[ 1087.033495] dump_stack_lvl+0x8f/0xb7
[ 1087.034053] should_fail_ex.cold+0x5/0xa
[ 1087.034618] should_failslab+0x9/0x20
[ 1087.035132] __kmem_cache_alloc_node+0x5b/0x400
[ 1087.035756] ? selinux_key_alloc+0x4a/0x1b0
[ 1087.036328] ? memcpy+0x3d/0x60
[ 1087.036803] kmalloc_trace+0x26/0x60
[ 1087.037314] selinux_key_alloc+0x4a/0x1b0
[ 1087.037879] security_key_alloc+0x5a/0xb0
[ 1087.038458] key_alloc+0x8a7/0x1280
[ 1087.038978] ? lock_is_held_type+0xdb/0x130
[ 1087.039562] ? __pfx_key_alloc+0x10/0x10
[ 1087.040093] ? security_prepare_creds+0x116/0x190
[ 1087.040736] ? rcu_read_lock_sched_held+0x42/0x80
[ 1087.041388] ? trace_kmalloc+0x2d/0xe0
[ 1087.041912] ? __kmalloc+0x73/0xc0
[ 1087.042409] ? selinux_cred_prepare+0x13/0x170
[ 1087.043040] keyring_alloc+0x46/0xc0
[ 1087.043567] lookup_user_key+0xbef/0x1260
[ 1087.044143] ? __pfx_lookup_user_key+0x10/0x10
[ 1087.044748] ? __pfx_lock_release+0x10/0x10
[ 1087.045322] ? trace_lock_acquire+0x14c/0x1c0
[ 1087.045954] ? __pfx_lookup_user_key_possessed+0x10/0x10
[ 1087.046712] ? _copy_from_user+0xf6/0x180
[ 1087.047266] ? memdup_user+0x89/0xd0
[ 1087.047793] __do_sys_request_key+0x1a4/0x3b0
[ 1087.048406] ? __pfx___do_sys_request_key+0x10/0x10
[ 1087.049063] ? trace_rcu_dyntick+0x1a7/0x250
[ 1087.049678] ? syscall_enter_from_user_mode+0x21/0x50
[ 1087.050382] ? syscall_enter_from_user_mode+0x21/0x50
[ 1087.051098] do_syscall_64+0x3f/0x90
[ 1087.051615] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1087.052329] RIP: 0033:0x7f1da7f6db19
[ 1087.052841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1087.055169] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1087.056171] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1087.057109] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1087.058071] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1087.059010] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1087.059946] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1087.060941]
13:12:31 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xe03f0300}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
[ 1087.148330] 9pnet_fd: Insufficient options for proto=fd
[ 1087.165843] 9pnet_fd: Insufficient options for proto=fd
13:12:48 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 17)
13:12:48 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:12:48 executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0)
openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/shm\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@mmap}, {@version_u}, {@version_L}, {@aname={'aname', 0x3d, 'vfat\x00'}}, {@cache_none}, {@dfltgid}], [{@fowner_lt}, {@measure}, {@appraise}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}]}})
flock(0xffffffffffffffff, 0x0)
13:12:48 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:12:48 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:12:48 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 6)
13:12:48 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687", 0x1b, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:12:48 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x81, 0x7, 0x7, 0x19, 0x0, 0x8, 0x85004, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xc5e5, 0x5}, 0x0, 0x9, 0x4, 0x9, 0x8, 0x3, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xc, r0, 0xb)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:12:48 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 1)
13:12:48 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', 0x0, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
[ 1103.849431] 9pnet_fd: Insufficient options for proto=fd
13:12:48 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 7)
13:12:48 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:12:48 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 18)
13:12:48 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x2, 0x3, 0x4, 0x1, 0x0, 0x6f7e, 0x22, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x40c, 0x5, 0x20, 0x9, 0x0, 0x80, 0x1, 0x0, 0x3, 0x0, 0xffff}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9)
13:12:48 executing program 4:
syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000002080)=ANY=[@ANYRESOCT, @ANYBLOB="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", @ANYRES64])
chdir(&(0x7f0000000140)='./file0\x00')
openat(0xffffffffffffffff, &(0x7f0000000e00)='./file1/file0\x00', 0x214801, 0x120)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000800)='./file1/file0\x00', 0x148, 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000840)="ec14ed39a2b56e72b9211c6384e92450a4b16ebd0185883c91c8a463dd306db551850bec4b33c52e9f039dc8e1a31d3173e064ea2ec432dc56731cb7fd0ff5c97af721bc2b7ef8ead48172f8ad073417bbc1d8932435fdf65ec2a67c8e101595c0edd2483513a5047c204d9554024b143ecfc4203e5295d3442577faec19d1cf1e094e8de2043eb0e76dcc6d5077237bb3f6cf3200fa75af061d3509756c2efd99c0b848603d2b0b9b72cdd15bdb0bf6", 0xb0, 0x1}, {&(0x7f0000000900)="c80f73226dca43b9bb0cb8d379b1a9aea2ebfd4f99b19ae67dda2be8fb689aada249d018628f1e9a838e07b5ff6348a13e30c007ae70a8bfe0570ecb05ac37f7c910d0d000d6e248f15c6517a17457adbfb98615fe5205a72d13dc5dfb133209114f3d76e592f55894f9d0a2ae22ce85f86ac5475ddd533c4aef98d3a9c7122a26c289148892777b817aabe857f8fdc54a0116148d1dbcebc58e0b3b575255e77fa3fe16e596f460838fe8e73435b54fa2bced626fca4a99a2ec3542077f1a0f920de534fe8e62ca5f58bc255f4a7043027105f16601f09fa438014d9408f1716b14698894cb74aca733fc525aa318b7de94ddc0f488a0", 0xf7, 0x9}, {&(0x7f0000000a00)="7370f662fc0a768eddcee0c555e00aba5dd8fc33ff0a689653305ea7c4dad4186326eb07b5d250679921c15c81be25eaf651df0d3676bb79e1fa1fa169e1b7eeca09605c3f30e57c0e639dc906d974734267531035a429c35d235ee76466cd081d247619fdf56d267f51b44044af5cf1567ff695d1c6c8b1af01813b7eef683512c4e673d5c7d8bf8f7417e8a6eab3154b4a", 0x92, 0x100000000}, {&(0x7f0000000ac0)="a5d51d29ea1f567040a7b40fcc916dd8d97b45de0cc0c8a1a1bf629bcfba450534fea6e9babdf1e06b60503fa037ffea28f8228d3a4449ae96aaad15a1ab943d40bda654237d4c99768dbdee75f7b9199b5abd791201dc45ed8761369cff8b67690c8f7790a10f15a03a5a4f049e351987912b647f3877ed17b0915f78daf10cb089761f5c4f301d21abf9f68167234f67f552bcd856140e59d42223c78b15d5b72cb4be2060a557fd4340eb28a7de94df5ab241f51ad5a5d329108cc18705e33173db92e16a0a77c633a36f6c7c192f17bbde1777b6c00f746997a7080d", 0xde}, {&(0x7f0000000bc0)="9ff8c9c7ae3455e74b329088f07e53b1d650f4a77a8338817e6fcc26b3ab97ea0c155a6094d90e877c7af344bd76928098de0ff655a6071573bf80b43777581015d217de17a5f491274e3ed5d7adc8b83fb55ca6b3bd2d93dc81ef83fca2e9a0656b0b37ab33408d1d2d0ee928149f51e9c84eb08a1bdaab61bd4825d7b110cefa817f44046df72bfd831b505140c52ce044cb0203a924999d41224fc999aa7f8fcb84d24bae1fc243394ac8d6e9c18fa052a2221211fbe7200c5c50b4895aae49c22877e268ed97743249d10a8758d7d73f3934be37c98b82429d770fc644b4651037a1de9f9f6a9068ca39127d96efb9673e76d19b", 0xf6, 0x33}], 0x20, &(0x7f0000001f00)=ANY=[@ANYBLOB="696f636861727365743d6d6163726f6d616e69616e2c73686f72746e616d653d77696e39352c73686f72746e616d653d77696e39352c73686f72746e616d653d77695c39352c6e6e6f6e756d7461696c3d312c696f636861727365743d63703433372c73686f72746e616d653d6d697865642c7065726d69745f6469f2656374696f2c007e7e6853d8e1a4d5b7ffc5f1548523b4c4e1009257eb76f0833da9c8cafed876caf6d2ffdc197faef9cc537ec6d1fdcef946b2cc9c7fa74a49d6c3ea92580054e4b07f0cb59be1268be90dd2031b64935c87d8c7fd3ac6e0b5098c9cac3c546f71f52888f3decc27d971e3629639b6ab3b2cdc21efa631634fdd239950bb3f4eb142eedfe6bda3bb79780c3dfaabac2cb9790367e0db58625ff9eeea0406b3813bc7f98d8b31394317bb6ef48bd9072e0cd567ca4c1cbbdbef409882f8f57eb254d13f60837773279bb58e3f50b700"])
openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0)
openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/shm\x00', 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file1/file0\x00'})
chroot(&(0x7f0000000000)='./file0\x00')
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000ec0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'})
ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000000f00)={{r1}, "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"})
execveat(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', &(0x7f0000000640)=[&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='vfat\x00', &(0x7f0000000440)='/proc/sysvipc/shm\x00', &(0x7f0000000480)='/proc/sysvipc/shm\x00', &(0x7f00000004c0)='))\\\x00', &(0x7f0000000500)='(\x00', &(0x7f0000000540)='/dev/nvram\x00', &(0x7f0000000580)='vfat\x00'], &(0x7f00000007c0)=[&(0x7f0000000680)='/dev/nvram\x00', &(0x7f00000006c0)='%\'\x00', &(0x7f0000000700)='},[)/\xf5\x00', &(0x7f0000000740)='/dev/nvram\x00', &(0x7f0000000780)='vfat\x00'], 0x800)
r2 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0)
getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400))
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
accept4$unix(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0)
sendfile(r2, r0, 0x0, 0xfffffdef)
[ 1104.037508] FAULT_INJECTION: forcing a failure.
[ 1104.037508] name failslab, interval 1, probability 0, space 0, times 0
[ 1104.039332] CPU: 1 PID: 7324 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1104.040316] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1104.041278] Call Trace:
[ 1104.041613]
[ 1104.041918] dump_stack_lvl+0x8f/0xb7
[ 1104.042443] should_fail_ex.cold+0x5/0xa
[ 1104.042947] ? key_alloc+0x3d5/0x1280
[ 1104.043439] should_failslab+0x9/0x20
[ 1104.043922] kmem_cache_alloc+0x5a/0x410
[ 1104.044436] key_alloc+0x3d5/0x1280
[ 1104.044946] ? __pfx_key_alloc+0x10/0x10
[ 1104.045464] ? search_cred_keyrings_rcu+0x93/0x2e0
[ 1104.046092] request_key_and_link+0x6c5/0x1210
[ 1104.046691] ? __pfx_request_key_and_link+0x10/0x10
[ 1104.047305] ? lock_acquire+0x32/0xc0
[ 1104.047788] ? key_type_lookup+0x1e/0x100
[ 1104.048309] ? __pfx_key_default_cmp+0x10/0x10
[ 1104.048877] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1104.049524] ? _copy_from_user+0xf6/0x180
[ 1104.050044] __do_sys_request_key+0x21f/0x3b0
[ 1104.050628] ? __pfx___do_sys_request_key+0x10/0x10
[ 1104.051244] ? trace_rcu_dyntick+0x1a7/0x250
[ 1104.051784] ? syscall_enter_from_user_mode+0x21/0x50
[ 1104.052426] ? syscall_enter_from_user_mode+0x21/0x50
[ 1104.053074] do_syscall_64+0x3f/0x90
[ 1104.053559] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1104.054226] RIP: 0033:0x7f1da7f6db19
[ 1104.054690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1104.056793] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1104.057684] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1104.058531] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1104.059360] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1104.060191] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1104.061030] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1104.061892]
[ 1104.088420] FAULT_INJECTION: forcing a failure.
[ 1104.088420] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1104.089977] CPU: 1 PID: 7330 Comm: syz-executor.0 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1104.090923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1104.091846] Call Trace:
[ 1104.092155]
[ 1104.092429] dump_stack_lvl+0x8f/0xb7
[ 1104.092903] should_fail_ex.cold+0x5/0xa
[ 1104.093346] FAULT_INJECTION: forcing a failure.
[ 1104.093346] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1104.094623] strncpy_from_user+0x38/0x3e0
[ 1104.095149] __do_sys_request_key+0x85/0x3b0
[ 1104.095686] ? __pfx___do_sys_request_key+0x10/0x10
[ 1104.096292] ? trace_rcu_dyntick+0x1a7/0x250
[ 1104.096833] ? syscall_enter_from_user_mode+0x21/0x50
[ 1104.097441] ? syscall_enter_from_user_mode+0x21/0x50
[ 1104.098062] do_syscall_64+0x3f/0x90
[ 1104.098539] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1104.099151] RIP: 0033:0x7f7242783b19
[ 1104.099587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1104.101586] RSP: 002b:00007f723fcd8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1104.102459] RAX: ffffffffffffffda RBX: 00007f7242897020 RCX: 00007f7242783b19
[ 1104.103255] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1104.104063] RBP: 00007f723fcd81d0 R08: 0000000000000000 R09: 0000000000000000
[ 1104.104864] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 1104.105676] R13: 00007ffdee4f6d4f R14: 00007f723fcd8300 R15: 0000000000022000
[ 1104.106502]
[ 1104.106788] CPU: 0 PID: 7326 Comm: syz-executor.3 Not tainted 6.2.0-rc1-next-20221226 #1
13:12:48 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
[ 1104.107973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1104.109140] Call Trace:
[ 1104.109493]
[ 1104.109809] dump_stack_lvl+0x8f/0xb7
[ 1104.110378] should_fail_ex.cold+0x5/0xa
[ 1104.110942] _copy_from_user+0x2e/0x180
[ 1104.111496] memdup_user+0x72/0xd0
[ 1104.112016] strndup_user+0x78/0xe0
[ 1104.112540] __do_sys_request_key+0x146/0x3b0
[ 1104.113180] ? __pfx___do_sys_request_key+0x10/0x10
[ 1104.113874] ? trace_rcu_dyntick+0x1a7/0x250
[ 1104.114521] ? syscall_enter_from_user_mode+0x21/0x50
[ 1104.115244] ? syscall_enter_from_user_mode+0x21/0x50
[ 1104.115983] do_syscall_64+0x3f/0x90
[ 1104.116509] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1104.117216] RIP: 0033:0x7fe3ed5a5b19
[ 1104.117737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1104.120128] RSP: 002b:00007fe3eab1b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1104.121144] RAX: ffffffffffffffda RBX: 00007fe3ed6b8f60 RCX: 00007fe3ed5a5b19
[ 1104.122104] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1104.123065] RBP: 00007fe3eab1b1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1104.124013] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 1104.124960] R13: 00007ffe3d8a527f R14: 00007fe3eab1b300 R15: 0000000000022000
[ 1104.125961]
13:12:48 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/bus/input/handlers\x00', 0x0, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7f, 0x0, 0x20, 0xff, 0x0, 0x0, 0x1, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x53b, 0x100000001}, 0x10000, 0x8, 0x3f, 0x0, 0x3, 0x2, 0x2, 0x0, 0x8, 0x0, 0x400}, r2, 0xd, r1, 0x2)
13:12:48 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:12:48 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:02 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:02 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:02 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 19)
13:13:02 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:13:02 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 2)
13:13:02 executing program 4:
r0 = syz_io_uring_setup(0xe76, &(0x7f0000000180), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000240))
r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000008, 0x8010, 0xffffffffffffffff, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0)
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r4, 0x0, 0x220)
ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f0000000200))
syz_io_uring_setup(0x3a25, &(0x7f0000000080)={0x0, 0xffffffff, 0x10, 0x2, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000000300), &(0x7f0000000340)=0x0)
syz_io_uring_submit(0x0, r5, &(0x7f0000000400)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r2, 0x0, &(0x7f0000000540)="7768a4b4a0fe852864c4321e993f078c327a04fdca253b696c5823ca801ee45b02277f4672fbfed9edd0610279464a9f5b397dc79773107a2cf47c9c978ac1e1596bfec09de0f1be09fa477fc28524488543b46b754e43188e48e86f11c4d11f922dc707ffbc10d6ed2ec6074434caa0990d4d2a951eb13f6641370ff5eff1f9981b5ad9b370498a1926906f81154ff559e5ccdfb3c3e38930039068ffaac6a38252df74e6a4c2c7e29a30d84bc93e7588d6b92f90e5aa39edaf34469d5cdb643259ddfc2010c5d15c70a54ca22ea81819c5c63ba9a10c4ecb19b35d11ab706543b20d4050ed6da98ed5a8b3450810389566b0d4b28569a4d391ce4abf3c5c0a90162ab9477d91cf6972242575ab894c5f1c6d7f72f2cd2f91641d75e4621226847465a63814e9c9e46e99f6cfd3231fe0071a1c0b572a22a2fb0cbb00e7c6f487833bd3c3e4f24bd1e98c58f025164a2bbc126cd83f4b7789944ca6117facbc9401ac85e9fea9fa0cb07bf28111baacc38c4023618b7760c47679347a02ff4aedcf725a5dcd50498967fe200067ff06d5f37505d1cc4c34fd268736518311a44da454b97bcfca869fbd0a58c3dfb9c4a2d3e64e9af9f30dc547f4ee2c0ffedc58b4e9013fa1dc37df3b15cf62d0a26a22127f8afeef74e570759542ce77483f9f1df902c4894f981dfe2503ec49114c21eb8d4cdcb640388e3276f75259f5e75fedf3022c6affd3f8f7aaf758ac8c4f4111b58482656b49625096007776cd5e7f080a12f5d9aff02a1700f67205827ecbcd25253e7c4ef2c34a9977e7750d81cbf854038f33a26c3115ea9ec27a41071ecd8375e4a34cc3882409780b97cf8eb2d070b36b5d68b03bbbb2e6e6190bdf3698fe76ab256715532f7bfc10666dbcd342d3b21e5f6564312578f27ac4a15b846a9709cd6e487d3e060495aac1485871d4b413e5c28b552f45a649bb75cb97e70110c908bee758ce872c1c1c94fe4bf269dae60aabd0e03b8b4f3922f6b098eaa6df7e20f1e04279174b0abf53c93a867ceb32fa47798e0b00e416581d6da1256bfdadc5a713809cad6724adb2ed939f015f74f19e7d22d2bf0ac2c191cf7ebe191c83e8d7a4ec832c3e48533311bea91f0ed6944836c7ba089c382e1f8fe6244544b4b402277b0ade7412a1e26ac631d80e7513ab25dcc76cfedf7ff8ada3e87ccd0688f8d776fe005faada1e85d21d4887caf27672b635ac497e2395e42faa2050e2a6388df91459319649f83f90549b3e378b94ee4c83ec254ad033854ec4ee5fdf0a498208603de179da41b829dec03e5beec0b91966ca5ef4bbc10b731484418c53313a14e97cebb7c9683260989386f9c7b1b9f3094a7aae2ed741c1d8328d3b71820c9457b5bfc93c21419d685d003d4c713a6aaa77374b71be5a9f2dfb82bdfe467b77b59337359a69c1ba467a25787c8f2eb33ea7062a0367778f66864ffa6de4ac426ac7ad36d1c06d2733a71a5c24c40e832798fca018f59e33d128a90cc5092da73c4f4a6bb0765f2e041d48083e049b45792fe1605bb32f8bb1be25ea2b53e4b40f3e63503975e00d90db7ffa7088cccf6ea9f7b856676ec7e4d3cc092f5dbfd406ccacc0f5f1f36337b53345bc5629b711154fa39bcc770a5e79c07db3da86b2971d640dc0ddb5514718f2ee12adb5b31d4adba4f31c49d7f6613523ff3b83413d6f426a8c8b4fbd448537aceabbe176cf9c63d1d0d54868f8970a311e2fc70c2384468a149b941403ace5ac9bd7e63db9d0a83a8edd7cc607ff66ceab94ee7971af0ce10cb916cc73e20e6880899cabbc5bdcf3ab6600a9bb56442d3764e8fd3b6ac323bf01b269f9416c5aa53dc5e8ceba00cf2d825858cd12263b4d0507879b72a2bbf4e23024afbd5aa4533f9739a82166a2891d18849a01ca0db0528537f2e0538f134847ce8c10321689a975b674190125e108f39e26ac5e67d115744ffcacf14bec672617e7f2a96152662579dda305dbdf85d818a97c6ae747e4d133958527f1850692a8e36cefd329d9b64e1e95fde4066d819dce141e7ae7ea23b4b37df4b6c279ee661f7d2b289971f1b9ee86ee66ff70bafade9468dee577b5f5d00032acca10659c0437ce96c60d7b4af949ce17be9ae95803638ceff51ddf477a9b49837c47065b86455b558e65ad5443cfa3c7a3182d2b50b46e6199ba9d8527a813a65cddc6993d42500cdff058f147b519f1fa00c28b9c867ddedcb2d11c9d8e843cf16f1fc0b5ce4f72ac8870b2ffd2be14794e815e20327a59eacfb64ccce056000c4bd75effbf7a479dde05c3dff80b56f78bd8ae55dc0ba0fa35ebe07e2150d3e54f3026454108832ce0999ce8f84d0a408a9af74090fe6f6a800d62c9270eb5523fb3dc36f184a8ebe3294b6377e683a5b492446708561a270d8ec68d82e63759e67a11784d0f8f02b4b9915daa354b1d3141d339ec875b865946f8869b47e357f3d4f2b011da25340f2ec60a20a4ce78411bc316c5b482704cc013685d578ef573eb3071f5529e9dabd0fc91563f3d9fc51efdbdbc695a9012a7eac4853a3053f3d671b18861581d7a306d228b79e47ba446be3048746f3ca6fd7b758e402d8d8e15c637813318b6c3ef8bec45c9131a6e3526c01c9dfa069a01e1610bb4cacd8f1af5402f9afbe2867b73a8a9d402660df493b543ecb1ab85db412da21ccb58a9f5d1efc137b1dec01dba9b7ef07d553da8fe396b7c56893368340f8ab441ed70ae4ab49a3552ae02b9b68330ca98d36ac44dde01ff35fa701a1c2bb606facbec831f55991fdfc39dc302e08ea7c83f4d84a1bdd7b5e1a57704b63e4ff521b2434928c5e34dd9c2abd3239b8b7726692f0b7e6e1af9210a0543c44b321129d50be9ff300599dd5b279bdfa866415dfc7610ba4590703989c05f847a860c02b68e2c3e7ae9e402cc82cc9671b3ec3aa10dedb406196746cfd270006e543744f5e0414af6ffde3a7db8f1f6c443a5fec877e61829c3712835950a6a2736c8455a21c9bb6c1b712c60b4ef44b105d357e2fbbb6ba9ae9034b5800ca31bbb4f30df2ca632d6054fcca2037723f6479416cb1a3591586ca01363b0dcba481fbbe2ec74fe5ecd88de29def9e66706cd9e2d906ecfce7d2ff42022654e8696da31d7e3abc9c30d58489d140034fa15370dfd85a49bd8fc603a1a15af7d422330618d177074cae2c65be1c13e13ecae8b5a36ac4d3a89b9c452b759d00e9c4baa41c9651c0c4270f3c3e5053450a63b32b5b7de684f51088620c0eae9ed28618e9d9a4377878907541f73ee4252bd2fafd22933f761662a01446b5b127a5231b897432d76ff9ec6e03f9b55fe987a201223af8511a45810ab814f873dcb5a531cd29a71b4a7570e7b620ed306929cc06673680b791e8678d675013e079eb3caec36264ab96d6cf40a07aeafe6ee2e2e95a0cad525ebd67a4a758b729f7fecb1367521a4e1e16d138b8556d7523bc9001232d550229bbe7a6a83e4c3dfdb4873bb986cbdab640ffd172ad7a79dd8f62f6adc97e4d83e7f06fa0af423ef41629c310265a77b758b9a331118da336918c014aeb7cbc06ead365f1ce4152a72227662cc47a75a98ef24ee1700b9138692cc16431434296aea436f28bd5520507c5c422c81a46187a4ea2766e35daeebcdb60956dde8c8184561bd35c5eaf2f8900c25d1846c7c20274977db06162e3616dda9df007339f46eb9bf0249a098c3e4ac323bf9bb6f10d45da989dc76221d73c09579ce10826eede77eb5ebcf338a0c23cd682af637b7986f5cd841830b9e1067b626d734386d73865b51d7801fe75c8365d995ab1670e2d65984f2436495443057343d988bf90b3185b3baebe2bc62ffc9578df619dd07daeb96e398b2248d4d47137b6878160dbd8e4ce057b341f3b27e9abcc48b0b158456c6acf89a1337a93048ce80dd0dcef83b4774c8b6eeb2387cf69b2bca1e3c351488fbdefb9279f015905cb67629151f180e396608991c6cfeee26bffeed77438c0d3cbd8a1a66b46a40b2253f3a830424417c92dbf00ffd18976e4e5c93fb0cbc9ff703fedea71b665b7dd2a706d9eb9b2f35d725cb82c11e73451d7f7b64617ca4077df13eff1662e91a610ac0185b7d6a74c6644a7e015e30bd46970c764107f1a32e21f0b9bbf5f79b22589de19ab4c83454fe5dd0c8fefa534d34d73353c5f6a7d6189a086ea7155fa6506f808d57a90b300ebee96002f1a6f140e30786939487c07e7f7dc97331630615a056dd50edd5eb3766ef79846e5d34d5e50b18c53cfbc746e26f89524970e2b062865ffae2394c7787c46e1e52ecaf614a21597d911fc60480eec46a5146bdc68998a6b9f94cdbba44063488824d071a85272d4aefb5d73effc9874995d2fffe7df4714d80302cfeecb698b7cfe82e9bcad5b7163d1baffcf4b124accf622ebd09ca5b29a1b4217621550ae8ad03d86a972ac7029ce9485db798990433a86f876abfd48a39fa27ce6e9b4243e38e7ce8aeab40c261c723b1310188583b18865edd6d3377ccdc9627b1fdde8d7a6418427fe75975bbdf638b143b79a8fe6e8d42a290f3560f974099fd463aaaa0d0cfb625cc2a17331f2d4d827e7edad10228602dcb863c7f63bb4b8aa24b319d279abdad10b3b69271e08948cda59f5ca296a1496b676a9cbd1aaea266d563e7f587529338dfe3ed269de1bcb71ba35beb78a96c7ba60d377d01836780b71cf848609bce63843c9d92feff47924d4703eac61e2843b6792a47691832b24722065a5d0a13024a38fa78cb3f3695e7e0854fc53b69c210fe8a05d29daf2c2d1b47fb2c4cf93fdee42480b0b4ef116a9a45647a027fb643d63c02f1e27a2496872bf3a65cffad4be1c7f7844135220582f508cdb66cb3d0823ff4a214c12f191fc689741a5ae92ad26ed0db74cfcd643a0b4c0b1f1b6a8388aa92042f0ed65aeced1bed08a6040c975d8c897f9814a824c501db90cf814a948bf98378cc83dcae98179934d66fd277e0ae85ab04469742cdbf7f389f47c47bebe76f3e5911cba0f2a9d66dd59d315d1172d6b4b6110deac38e45f6d3218f89ef1d355bcb1cba0d494d2b5bb1f30f3a95f8fb800130f3e97ffe5d01f1acb4721288ca65eec016bba537c0ac2a4009f274f18e4c88bb049192e80bbf9073fc2d7146f05204a4b43acd35b1105cc33fa11d510a538c74977f6205c1b5e59ff8d830ff3af4ba249aede84c7e0029ac00338c1441f1ab016d2c5a2af1245071facb12f3f670f8cdd9d56b23a3988c24c90e9deef197c5e6dbe982f4467ee4b512cc879046fcc9d9b5123ee3b7a349e36d1f72f3efbbc7a7da8d945ca258c77b8e4591845bf71ada578cb241ea893c1044ab5baeabb57954dc18c61e7677a20ae69f5476d636a9e3d411a6e602fe20f8bd805a4f728479d3b9c90e80ec79fdc8f340f5510cd3fbf1bcaebb92456bc3fd38c3a81d6bb7d949f68c0f72ad592637308f9e504386234c6291101abc0b11a46346e3f2121233945f725e3cd9091891aba6af8fa031b25d1fec86193b9ff87056ea530e28ac0a2048102545df1e8c03d0771f1fd571d444908fc8c2a090196adc956b2fff8286086c9dd8af6ba643df262b7bf52c73a3f3237387b83505269ba9f444de332c05dfae5f25315f0c5b9c235313708ca0c3f30123e4af4140bdc399374d3745360e3474fb76b8e536598db9a92264d569df5e2e05813bb9a205125d563d16c6901a205d4d9480f8573c0c92839ffec26de49374a2a23b38d160", 0xfff, 0xc0, 0x0, {0x0, r3}}, 0x3)
syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}, 0x1, 0x0, 0x1, {0x0, r3}}, 0xd6b)
r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000001, 0x20010, r0, 0x10000000)
syz_io_uring_submit(r1, r6, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x3, 0x0, @fd_index=0x8, 0x0, 0x0, 0x0, 0x1}, 0x7)
13:13:02 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687", 0x1b, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:02 executing program 5:
r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x42eec849c8cf2e36, 0x0)
sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x1bc, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xc7, 0x5}}}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x8a0}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_MESH_SETUP={0x24, 0x70, [@NL80211_MESH_SETUP_USERSPACE_MPM={0x4}, @NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5, 0x6, 0x1}, @NL80211_MESH_SETUP_AUTH_PROTOCOL={0x5, 0x8, 0x3e}, @NL80211_MESH_SETUP_USERSPACE_AMPE={0x4}, @NL80211_MESH_SETUP_AUTH_PROTOCOL={0x5, 0x8, 0xb7}]}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x1}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_MESH_SETUP={0x150, 0x70, [@NL80211_MESH_SETUP_ENABLE_VENDOR_PATH_SEL={0x5, 0x1, 0x1}, @NL80211_MESH_SETUP_AUTH_PROTOCOL={0x5, 0x8, 0x3}, @NL80211_MESH_SETUP_IE={0x22, 0x3, "67bfbd83cde5d45eb3e7563dcdcdb4017f14aaefeb123b98be7a8ef77a40"}, @NL80211_MESH_SETUP_IE={0xef, 0x3, "6887f10fecece4da2b4efaa3d3717cbe0ce224bbb55a6b3d681e65aac0c77a281534788ca9d9d6d3ecfb425140ebac242c997cb0797c3b791d1e3f0f0b3c70d50ba5203769df36f30e217dcabce34fbc704fb443286a7102cec9bf3b9137125920b9035685e03bb7083ea25baee804e2e6b37e2b7ba97d23aca12c8bccfcf6bd1c09c2c450dd11cbcc5ea17bd76973bfe7200725d1dae57f11cfc70bf03189129f494bfc8e83e0161561be8a64c4425d031cf66abef897fa2351ef4741e7dd9d5fd8322d465a5049b20b72686cfd7ad1f8206d44850a5977a825767f42d99261f529a965a2977b4d6ae5ca"}, @NL80211_MESH_SETUP_ENABLE_VENDOR_METRIC={0x5, 0x2, 0x1}, @NL80211_MESH_SETUP_ENABLE_VENDOR_PATH_SEL={0x5}, @NL80211_MESH_SETUP_ENABLE_VENDOR_PATH_SEL={0x5}, @NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5}, @NL80211_MESH_SETUP_USERSPACE_AUTH={0x4}, @NL80211_MESH_SETUP_USERSPACE_AMPE={0x4}]}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x8}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x3}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24008010}, 0x4000)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:13:02 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0xffffffffffffffff)
13:13:02 executing program 5:
getpeername(0xffffffffffffffff, &(0x7f0000000240)=@nfc_llcp, &(0x7f00000002c0)=0x80)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc)
r1 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3f, 0x33, 0xff, 0x7f, 0x0, 0x1, 0x10200, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x5, @perf_bp={&(0x7f0000000100), 0x5}, 0x2010, 0x101, 0x10001, 0x9, 0x3, 0x4, 0x8, 0x0, 0x1fc000, 0x0, 0x3}, r0, 0xa, 0xffffffffffffffff, 0xe)
capget(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x40020})
perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x0, 0x8, 0x1, 0x81, 0x0, 0x5, 0x84420, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000300), 0x9}, 0x0, 0x2, 0x7fff, 0x1, 0x200, 0x401, 0x5, 0x0, 0xfffffff7, 0x0, 0x7ff}, r0, 0x2, r1, 0x3)
[ 1117.975081] cgroup: fork rejected by pids controller in /syz3
13:13:02 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:02 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d9868070", 0x1f, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:02 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 3)
13:13:16 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d9868070", 0x1f, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:16 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0xebc2dfde4476dcf6, 0x0)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x91, 0x3, 0x7, 0x40, 0x0, 0x7, 0x40800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x782092d1, 0x7ff}, 0x1430, 0xa2, 0x5, 0x2, 0x62c, 0x8, 0xff, 0x0, 0x2, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x8)
ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f00000001c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}])
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x7f})
13:13:16 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x3}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:16 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 20)
13:13:16 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 4)
13:13:16 executing program 4:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0)
mount(&(0x7f00000000c0)=@sg0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='ceph\x00', 0x2000, &(0x7f0000000200)='journal_checksum')
mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x163008, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x10000a8, &(0x7f0000000240)={[{@journal_checksum}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/sg0\x00'}}]})
13:13:16 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 1)
13:13:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xfffffff6}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
[ 1131.994322] ext4: Unknown parameter 'smackfsfloor'
13:13:16 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:16 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
13:13:16 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$tty20(0xc, 0x4, 0x1)
read(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3e, 0x0, 0xd6c2, 0x0, 0x2})
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x1, 0x0)
r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x400040, 0x0)
openat(r2, &(0x7f0000000140)='./file0\x00', 0x30042, 0x18)
connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @local}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4}, 0x1c)
setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc)
[ 1132.042403] FAULT_INJECTION: forcing a failure.
[ 1132.042403] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1132.043360] CPU: 1 PID: 7524 Comm: syz-executor.0 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1132.043950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1132.044534] Call Trace:
[ 1132.044740]
[ 1132.044926] dump_stack_lvl+0x8f/0xb7
[ 1132.045257] should_fail_ex.cold+0x5/0xa
[ 1132.045593] _copy_from_user+0x2e/0x180
[ 1132.045913] memdup_user+0x72/0xd0
[ 1132.046213] strndup_user+0x78/0xe0
[ 1132.046513] __do_sys_request_key+0x107/0x3b0
[ 1132.046887] ? __pfx___do_sys_request_key+0x10/0x10
[ 1132.047257] ? trace_rcu_dyntick+0x1a7/0x250
[ 1132.047582] ? syscall_enter_from_user_mode+0x21/0x50
[ 1132.047950] ? syscall_enter_from_user_mode+0x21/0x50
[ 1132.048316] do_syscall_64+0x3f/0x90
[ 1132.048594] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1132.048961] RIP: 0033:0x7f7242783b19
[ 1132.049223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1132.050417] RSP: 002b:00007f723fcf9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1132.050948] RAX: ffffffffffffffda RBX: 00007f7242896f60 RCX: 00007f7242783b19
[ 1132.051431] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1132.051914] RBP: 00007f723fcf91d0 R08: 0000000000000000 R09: 0000000000000000
[ 1132.052396] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 1132.052879] R13: 00007ffdee4f6d4f R14: 00007f723fcf9300 R15: 0000000000022000
[ 1132.053382]
[ 1132.057146] FAULT_INJECTION: forcing a failure.
[ 1132.057146] name failslab, interval 1, probability 0, space 0, times 0
[ 1132.057975] CPU: 1 PID: 7535 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1132.058552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1132.059138] Call Trace:
[ 1132.059328]
[ 1132.059500] dump_stack_lvl+0x8f/0xb7
[ 1132.059795] should_fail_ex.cold+0x5/0xa
[ 1132.060103] ? key_alloc+0x433/0x1280
[ 1132.060395] should_failslab+0x9/0x20
[ 1132.060689] __kmem_cache_alloc_node+0x5b/0x400
[ 1132.061037] ? key_alloc+0x433/0x1280
[ 1132.061331] ? key_alloc+0x433/0x1280
[ 1132.061622] __kmalloc_node_track_caller+0x43/0xb0
[ 1132.061987] kmemdup+0x2c/0x60
[ 1132.062235] key_alloc+0x433/0x1280
[ 1132.062518] ? __pfx_key_alloc+0x10/0x10
[ 1132.062813] ? search_cred_keyrings_rcu+0x93/0x2e0
[ 1132.063189] request_key_and_link+0x6c5/0x1210
[ 1132.063535] ? __pfx_request_key_and_link+0x10/0x10
[ 1132.063910] ? lock_acquire+0x32/0xc0
[ 1132.064202] ? key_type_lookup+0x1e/0x100
[ 1132.064515] ? __pfx_key_default_cmp+0x10/0x10
[ 1132.064856] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1132.065243] ? _copy_from_user+0xf6/0x180
[ 1132.065552] __do_sys_request_key+0x21f/0x3b0
[ 1132.065892] ? __pfx___do_sys_request_key+0x10/0x10
[ 1132.066242] ? trace_rcu_dyntick+0x1a7/0x250
[ 1132.066589] ? syscall_enter_from_user_mode+0x21/0x50
[ 1132.066971] ? syscall_enter_from_user_mode+0x21/0x50
[ 1132.067360] do_syscall_64+0x3f/0x90
[ 1132.067650] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1132.068029] RIP: 0033:0x7f1da7f6db19
[ 1132.068298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1132.069554] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1132.070102] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1132.070614] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1132.071120] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1132.071631] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1132.072130] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1132.072656]
13:13:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:16 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 5)
13:13:16 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:16 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x8000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:16 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d9868070", 0x1f, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:16 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 21)
13:13:16 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0x0, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00')
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x6, 0x2, 0xc1, 0x0, 0x33, 0x140, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x11, 0x10000, 0x80000000, 0x5, 0x1, 0x80000001, 0x5, 0x0, 0x7, 0x0, 0x101}, 0x0, 0x10, r2, 0xa)
r3 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x1000, 0x0, 0x0, 0x0, 0x10, "ddab93e1adcbd470"})
ioctl$VT_DISALLOCATE(r3, 0x5608)
io_submit(0x0, 0x4, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="666fd6fb7c4c8e8bf4059397e83e5ca7e7a13e2dbc3057", 0x17, 0x0, 0x0, 0x3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x1000, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x1, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000004c0)="457e9ecce6f0e6267ca821ea89e945294a9d2c204cfc7e6ab54c19988716", 0x1e, 0xffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0xffffffffffffffff, 0x0, 0x1, r0}])
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220)
r4 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x8})
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220)
perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x4, 0x8, 0xff, 0x1f, 0x0, 0xad, 0x44, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_config_ext={0x3f}, 0x41200, 0xfffffffffffffc01, 0x81, 0x7, 0x8, 0x9, 0xb4, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x1)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0})
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000500)={{}, r5, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000f40)={{r0}, 0x0, 0x0, @inherit={0x68, &(0x7f0000000600)={0x0, 0x4, 0x9bc, 0x4, {0x11, 0x0, 0x1, 0x0, 0x4}, [0xa086, 0x0, 0x5, 0x0]}}, @name="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"})
13:13:16 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_io_uring_complete(0x0)
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x6, 0xfd, 0x1f, 0x3, 0x0, 0x3, 0x10800, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x4}, 0x4040, 0xfff, 0x0, 0x6, 0xfff, 0x2, 0xa, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x10, r0, 0x8)
r1 = creat(&(0x7f0000000180)='./file0\x00', 0x5)
write$tcp_mem(r1, &(0x7f00000001c0)={0xff, 0x20, 0x8, 0x20, 0x3}, 0x48)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:13:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x40030000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:16 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 22)
[ 1132.474754] FAULT_INJECTION: forcing a failure.
[ 1132.474754] name failslab, interval 1, probability 0, space 0, times 0
[ 1132.475595] CPU: 1 PID: 7708 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1132.476133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1132.476691] Call Trace:
[ 1132.476877]
[ 1132.477040] dump_stack_lvl+0x8f/0xb7
[ 1132.477330] should_fail_ex.cold+0x5/0xa
[ 1132.477630] should_failslab+0x9/0x20
[ 1132.477906] __kmem_cache_alloc_node+0x5b/0x400
[ 1132.478241] ? selinux_key_alloc+0x4a/0x1b0
[ 1132.478552] ? memcpy+0x3d/0x60
[ 1132.478810] kmalloc_trace+0x26/0x60
[ 1132.479081] selinux_key_alloc+0x4a/0x1b0
[ 1132.479381] security_key_alloc+0x5a/0xb0
[ 1132.479686] key_alloc+0x8a7/0x1280
[ 1132.479964] ? __pfx_key_alloc+0x10/0x10
[ 1132.480251] ? search_cred_keyrings_rcu+0x93/0x2e0
[ 1132.480619] request_key_and_link+0x6c5/0x1210
[ 1132.480949] ? __pfx_request_key_and_link+0x10/0x10
[ 1132.481297] ? lock_acquire+0x32/0xc0
[ 1132.481574] ? key_type_lookup+0x1e/0x100
[ 1132.481876] ? __pfx_key_default_cmp+0x10/0x10
[ 1132.482198] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1132.482571] ? _copy_from_user+0xf6/0x180
[ 1132.482879] __do_sys_request_key+0x21f/0x3b0
[ 1132.483208] ? __pfx___do_sys_request_key+0x10/0x10
[ 1132.483565] ? syscall_enter_from_user_mode+0x21/0x50
[ 1132.483930] ? syscall_enter_from_user_mode+0x21/0x50
[ 1132.484300] do_syscall_64+0x3f/0x90
[ 1132.484576] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1132.484945] RIP: 0033:0x7f1da7f6db19
[ 1132.485207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1132.486474] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1132.487029] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1132.487551] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1132.488062] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1132.488570] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1132.489075] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1132.489599]
13:13:30 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 6)
13:13:30 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:30 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x5}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:30 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0x0, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00')
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x6, 0x2, 0xc1, 0x0, 0x33, 0x140, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x11, 0x10000, 0x80000000, 0x5, 0x1, 0x80000001, 0x5, 0x0, 0x7, 0x0, 0x101}, 0x0, 0x10, r2, 0xa)
r3 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x1000, 0x0, 0x0, 0x0, 0x10, "ddab93e1adcbd470"})
ioctl$VT_DISALLOCATE(r3, 0x5608)
io_submit(0x0, 0x4, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="666fd6fb7c4c8e8bf4059397e83e5ca7e7a13e2dbc3057", 0x17, 0x0, 0x0, 0x3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x1000, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x1, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000004c0)="457e9ecce6f0e6267ca821ea89e945294a9d2c204cfc7e6ab54c19988716", 0x1e, 0xffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0xffffffffffffffff, 0x0, 0x1, r0}])
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220)
r4 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x8})
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220)
perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x4, 0x8, 0xff, 0x1f, 0x0, 0xad, 0x44, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_config_ext={0x3f}, 0x41200, 0xfffffffffffffc01, 0x81, 0x7, 0x8, 0x9, 0xb4, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x1)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0})
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000500)={{}, r5, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000f40)={{r0}, 0x0, 0x0, @inherit={0x68, &(0x7f0000000600)={0x0, 0x4, 0x9bc, 0x4, {0x11, 0x0, 0x1, 0x0, 0x4}, [0xa086, 0x0, 0x5, 0x0]}}, @name="9b99481df9e33af2acf9db5cdb6165b171c279a9f4f5cf9a8a48ebb5b37ca8398d6a6b63a665fe7aeaed6e6e879ab67842be80e5f097c4af7a343bc65ce4f6518fe330d638671ae996857bd3795fba93f935b892b0c5fc76ab6b125eb9d83bd6fc8b9442932d0f865e517084d3ad3ab7c0c8de8f64acbf8471106559d8cbb5da680de2dbe0352cded04a533b881cf3285e9087a50ac071aa473eb9c187d88d2b3e57c064fa6529084998a5f3019e1c99aee1fc7746f2d0a95fda77a02232c717dfa1e0ba10f12592ee9d3c236147c34498c6a17601fe472526e8344b9b87d1adba319312c6c0c6293708df0d416acb10c3e28588a7864bb45752e3ae605cbe614a2a047db4612f8d7598298ed270b281acbaa88163b3475ea957e94bbc95567b2aefe11559ecf7f7a4413a97d632b3b7b941da9dfc89a6abbeb6566e4087bbdbef011b038e47880beb2d195061ff592b450e3410cf654c371737991edefa2519315a06c8c81e95ffb4227d0ebfdc11131a3648ab7aed22d3a8afd7d5fbf09c5a2986c3d28dce4534bcd085c49f959554d11c301f3a1c4f57f6e680bd691e7788792dac5b8456a7accd50c48bf27154a67cf91b3510b6e389727785052ca22702cb17a8e7fde4e5c05ce84f550d65769fa56a566adf84a934b8257470ff0e35f57cd7d1c44af544e65a7ef8a338f575a18ad1038a8619096427dbe0ed06c5ec417f5092d792235a55cdbc182b97a7331b509e838b20af785afd60afdce7d9b0f29c38efb68675e060e787f5bc1cb83db8dc3ce8de3590e99f17472f316b77b16fc761bb29b31a5beb2fa165e3080cb289a2a5751165373e66f8ef4e4303032ef4c48e2c2df30a58f931f293747f43ab96dcab04fabd98b91f48a0d8318a67169e7e8699ee1078680cc1161e5f6fb269de18a96bb36a517ebf68f897e2a896e7243801f369875406e6dd71b9fa1c24b171be31c05c2180cd5317e0af7d632d485132113baf621f3c41dbe2fc59b2665ae7caaaa60d93bd6856d0c1412721c340deac874536a00b62797e0c60fc8cf3379385037cdc84bba08c2414407f7bc520b3f94b36fdf0b02152fdcdcfe18b235f9a227bc7d8ca62cdba30455d3a5e5ebf12bc3159937c464167f73a841124aa1d48b93eaff0b4ce9a06481cd29143ed65f8e96f4eaf9efcba20a7f654709b378774524cea62afffcfb33e134fc53fc76dfdb3a7222a7395c5b4ff227d20b4b684dbaf6d0f8fe13b6801511a3e500ad5bfd686bec05de7b58f5e618337ae633e1fcfe059239577b72326c318855ee72b8e59e034adfafaf35d6aec8148f8e102c12d326c11c2cfd38b1d1d769097f4423ee3ccc5f9897bb680827595ee6f5a744163877abdb59d85f3e4f0b3b8f8494fc0836d8d7c33dbd8f124275586e0bdb61812fbdda77f53f0635860ffc9ca1a047bb0c0315f01322c676edde89f32f0d06b9dac148046b4d33a94ca83d2fb84b2252bb2cb63c5bcaf2229a27f9b6aa0d4fe647c139b3817257bf98c6baa831f599f9a208b02f9e6f8b5f48540bf0a86b88ff0c9edfad5c8a760e2fc87e45b36887807c4e4247c860a549d6f563fe76d73e2be9c373343d9ebefc315afff64f964a821149f239604c29b508846d65b09488d9b126e9cf6eed055a7a691b4a32515aee6319b83d7b0d3a253c828fb8e6b9ab431fe56461331395956593ac54cfc10f786bb5e9a05cc27ccbd10b1eb0fdba0d81a8ed0bfb72135d6c8224dc779d77013bfe92069ce2d0592b4fb0e1228aab22dd92dd940e7855a985a1dbe372e76a5db5014ee462fd459d640ca19fae6efcc7539e1808e8081007f7f4e8c66026039219eafe7c4e366f1141577c6dc8562de9af0d558d9f6822406f3ebe3a7bc2ee1b2aaecc24a3c447a9ffa06ec68367656ec249d9d6787b58784da08c5c03bcfa76c883bffeaeb85eafa5eafcb686f7e95229b838cbdeedf54c484e2cc909d462c859feff5cab0891b52e6fd99c0230e17ad625fc38fd7659ec9e46d5bd71a496e40770b611d3bf2a9f1fc9dfb024fdaad8900331bfe33d68086e06617ee3a55d89768d82080b9a8f7ee5979d75a7a0380eca6f3cbed7c4035281ed74f02f5e59a775ed94e2ea76db093384b5afb2bb7f640f4180db6e185512c55cd816cfa53380b0e0ddad33bdae2c484dc66b7193138d20dbd25b015026077f4b75ab1ee282db041fedb090a360182f4153dfcc077a19ca8196c9d626959d505c82fbf25d42361087d528cb5cf74492d4971c4647246f3ae8894429d2da7d3fff9cfb7833af107ad55fc9e9ab31df562c3a8f8b10b3b45189dbc469fbfbf7ec5e182c7ec22a4c1d567e651799e027d66047d373071449002b28b2de2d60415df52a71de07daeb2ceed62bd76d01a934e252d665ed3d85e09640637e6e3528bed84815638d753b44ee55798853d2b1df636a5fe5bad379733a00c635aa597ba0308783c54deaba200451761f23fdc85b164aeaa0b3e733589cd75441d78c2573ac900fe214065dd718f9be567b428a4f47ec810d894086a096453ed057533391dbfa2b2b32a28be8d6c582b7c3ccf1d88a6a26a8c8f01483e12be922a3f0dcaa542dcb6d3308a6186c9823acb67fb0ed114db5869d802fd8ee1be39110f67cf66eb80a03b094d96079ccec316f703e89d19f4b6a650b02be82ee37d209a329c44ef29aa59ea2ddaf40062a0ac90d4d5f68bbd072acbbc94962e40ddd49ea4f6684aab3a651124ef7dc5fcc7715d76fe1bccbbde933769d2506b55e972fe55f59b14e56835053f619a094ff1bcd0deb03bb9edf1d5cefaef38daa24678d901b000c3c743458733d686296abced75f77eb89dc89c4a6c8c0d01c4d5efc79009c0f30d3cc8f37a7eea41ebeab136c669bff535cb4fd9cec966108d8ecebbe73b080b0c6c0265b02c714229e40d95fd638db2f51a1cb53316ceb25859d56bb165edf4d7a9984f27065f218d4066ffdbd34516003e076ec9707f7a937f64c01c9451db5381d6aba2e3100b69b5fa13f4d3ecabcca29ad173dc5b542d4ce4c6766ff89ff8cbe2dfd301f22ac438edb4221d27b281ebe922fa87d6f3609ec4090666d99e264ae3db4e2cc412e8baf5ad48e8d13fd90e10acab05d27711079af4193075f8eb833f19853e17274c09ef9c8ff4b7b8430d9674714a58ff574feeb07c4fa392bd81d9137a8fcf561e2b1ce57b5768b57efaf8b48918368912564d92f18bd7d15fbaa919f91e5afb64814cbfe22358e620739a9cccd9884f4722d19489525743778b04272c83174b6826130ce704323fb10bc7b09d4860114f8d3fb22db767952b316efb61d51714c9ba4c1548371752a382b4d6c35d902c97d25edec2330d0f16fe5f47d3a7e20e1678e619e8c189cfa363596ab40ced745f56bb6f472ef1ac4d7f55c4f93169c7ac58c9219694f79e42635872e01c4005e956632dc1ecc36a8e38be1aad5c0d9f769b692c051437ed7a7eb4bcdd4bbba6d121cc0414174fbdc07a491afa420c6e45d51e91f801ce8feca12a90cab127450bca298acf2c38a6e1ee6780a14b3f5861f8fb7e8451452f4fc4aba5d00e25fe96fc00bb8a71c0b261b85f0ad97896fb85dac8aa09f0a6a38d3d4ee083cb6ec5504df44a15d7bf6ccb88a9a0db2d74929e39dfa1723a8d11306961d2211bbbf2edaf9eed0e9705f507f4504fe474ce897c0b7ab5aaac70055ec77cdb876fd7dbe9b881dc1e092a248e6b762f55ae9e7b1748092448812942db65d72e1139b76f9de534cd54f1cc953ba6c90a97264f17596cecb8d2d4e1e6c66a3589dac8e4c22181c47b878489cf47dab37f783f3ecd4650563f000602c3a896a6888b2cd6a11eda5c86c056f08b6e502a579fed56245ccb35c1d801c31b5f5a4bbdf756963abb2a9b9500f0a0c75acf80fe91bcdbeb7df97e4ca8f6deb992cb116107773e9ff6260102e45ef06c7a33a0f9d194210eb88ca948a35bb09ac171650b0fabefa8031fcfe2db7ee89127cc57d31e9af3bbcf40e9843fcd8f037a61fc1aeb332dcbe18cea5bf015cc4b920a7ddb62f172d91d09941944764c83efffa9da681afde1e0ca9e6c40817dcfbf07e175fae16b3b5d3678640076ef4a9829074208ddfde69de8dd9377a0c5a1cedf8d04b129851f96b1f11cd287317ea103576652f7379ea5981e19703a690c183565975ff2dcad7c6d960cb39ed62c52fcb176dd086cd5a0a42e19720d1619c207dd7a2f6d3bed1905f344484a2694eec8bbdf638d62b57b173a7cefcaad119bb41f44ef601d4393854b3129f88fe32ab341611ad1c2c542e1273f386b616df150e5bebe1516b43b605207161c4c6aeb2eef7e458d3bf22f8590be60f21970140a8c5f4d1c1a357d21b1c7e3aa0ed533515d218446e0ff85f9cab9b1777471f2e1e29e662a8c8ec4dd0b6fad36441c0f3eaf4dea88ef09d61dc41e8a0429ad3b4f098252fe1683bba974a75de6250a0d0ee7644068a6bb8952808e3bc0e3bad341c9e3707c6f9b207c894fcd05b1f50b2fb2af206c1b72ce349effb4d77c3872f2533bdb2180b4aa204dc8c5e03fc7d49410ec0637cec666fe4ab516dec36598c82b06247b83841da9c9779a9c50f17e9a35efb3e7ddd8d24ed3483615e0623bb8d25205b3a5bb2167d00c50d0b0737bd03efa0dd3223fc55701d2b6b2c8d7bedd32b9a1589f0815992027463b2f090398d971ea95b6358f97e6135d07a8bbba15858f6c9bb297bd644669bf240e78cb5fc883b5e456d65f19b6b2b8847169a4b44feede60315ef8044572af8f31063c0343ea15a5ca82b5c5dff0cd9da2be50b03881e20c96a8957f66687a3b9eea1fa05a182e42a619a38a8b502645784cd765e106ff342476fb73d6c05bcbc35d1cd05cb5179d4851280ad87a659a504400880b15a19246397c634ee376005a6c371cccbb56d902617e488c8d4a43b0ffceb5090ace72722bfcdf624b2b05285b8ea00a34e42162216cfa3c40185f3e1ed10c9fe71839077389c46aa6cf68938165921f244a3d514a5340814146baddc9a8e1689dece9819fac5c64b4718cde1ad36f530fc10d2d3fac44b293355c54f211e11209df2682d03b82dc2e5d849b978375f5e91cce502daff7e135336d35aa2deaa4b7e4d328e95bab4be0aa47679b1ce5156ac0a026743f1f437ede10fd235722c102002c5906e307cdf60c1a078ded3f2e7d0f1dfec62d263ec75b93abb3f5ac00a8354878243a54516efa351aab9e3586664cdf33aa6fc62c8737cf3cb53fff6ec2e0a32c0c2f347a85b0aab75f83b0d5f69d909b1c574081d9e79fae96bb419e1eba6c5dbd0af3f0e9746f4ebe0db6194a73752dfb7d7d6d9e0b0ebffc9d58837ab054bd829df64a0a45ca55494e84bbbf5334abd5a828c41e7e4ca00673b8cefa46cbf1fb6aa00946228681b15db9ce6fd4baafe79df7117a9234f176e2ff76778b45914be975bc4c2f854ed38c47d0c6f0bdfe551e0eca13433de6d64f55c8fa9cc289729580043106e4e0b17b6be4b18a0612ed415c7d0192721e25784f9fb6c25fa83b0d5f478ab90d1a00bb3093ac97b661e89eca1a2bfdb5d5c2a373ce9a19c2b5bc2b748ffdec6a0b7712bd30b68d8b1ed83df1060af36b9ebf5fed2364c77d3d2caeb438dc1769d678b883ea8367ab26e1d20f2447225269070fbc32b8023339319cbea9fc14868ace"})
13:13:30 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:30 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 23)
13:13:30 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000), &(0x7f0000000040)={0x0, 0x0, 0x100, 0x0, 0x2, 0xffffffff})
13:13:30 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd", 0x21, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:30 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 24)
13:13:30 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x301000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:30 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd", 0x21, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
[ 1146.143738] FAULT_INJECTION: forcing a failure.
[ 1146.143738] name failslab, interval 1, probability 0, space 0, times 0
[ 1146.144866] CPU: 1 PID: 7884 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1146.145448] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1146.146043] Call Trace:
[ 1146.146236]
[ 1146.146408] dump_stack_lvl+0x8f/0xb7
[ 1146.146717] should_fail_ex.cold+0x5/0xa
[ 1146.147045] should_failslab+0x9/0x20
[ 1146.147339] __kmem_cache_alloc_node+0x5b/0x400
[ 1146.147691] ? assoc_array_insert+0xe2/0x2b70
[ 1146.148038] kmalloc_trace+0x26/0x60
[ 1146.148328] assoc_array_insert+0xe2/0x2b70
[ 1146.148661] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 1146.149038] ? rcu_read_lock_sched_held+0x42/0x80
[ 1146.149405] ? trace_lock_acquire+0x14c/0x1c0
[ 1146.149745] ? __key_link_lock+0x50/0xd0
[ 1146.150059] ? lock_acquire+0x32/0xc0
[ 1146.150360] ? __pfx_assoc_array_insert+0x10/0x10
[ 1146.150724] ? down_write+0x157/0x220
[ 1146.151040] ? __pfx_down_write+0x10/0x10
[ 1146.151351] ? __pfx_key_alloc+0x10/0x10
[ 1146.151658] ? search_cred_keyrings_rcu+0x93/0x2e0
[ 1146.152031] __key_link_begin+0xf0/0x250
[ 1146.152339] request_key_and_link+0x744/0x1210
[ 1146.152683] ? __pfx_request_key_and_link+0x10/0x10
[ 1146.153046] ? lock_acquire+0x32/0xc0
[ 1146.153332] ? key_type_lookup+0x1e/0x100
[ 1146.153647] ? __pfx_key_default_cmp+0x10/0x10
[ 1146.153987] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1146.154378] ? _copy_from_user+0xf6/0x180
[ 1146.154695] __do_sys_request_key+0x21f/0x3b0
[ 1146.155042] ? __pfx___do_sys_request_key+0x10/0x10
[ 1146.155420] ? syscall_enter_from_user_mode+0x21/0x50
[ 1146.155806] ? syscall_enter_from_user_mode+0x21/0x50
[ 1146.156192] do_syscall_64+0x3f/0x90
[ 1146.156482] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1146.156866] RIP: 0033:0x7f1da7f6db19
[ 1146.157143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1146.158437] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1146.159008] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1146.159529] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1146.160049] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1146.160565] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1146.161077] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1146.161620]
13:13:44 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x299b1187}, &(0x7f0000000040)={0x0, 0xb3d, 0x0, 0x400000, 0x0, 0x20})
13:13:44 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0x0, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00')
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x6, 0x2, 0xc1, 0x0, 0x33, 0x140, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x11, 0x10000, 0x80000000, 0x5, 0x1, 0x80000001, 0x5, 0x0, 0x7, 0x0, 0x101}, 0x0, 0x10, r2, 0xa)
r3 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x1000, 0x0, 0x0, 0x0, 0x10, "ddab93e1adcbd470"})
ioctl$VT_DISALLOCATE(r3, 0x5608)
io_submit(0x0, 0x4, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="666fd6fb7c4c8e8bf4059397e83e5ca7e7a13e2dbc3057", 0x17, 0x0, 0x0, 0x3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x1000, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x1, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000004c0)="457e9ecce6f0e6267ca821ea89e945294a9d2c204cfc7e6ab54c19988716", 0x1e, 0xffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0xffffffffffffffff, 0x0, 0x1, r0}])
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220)
r4 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x8})
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220)
perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x4, 0x8, 0xff, 0x1f, 0x0, 0xad, 0x44, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_config_ext={0x3f}, 0x41200, 0xfffffffffffffc01, 0x81, 0x7, 0x8, 0x9, 0xb4, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x1)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0})
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000500)={{}, r5, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000f40)={{r0}, 0x0, 0x0, @inherit={0x68, &(0x7f0000000600)={0x0, 0x4, 0x9bc, 0x4, {0x11, 0x0, 0x1, 0x0, 0x4}, [0xa086, 0x0, 0x5, 0x0]}}, @name="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"})
13:13:44 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x3}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:44 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd", 0x21, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:44 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:44 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 7)
13:13:44 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 25)
13:13:44 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x400000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
[ 1159.677783] FAULT_INJECTION: forcing a failure.
[ 1159.677783] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1159.678788] CPU: 1 PID: 7934 Comm: syz-executor.0 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1159.679392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1159.679987] Call Trace:
[ 1159.680188]
[ 1159.680370] dump_stack_lvl+0x8f/0xb7
[ 1159.680672] should_fail_ex.cold+0x5/0xa
[ 1159.680997] _copy_from_user+0x2e/0x180
[ 1159.681306] memdup_user+0x72/0xd0
[ 1159.681583] strndup_user+0x78/0xe0
[ 1159.681875] __do_sys_request_key+0x146/0x3b0
[ 1159.682231] ? __pfx___do_sys_request_key+0x10/0x10
[ 1159.682623] ? syscall_enter_from_user_mode+0x21/0x50
[ 1159.683030] ? syscall_enter_from_user_mode+0x21/0x50
[ 1159.683435] do_syscall_64+0x3f/0x90
[ 1159.683723] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1159.684127] RIP: 0033:0x7f7242783b19
[ 1159.684409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1159.685736] RSP: 002b:00007f723fcf9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1159.686305] RAX: ffffffffffffffda RBX: 00007f7242896f60 RCX: 00007f7242783b19
[ 1159.686829] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1159.687361] RBP: 00007f723fcf91d0 R08: 0000000000000000 R09: 0000000000000000
[ 1159.687892] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 1159.688422] R13: 00007ffdee4f6d4f R14: 00007f723fcf9300 R15: 0000000000022000
[ 1159.688974]
13:13:44 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:44 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8f", 0x22, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:44 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:44 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 8)
13:13:44 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc)
r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x4, 0x0, 0x8, 0x0, 0x2, 0x3104, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x950, 0x0, @perf_config_ext={0x8, 0xeffe}, 0xdc6e9a7f7ec99c40, 0x3, 0x2, 0x9, 0x100000001, 0x7fffffff, 0x40, 0x0, 0x2, 0x0, 0x1}, r0, 0x3, 0xffffffffffffffff, 0x2)
recvmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)=""/186, 0xba}, {&(0x7f0000000300)=""/110, 0x6e}, {&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000400)=""/16, 0x10}], 0x4, &(0x7f0000000480)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf8}}, {{&(0x7f0000000580), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000600)=""/26, 0x1a}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000640)=""/168, 0xa8}], 0x3, &(0x7f0000001800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}}], 0x2, 0x2000, &(0x7f0000000740))
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x6, 0x7, 0x2, 0x3, 0x0, 0x800, 0x40, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0xf8, 0x100000000}, 0x0, 0x8, 0x4, 0x2, 0x1, 0x9, 0x81, 0x0, 0x6, 0x0, 0x5}, r2, 0xffffffffffffffff, r1, 0x2)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x800}}, './file0\x00'})
13:13:44 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:44 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 26)
13:13:44 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8f", 0x22, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:44 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4a01000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
[ 1159.936643] FAULT_INJECTION: forcing a failure.
[ 1159.936643] name failslab, interval 1, probability 0, space 0, times 0
[ 1159.938087] CPU: 0 PID: 8132 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1159.939092] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1159.940097] Call Trace:
[ 1159.940438]
[ 1159.940747] dump_stack_lvl+0x8f/0xb7
[ 1159.941273] should_fail_ex.cold+0x5/0xa
[ 1159.941832] should_failslab+0x9/0x20
[ 1159.942341] __kmem_cache_alloc_node+0x5b/0x400
[ 1159.942956] ? assoc_array_insert+0x3cb/0x2b70
[ 1159.943588] kmalloc_trace+0x26/0x60
[ 1159.944092] assoc_array_insert+0x3cb/0x2b70
[ 1159.944693] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 1159.945348] ? rcu_read_lock_sched_held+0x42/0x80
[ 1159.945993] ? trace_lock_acquire+0x14c/0x1c0
[ 1159.946597] ? __key_link_lock+0x50/0xd0
[ 1159.947163] ? lock_acquire+0x32/0xc0
[ 1159.947690] ? __pfx_assoc_array_insert+0x10/0x10
[ 1159.948344] ? down_write+0x157/0x220
[ 1159.948874] ? __pfx_down_write+0x10/0x10
[ 1159.949434] ? __pfx_key_alloc+0x10/0x10
[ 1159.949987] ? search_cred_keyrings_rcu+0x93/0x2e0
[ 1159.950664] __key_link_begin+0xf0/0x250
[ 1159.951234] request_key_and_link+0x744/0x1210
[ 1159.951872] ? __pfx_request_key_and_link+0x10/0x10
[ 1159.952518] ? lock_acquire+0x32/0xc0
[ 1159.953034] ? key_type_lookup+0x1e/0x100
[ 1159.953610] ? __pfx_key_default_cmp+0x10/0x10
[ 1159.954236] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1159.954961] ? _copy_from_user+0xf6/0x180
[ 1159.955544] __do_sys_request_key+0x21f/0x3b0
[ 1159.956177] ? __pfx___do_sys_request_key+0x10/0x10
[ 1159.956861] ? syscall_enter_from_user_mode+0x21/0x50
[ 1159.957545] ? syscall_enter_from_user_mode+0x21/0x50
[ 1159.958256] do_syscall_64+0x3f/0x90
[ 1159.958771] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1159.959458] RIP: 0033:0x7f1da7f6db19
[ 1159.959953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1159.962199] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1159.963194] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1159.964100] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1159.965007] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1159.965908] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1159.966808] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1159.967787]
[ 1160.009708] FAULT_INJECTION: forcing a failure.
[ 1160.009708] name failslab, interval 1, probability 0, space 0, times 0
[ 1160.011185] CPU: 0 PID: 8133 Comm: syz-executor.0 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1160.012229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1160.013270] Call Trace:
[ 1160.013620]
[ 1160.013931] dump_stack_lvl+0x8f/0xb7
[ 1160.014473] should_fail_ex.cold+0x5/0xa
[ 1160.015032] ? prepare_creds+0x2f/0x6f0
[ 1160.015619] should_failslab+0x9/0x20
[ 1160.016213] kmem_cache_alloc+0x5a/0x410
[ 1160.016868] prepare_creds+0x2f/0x6f0
[ 1160.017456] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 1160.018254] lookup_user_key+0x387/0x1260
[ 1160.018900] ? lock_release+0x3b6/0x750
[ 1160.019541] ? __pfx_lookup_user_key+0x10/0x10
[ 1160.020233] ? __pfx_lock_release+0x10/0x10
[ 1160.020853] ? trace_lock_acquire+0x14c/0x1c0
[ 1160.021573] ? __pfx_lookup_user_key_possessed+0x10/0x10
[ 1160.022427] ? _copy_from_user+0xf6/0x180
[ 1160.023085] ? memdup_user+0x89/0xd0
[ 1160.023656] __do_sys_request_key+0x1a4/0x3b0
[ 1160.024275] ? __pfx___do_sys_request_key+0x10/0x10
[ 1160.024948] ? syscall_enter_from_user_mode+0x21/0x50
[ 1160.025644] ? syscall_enter_from_user_mode+0x21/0x50
[ 1160.026355] do_syscall_64+0x3f/0x90
[ 1160.026882] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1160.027560] RIP: 0033:0x7f7242783b19
[ 1160.028062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1160.030333] RSP: 002b:00007f723fcf9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1160.031297] RAX: ffffffffffffffda RBX: 00007f7242896f60 RCX: 00007f7242783b19
[ 1160.032205] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1160.033117] RBP: 00007f723fcf91d0 R08: 0000000000000000 R09: 0000000000000000
[ 1160.034029] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[ 1160.034950] R13: 00007ffdee4f6d4f R14: 00007f723fcf9300 R15: 0000000000022000
[ 1160.035920]
13:13:44 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0x0, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00')
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x6, 0x2, 0xc1, 0x0, 0x33, 0x140, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x11, 0x10000, 0x80000000, 0x5, 0x1, 0x80000001, 0x5, 0x0, 0x7, 0x0, 0x101}, 0x0, 0x10, r2, 0xa)
r3 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)={0x1000, 0x0, 0x0, 0x0, 0x10, "ddab93e1adcbd470"})
ioctl$VT_DISALLOCATE(r3, 0x5608)
io_submit(0x0, 0x4, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="666fd6fb7c4c8e8bf4059397e83e5ca7e7a13e2dbc3057", 0x17, 0x0, 0x0, 0x3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x1000, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x1, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000004c0)="457e9ecce6f0e6267ca821ea89e945294a9d2c204cfc7e6ab54c19988716", 0x1e, 0xffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0xffffffffffffffff, 0x0, 0x1, r0}])
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220)
r4 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x8})
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220)
perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x4, 0x8, 0xff, 0x1f, 0x0, 0xad, 0x44, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_config_ext={0x3f}, 0x41200, 0xfffffffffffffc01, 0x81, 0x7, 0x8, 0x9, 0xb4, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x1)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0})
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000500)={{}, r5, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000})
ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000f40)={{r0}, 0x0, 0x0, @inherit={0x68, &(0x7f0000000600)={0x0, 0x4, 0x9bc, 0x4, {0x11, 0x0, 0x1, 0x0, 0x4}, [0xa086, 0x0, 0x5, 0x0]}}, @name="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"})
13:13:44 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xa}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:44 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r3 = getpid()
perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x2, 0xc7, 0x0, 0x0, 0x0, 0x7, 0xa841, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0x65b4}, 0x2, 0x6, 0x1, 0x1, 0x1000, 0x1, 0xd0, 0x0, 0xfffffffc, 0x0, 0x100000000}, r3, 0xc, r0, 0x1)
fallocate(r2, 0x0, 0x0, 0x87ffffc)
r4 = fcntl$getown(r2, 0x9)
perf_event_open(0x0, r4, 0x0, r1, 0x8)
perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x6, 0xa5, 0x0, 0x1, 0x0, 0x4, 0x8d0a26b2e150e615, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x101, 0x2, @perf_config_ext={0x1, 0xadf}, 0x50262, 0x3, 0x1d, 0x2, 0x8, 0xff, 0xc848, 0x0, 0x28d, 0x0, 0x9}, r4, 0xd, r0, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:13:44 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x5}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8f", 0x22, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:59 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x418300, 0x0)
perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x8, 0x80, 0x2, 0x3f, 0x0, 0x401, 0xe00, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7c, 0x1, @perf_config_ext={0x3ff, 0x4}, 0x4000, 0x7, 0x1, 0x6, 0x400, 0x4, 0x1, 0x0, 0x8, 0x0, 0x8}, 0xffffffffffffffff, 0x1, r0, 0x3)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}], 0x0, &(0x7f0000013e00)=ANY=[@ANYBLOB])
13:13:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x6e00000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:59 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 27)
13:13:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xf}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:59 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0x0, r0, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000100)={r2, 0x9, 0x5, 0x1})
13:13:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:59 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 28)
13:13:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:59 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b8e, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'})
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0xff, 0x80, 0x0, 0x3, 0x4000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3239, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x9}, 0x40590, 0x1, 0x5, 0x5, 0x81, 0x7, 0x101, 0x0, 0xd8, 0x0, 0xb01}, 0x0, 0x6, r1, 0xa)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
[ 1175.135743] FAULT_INJECTION: forcing a failure.
[ 1175.135743] name failslab, interval 1, probability 0, space 0, times 0
[ 1175.136809] CPU: 0 PID: 8335 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1175.137377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1175.137960] Call Trace:
[ 1175.138153]
[ 1175.138326] dump_stack_lvl+0x8f/0xb7
[ 1175.138629] should_fail_ex.cold+0x5/0xa
[ 1175.138945] should_failslab+0x9/0x20
[ 1175.139246] __kmem_cache_alloc_node+0x5b/0x400
[ 1175.139598] ? request_key_auth_new+0xe4/0x940
[ 1175.139952] kmalloc_trace+0x26/0x60
[ 1175.140240] request_key_auth_new+0xe4/0x940
[ 1175.140573] ? __pfx_request_key_auth_new+0x10/0x10
[ 1175.140954] ? refcount_dec_and_lock+0x36/0x150
[ 1175.141306] request_key_and_link+0xd5d/0x1210
[ 1175.141657] ? __pfx_request_key_and_link+0x10/0x10
[ 1175.141995] ? lock_acquire+0x32/0xc0
[ 1175.142287] ? key_type_lookup+0x1e/0x100
[ 1175.142604] ? __pfx_key_default_cmp+0x10/0x10
[ 1175.142953] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1175.143349] ? _copy_from_user+0xf6/0x180
[ 1175.143669] __do_sys_request_key+0x21f/0x3b0
[ 1175.144013] ? __pfx___do_sys_request_key+0x10/0x10
[ 1175.144393] ? syscall_enter_from_user_mode+0x21/0x50
[ 1175.144772] ? syscall_enter_from_user_mode+0x21/0x50
[ 1175.145161] do_syscall_64+0x3f/0x90
[ 1175.145453] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1175.145836] RIP: 0033:0x7f1da7f6db19
[ 1175.146111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1175.147377] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1175.147922] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1175.148430] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1175.148930] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1175.149431] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1175.149933] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1175.150469]
13:13:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:13:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:13:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xa}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:13:59 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 29)
13:13:59 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0xae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r2, 0x0, 0x0, 0x87ffffc)
r3 = fcntl$getown(r2, 0x9)
perf_event_open(0x0, r3, 0x0, r1, 0x8)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000011c0000f7005229", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB="2e2f66696c65310056efc0f38bb8add12af28601df25faa50f76c6c8daf43c77979877628d31075cc018dc28b0af01c06fb6959c552bc1243191ba1cd47996a69309c35040fce4ab15b7b39fc4e58d93f3d252c1e23f133abd3b527fa10bd002b177aa27070e593968f953e306954c8e4505c848e1e40bb7a9fe8d2b83d21ba89a9d06124580d6e4f301d27b780f6c644f63223d13299225"])
r5 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0xb3, 0x1f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x30}, 0xffffffffffffffff, 0x4, r4, 0x2)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x4, 0x80, 0x3f, 0x6a, 0x2, 0x7, 0x0, 0x4, 0x4000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x2c80, 0x800, 0x10000, 0x5, 0x6, 0x3, 0x8, 0x0, 0x0, 0x0, 0x800000000})
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
fstatfs(r5, &(0x7f0000000000)=""/132)
openat(r7, &(0x7f0000000180)='./file1\x00', 0x80000, 0x88)
vmsplice(r7, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r6, 0x407, 0x10001)
ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000000480)={{0x9, 0x1}, 0x100, './file1\x00'})
r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r8, 0x0, 0x220)
write(r8, &(0x7f00000002c0)="2b7de26de8622fc1271ac7f7a260b17901e13fa094eb243ca10215cf66303246983b44460f15e5c99c8079dff3a09249ca357639bdea9fafa4116b2f64a78303e4e2a0483b41d9034afe0bb8e3806748cd932627a2f01225203888e3393cd9d7fb7f2422455dd67610eb430847d08b4d9487d87afcedea9368e38b0c97c5b3236581765fad25824a5d52d79a47529c7ea77d965062d81892d73bb378f6368b2e76e533324b0615ec307b3a0c37e2e813b5820e654b7cef17f04552966d50cfd910d662bcc0e04453fc60846e87b32c794ef2387457dfc7833af1d3c175c4743aa459db5d2e778f6a5b", 0xe9)
ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, 0x0)
write(0xffffffffffffffff, &(0x7f0000000280)="19f3ce703ac35debefd82d3408103f13ec2e", 0x12)
13:14:14 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x48}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:14 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:14:14 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c340f8a98292e51010d5f3255b4b975", 0xe3, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:14:14 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xf}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:14 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:14 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 30)
13:14:14 executing program 4:
io_setup(0x6, &(0x7f0000000040)=0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105241, 0x0)
io_submit(r0, 0x1, &(0x7f0000000680)=[&(0x7f0000000200)={0xeffdffff, 0x8008, 0x10, 0x1, 0x0, r1, 0x0, 0x0, 0xfffffffffffffffd}])
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f0000000000)={0x0, 0x6})
ioctl$AUTOFS_IOC_SETTIMEOUT(r1, 0x80049367, &(0x7f0000000080)=0x100000000)
13:14:14 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty, 0x10001}, 0x1c)
[ 1190.027040] FAULT_INJECTION: forcing a failure.
[ 1190.027040] name failslab, interval 1, probability 0, space 0, times 0
[ 1190.028083] CPU: 1 PID: 8444 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1190.028778] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1190.029484] Call Trace:
[ 1190.029713]
[ 1190.029927] dump_stack_lvl+0x8f/0xb7
[ 1190.030285] should_fail_ex.cold+0x5/0xa
[ 1190.030659] ? request_key_auth_new+0x107/0x940
[ 1190.031071] should_failslab+0x9/0x20
[ 1190.031424] __kmem_cache_alloc_node+0x5b/0x400
[ 1190.031846] ? request_key_auth_new+0x107/0x940
[ 1190.032245] ? request_key_auth_new+0x107/0x940
[ 1190.032674] __kmalloc_node_track_caller+0x43/0xb0
[ 1190.033120] kmemdup+0x2c/0x60
[ 1190.033431] request_key_auth_new+0x107/0x940
[ 1190.033841] ? __pfx_request_key_auth_new+0x10/0x10
[ 1190.034288] ? refcount_dec_and_lock+0x36/0x150
[ 1190.034702] request_key_and_link+0xd5d/0x1210
[ 1190.035114] ? __pfx_request_key_and_link+0x10/0x10
[ 1190.035561] ? lock_acquire+0x32/0xc0
[ 1190.035915] ? key_type_lookup+0x1e/0x100
[ 1190.036285] ? __pfx_key_default_cmp+0x10/0x10
[ 1190.036714] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1190.037173] ? _copy_from_user+0xf6/0x180
[ 1190.037569] __do_sys_request_key+0x21f/0x3b0
[ 1190.037983] ? __pfx___do_sys_request_key+0x10/0x10
[ 1190.038437] ? trace_rcu_dyntick+0x1a7/0x250
[ 1190.038845] ? syscall_enter_from_user_mode+0x21/0x50
[ 1190.039305] ? syscall_enter_from_user_mode+0x21/0x50
[ 1190.039786] do_syscall_64+0x3f/0x90
[ 1190.040119] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1190.040585] RIP: 0033:0x7f1da7f6db19
[ 1190.040937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1190.042462] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1190.043093] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1190.043706] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1190.044309] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1190.044933] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1190.045569] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1190.046185]
13:14:14 executing program 4:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=@getpolicy={0x1ac, 0x15, 0x4, 0x70bd29, 0x25dfdbfc, {{@in=@broadcast, @in6=@empty, 0x4e22, 0x2e, 0x4e20, 0x7, 0x2, 0x0, 0x20, 0x3b, 0x0, 0xffffffffffffffff}, 0x6e6bc0, 0x1}, [@replay_val={0x10, 0xa, {0x70bd2a, 0x70bd2c, 0x5}}, @algo_aead={0x14b, 0x12, {{'rfc4106-gcm-aesni\x00'}, 0x7f8, 0x3e0, "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"}}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x40000}, 0x4851)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@getpolicy={0x5c, 0x15, 0x1, 0x0, 0x0, {{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, [@mark={0xc}]}, 0x5c}}, 0x0)
[ 1190.063363] cgroup: fork rejected by pids controller in /syz0
13:14:33 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:33 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x48}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:33 executing program 4:
syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
getpeername(0xffffffffffffffff, &(0x7f0000000000)=@nfc, &(0x7f00000000c0)=0x80)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, 0x0, 0xfffffdef)
openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0)
13:14:33 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 31)
13:14:33 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:14:33 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x3}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:33 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd}, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
13:14:33 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:14:33 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:33 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r1 = perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xcd, 0x1f, 0x1f, 0xf4, 0x0, 0x1000, 0x40, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x5, 0xecd0}, 0x4200, 0x20, 0x0, 0x7, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r0, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r3, 0x0, 0x220)
socket$inet6_icmp(0xa, 0x2, 0x3a)
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r4, 0x0, 0x220)
r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r5, 0x0, 0x220)
ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000000380)=ANY=[])
write$binfmt_aout(r2, 0x0, 0x220)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3, 0x0, 0x7, 0x0, 0x0, 0x3ff, 0x50200, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2ca, 0x0, @perf_config_ext={0x4}, 0x2, 0x1, 0x54, 0x5, 0x80000001, 0x4, 0x2, 0x0, 0x8, 0x0, 0x8800}, 0x0, 0x6, r2, 0x9)
capset(&(0x7f0000000280)={0x19980330, 0xffffffffffffffff}, &(0x7f00000002c0)={0x5, 0x8ae, 0x8001, 0x5, 0x4, 0x80000001})
capset(&(0x7f0000000300)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000340)={0xf52e, 0x2, 0x4, 0x6, 0xc07, 0x10001})
ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0xf50f, 0x0)
13:14:33 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x65}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:33 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 32)
13:14:33 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:14:33 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:33 executing program 5:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
[ 1209.225340] FAULT_INJECTION: forcing a failure.
[ 1209.225340] name failslab, interval 1, probability 0, space 0, times 0
[ 1209.226820] CPU: 0 PID: 8904 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1209.227835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1209.228842] Call Trace:
[ 1209.229186]
[ 1209.229506] dump_stack_lvl+0x8f/0xb7
[ 1209.230047] should_fail_ex.cold+0x5/0xa
[ 1209.230616] ? key_alloc+0xd20/0x1280
[ 1209.231125] should_failslab+0x9/0x20
[ 1209.231651] kmem_cache_alloc+0x5a/0x410
[ 1209.232193] ? __pfx_vsnprintf+0x10/0x10
[ 1209.232740] key_alloc+0xd20/0x1280
[ 1209.233242] ? sprintf+0xc4/0x100
[ 1209.233729] ? __pfx_key_alloc+0x10/0x10
[ 1209.234269] ? request_key_auth_new+0x107/0x940
[ 1209.235182] ? rcu_read_lock_sched_held+0x42/0x80
[ 1209.235988] ? trace_kmalloc+0x2d/0xe0
[ 1209.236654] request_key_auth_new+0x6a3/0x940
[ 1209.237398] ? __pfx_request_key_auth_new+0x10/0x10
[ 1209.238235] ? refcount_dec_and_lock+0x36/0x150
[ 1209.239016] request_key_and_link+0xd5d/0x1210
[ 1209.239787] ? __pfx_request_key_and_link+0x10/0x10
[ 1209.240595] ? lock_acquire+0x32/0xc0
[ 1209.241238] ? key_type_lookup+0x1e/0x100
[ 1209.241940] ? __pfx_key_default_cmp+0x10/0x10
[ 1209.242667] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1209.243513] ? _copy_from_user+0xf6/0x180
[ 1209.244197] __do_sys_request_key+0x21f/0x3b0
[ 1209.244810] ? __pfx___do_sys_request_key+0x10/0x10
[ 1209.245471] ? syscall_enter_from_user_mode+0x21/0x50
[ 1209.246166] ? syscall_enter_from_user_mode+0x21/0x50
[ 1209.246857] do_syscall_64+0x3f/0x90
[ 1209.247370] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1209.248067] RIP: 0033:0x7f1da7f6db19
[ 1209.248555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1209.250738] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1209.251701] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1209.252589] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1209.253480] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1209.254366] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1209.255254] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1209.256231]
13:14:52 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:14:52 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x68}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:52 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:14:52 executing program 5:
rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00')
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:14:52 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x5}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:52 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 33)
13:14:52 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x65}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:52 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYRES32])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000380)={r0, 0x8, 0x1, 0x400})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e21, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1200}, 0x1c)
getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000))
socket$nl_xfrm(0x10, 0x3, 0x6)
getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000))
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0)
sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, 0x0, 0x2, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}}, 0x40091)
fallocate(r2, 0x0, 0x0, 0x87ffffc)
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
write(r4, &(0x7f0000000080)="01", 0x292e9)
r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001440)=ANY=[@ANYRES32=r5, @ANYRESHEX])
13:14:52 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x68}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:52 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 34)
13:14:52 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:14:52 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = clone3(&(0x7f00000003c0)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x3b}, &(0x7f0000000280)=""/12, 0xc, &(0x7f00000002c0)=""/164, &(0x7f0000000380)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x6, 0x0, 0x53, 0x91, 0x0, 0xfffffffffffff001, 0x5, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100)}, 0x2000, 0x80000001, 0x2, 0x5, 0x6, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1ff}, r1, 0x2, r0, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc)
capget(&(0x7f00000004c0)={0x20071026, r2}, &(0x7f0000000500)={0x0, 0x4, 0x100, 0xac, 0xf100, 0x4})
13:14:52 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
[ 1228.593481] FAULT_INJECTION: forcing a failure.
[ 1228.593481] name failslab, interval 1, probability 0, space 0, times 0
[ 1228.594752] CPU: 0 PID: 9130 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1228.595528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1228.596306] Call Trace:
[ 1228.596571]
[ 1228.596810] dump_stack_lvl+0x8f/0xb7
[ 1228.597223] should_fail_ex.cold+0x5/0xa
[ 1228.597653] ? key_alloc+0x433/0x1280
[ 1228.598049] should_failslab+0x9/0x20
[ 1228.598438] __kmem_cache_alloc_node+0x5b/0x400
[ 1228.598908] ? key_alloc+0x433/0x1280
[ 1228.599311] ? key_alloc+0x433/0x1280
[ 1228.599692] __kmalloc_node_track_caller+0x43/0xb0
[ 1228.600210] kmemdup+0x2c/0x60
[ 1228.600549] key_alloc+0x433/0x1280
[ 1228.600931] ? sprintf+0xc4/0x100
[ 1228.601308] ? __pfx_key_alloc+0x10/0x10
[ 1228.601715] ? request_key_auth_new+0x107/0x940
[ 1228.602181] ? rcu_read_lock_sched_held+0x42/0x80
[ 1228.602670] ? trace_kmalloc+0x2d/0xe0
[ 1228.603081] request_key_auth_new+0x6a3/0x940
[ 1228.603551] ? __pfx_request_key_auth_new+0x10/0x10
[ 1228.604068] ? refcount_dec_and_lock+0x36/0x150
[ 1228.604539] request_key_and_link+0xd5d/0x1210
[ 1228.605013] ? __pfx_request_key_and_link+0x10/0x10
[ 1228.605501] ? lock_acquire+0x32/0xc0
[ 1228.605895] ? key_type_lookup+0x1e/0x100
[ 1228.606319] ? __pfx_key_default_cmp+0x10/0x10
[ 1228.606796] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1228.607320] ? _copy_from_user+0xf6/0x180
[ 1228.607762] __do_sys_request_key+0x21f/0x3b0
[ 1228.608248] ? __pfx___do_sys_request_key+0x10/0x10
[ 1228.608748] ? trace_rcu_dyntick+0x1a7/0x250
[ 1228.609208] ? syscall_enter_from_user_mode+0x21/0x50
[ 1228.609725] ? syscall_enter_from_user_mode+0x21/0x50
[ 1228.610257] do_syscall_64+0x3f/0x90
[ 1228.610655] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1228.611176] RIP: 0033:0x7f1da7f6db19
[ 1228.611540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1228.613228] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1228.613952] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1228.614634] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1228.615314] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1228.616005] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1228.616682] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1228.617397]
13:14:53 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:53 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 35)
13:14:53 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xffffffff00000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:14:53 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:14:53 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x74}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:14:53 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:09 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x74}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:09 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
r2 = syz_open_dev$vcsu(&(0x7f0000000100), 0x8, 0x200)
ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000140))
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
13:15:09 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00')
preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0)
accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040))
perf_event_open(&(0x7f00000011c0)={0x5, 0x80, 0x8, 0x3, 0x6, 0x7, 0x0, 0x8, 0x104, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x4, 0x6e95}, 0x808, 0x6, 0x9, 0x2, 0x9, 0x6, 0x5, 0x0, 0xffff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, r1, 0x1)
13:15:09 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:09 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 36)
13:15:09 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:15:09 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:15:09 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7a}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:09 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
[ 1245.076379] FAULT_INJECTION: forcing a failure.
[ 1245.076379] name failslab, interval 1, probability 0, space 0, times 0
[ 1245.077248] CPU: 0 PID: 9508 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1245.077843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1245.078458] Call Trace:
[ 1245.078663]
[ 1245.078841] dump_stack_lvl+0x8f/0xb7
[ 1245.079155] should_fail_ex.cold+0x5/0xa
[ 1245.079488] should_failslab+0x9/0x20
[ 1245.079794] __kmem_cache_alloc_node+0x5b/0x400
[ 1245.080167] ? selinux_key_alloc+0x4a/0x1b0
[ 1245.080504] ? memcpy+0x3d/0x60
[ 1245.080790] kmalloc_trace+0x26/0x60
[ 1245.081098] selinux_key_alloc+0x4a/0x1b0
[ 1245.081435] security_key_alloc+0x5a/0xb0
[ 1245.081762] key_alloc+0x8a7/0x1280
[ 1245.082065] ? sprintf+0xc4/0x100
[ 1245.082352] ? __pfx_key_alloc+0x10/0x10
[ 1245.082667] ? request_key_auth_new+0x107/0x940
[ 1245.083034] ? rcu_read_lock_sched_held+0x42/0x80
[ 1245.083417] ? trace_kmalloc+0x2d/0xe0
[ 1245.083743] request_key_auth_new+0x6a3/0x940
[ 1245.084107] ? __pfx_request_key_auth_new+0x10/0x10
[ 1245.084508] ? refcount_dec_and_lock+0x36/0x150
[ 1245.084868] request_key_and_link+0xd5d/0x1210
[ 1245.085239] ? __pfx_request_key_and_link+0x10/0x10
[ 1245.085616] ? lock_acquire+0x32/0xc0
[ 1245.085912] ? key_type_lookup+0x1e/0x100
[ 1245.086250] ? __pfx_key_default_cmp+0x10/0x10
[ 1245.086608] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1245.087039] ? _copy_from_user+0xf6/0x180
[ 1245.087369] __do_sys_request_key+0x21f/0x3b0
[ 1245.087728] ? __pfx___do_sys_request_key+0x10/0x10
[ 1245.088122] ? syscall_enter_from_user_mode+0x21/0x50
[ 1245.088528] ? syscall_enter_from_user_mode+0x21/0x50
[ 1245.088945] do_syscall_64+0x3f/0x90
[ 1245.089260] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1245.089652] RIP: 0033:0x7f1da7f6db19
[ 1245.089938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1245.091217] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1245.091794] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1245.092360] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1245.092888] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1245.093429] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1245.093957] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1245.094585]
13:15:09 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7a}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:09 executing program 4:
ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9baf)
sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x45, 0x8, 0x54, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x2}, 0x0, 0x8, 0x2, 0x7, 0x2, 0x200, 0x8000, 0x0, 0x1d7, 0x0, 0x100}, 0x0, 0xb, 0xffffffffffffffff, 0x8)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)=0x80, &(0x7f0000000300)=@isdn, 0x0, 0x80800}, 0x3)
syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x39a}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_MGMT_C_PROTOCOLS(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002abd7000ffdbdf0008007f00000108000100242f4000000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x90c4)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'})
r2 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1800)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000003c0)={'ipvlan1\x00'})
syz_io_uring_setup(0x1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0)
syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0xa, &(0x7f0000000640), 0x1, 0x1}, 0xd1)
ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x80081270, &(0x7f0000000000))
syz_open_dev$vcsn(&(0x7f0000000200), 0x4e6, 0x80840)
13:15:09 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:15:28 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:15:28 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:15:28 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xa}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:28 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x6, 0xffffffff})
13:15:28 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa)
clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
13:15:28 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[\x00 ', 0xffffffffffffffff)
13:15:28 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 37)
13:15:28 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[\x00 ', 0xffffffffffffffff)
[ 1264.186819] cgroup: fork rejected by pids controller in /syz2
13:15:28 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x02', 0xffffffffffffffff)
13:15:28 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:15:28 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 38)
13:15:28 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
fstat(r0, &(0x7f0000000100))
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:15:28 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0), 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:15:28 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x02', 0xffffffffffffffff)
[ 1264.355148] FAULT_INJECTION: forcing a failure.
[ 1264.355148] name failslab, interval 1, probability 0, space 0, times 0
[ 1264.356005] CPU: 0 PID: 9900 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1264.356597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1264.357174] Call Trace:
[ 1264.357368]
[ 1264.357550] dump_stack_lvl+0x8f/0xb7
[ 1264.357856] should_fail_ex.cold+0x5/0xa
[ 1264.358173] ? key_alloc+0x3d5/0x1280
[ 1264.358466] should_failslab+0x9/0x20
[ 1264.358764] kmem_cache_alloc+0x5a/0x410
[ 1264.359095] key_alloc+0x3d5/0x1280
[ 1264.359395] ? __pfx_key_alloc+0x10/0x10
[ 1264.359703] ? __pfx_sprintf+0x10/0x10
[ 1264.360009] ? lock_is_held_type+0xdb/0x130
[ 1264.360354] keyring_alloc+0x46/0xc0
[ 1264.360647] call_sbin_request_key+0x26d/0xc60
[ 1264.360994] ? __key_instantiate_and_link+0xfa/0x3f0
[ 1264.361385] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1264.361764] ? __pfx_request_key_auth_free_preparse+0x10/0x10
[ 1264.362200] ? key_instantiate_and_link+0x38d/0x4a0
[ 1264.362579] ? _raw_spin_unlock+0x28/0x50
[ 1264.362893] ? key_alloc+0xad0/0x1280
[ 1264.363190] ? __pfx_key_instantiate_and_link+0x10/0x10
[ 1264.363590] ? sprintf+0xc4/0x100
[ 1264.363870] ? rcu_read_lock_sched_held+0x42/0x80
[ 1264.364239] ? trace_kmalloc+0x2d/0xe0
[ 1264.364566] ? request_key_auth_new+0x6ef/0x940
[ 1264.364926] ? __pfx_request_key_auth_new+0x10/0x10
[ 1264.365310] ? refcount_dec_and_lock+0x36/0x150
[ 1264.365677] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1264.366062] request_key_and_link+0xdef/0x1210
[ 1264.366417] ? __pfx_request_key_and_link+0x10/0x10
[ 1264.366792] ? lock_acquire+0x32/0xc0
[ 1264.367093] ? key_type_lookup+0x1e/0x100
[ 1264.367418] ? __pfx_key_default_cmp+0x10/0x10
[ 1264.367772] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1264.368165] ? _copy_from_user+0xf6/0x180
[ 1264.368500] __do_sys_request_key+0x21f/0x3b0
[ 1264.368855] ? __pfx___do_sys_request_key+0x10/0x10
[ 1264.369257] ? syscall_enter_from_user_mode+0x21/0x50
[ 1264.369651] ? syscall_enter_from_user_mode+0x21/0x50
[ 1264.370058] do_syscall_64+0x3f/0x90
[ 1264.370347] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1264.370736] RIP: 0033:0x7f1da7f6db19
[ 1264.371017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1264.372315] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1264.372876] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1264.373400] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1264.373914] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1264.374443] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1264.374954] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1264.375500]
13:15:28 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x03', 0xffffffffffffffff)
13:15:28 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:15:28 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syncfs(r0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:15:28 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0xf}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:28 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x103}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:15:28 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 39)
13:15:43 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x48}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:43 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0), 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:15:43 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'veth0_virt_wifi\x00', 0x4}, 0x18)
setsockopt$sock_timeval(r0, 0x1, 0x1d, &(0x7f0000000000)={0x77359400}, 0xffffffffffffff9f)
clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0})
openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x228a41, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f00000000c0)={r1, r2/1000+60000}, 0x10)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff})
pwritev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="b40d887cfe724a858c3eff438bb7c4ed9f4f3b74d5d8bb283de1", 0x1a}, {&(0x7f00000001c0)="f1ff94cb39346b8fbe278fe2bb69aafe6d00c8db3776ccc0ca5d6f0a9dca4ac5f525d42cd855a5c72cc71ff24cafa072186d6a3105d3e4a22a7cb386392ccd9e8dd917a6c51385e6d0b34a8ea60e40edab949d55eb7fa4fcaf6b7609298f9e3269c9baeef33baa185beb33e5123f91cf1b895d0b4cda52c70f45a23ad6a3bf62495ab29864580b1527325e9d6d3ecc293519fccb3237133b437c0f188cb2f22252c6f1131f24d87edb6e0e6a8d2842c19fee9c30ad442c61f0a233ec967357729bc9bd99bd32449aab8c4f3fd7bd27dd19ef69bae414ebe913bc6e47e3a4e0cdddba50369e7d132b9b21ff1042852bdfa16875492c822291221f", 0xfa}, {&(0x7f00000002c0)="dfe096afa5fef76a30242e710a8ff61e2c8aa90e41a6fd60a7b95d114fa719d39b559e8c4f39fd325ad7d865a2329e6a270237bac8411ab588c542fbdf505a26ab10e73764c88d4de5e9eef2928b5da0294daa5d46f060d16931247233f06716ce770b27093c1773f3d0d997753d62e485853cf68ef28f4ace16c3e93fd7201da21d2b650737c3035d2ca5d9111a7463862361d5c33cc1a5820b07f22381616cd116226815769e891a108fbdae78847217b7d206f869d56a9b1ca95cdd9eb4a4d30dabc5ef30015cabd44b07535f1ccb9bfd4f499291d1f345512f2e9a81f9ef52451f36f74fab5636e2dfbafec5330887", 0xf1}], 0x3, 0x8, 0x1)
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000440)={@rand_addr=0x64010101, @rand_addr=0x64010101}, 0xc)
ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'})
13:15:43 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x04', 0xffffffffffffffff)
13:15:43 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 40)
13:15:43 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x03', 0xffffffffffffffff)
13:15:43 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x14a}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:15:43 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x4)
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1f, 0x4)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:15:43 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x8, 0x2, 0x7, 0x0, 0x4, 0x4000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4e, 0x2, @perf_config_ext={0x40, 0x800}, 0x88, 0x5f8, 0x9, 0x0, 0xffffffffffffffff, 0x200, 0x400, 0x0, 0xfffffff8, 0x0, 0x10000}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2)
[ 1278.714972] FAULT_INJECTION: forcing a failure.
[ 1278.714972] name failslab, interval 1, probability 0, space 0, times 0
[ 1278.716480] CPU: 0 PID: 10277 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1278.717512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1278.718526] Call Trace:
[ 1278.718876]
[ 1278.719184] dump_stack_lvl+0x8f/0xb7
[ 1278.719725] should_fail_ex.cold+0x5/0xa
[ 1278.720284] ? key_alloc+0x433/0x1280
[ 1278.720822] should_failslab+0x9/0x20
[ 1278.721332] __kmem_cache_alloc_node+0x5b/0x400
[ 1278.721939] ? key_alloc+0x433/0x1280
[ 1278.722467] ? key_alloc+0x433/0x1280
[ 1278.722965] __kmalloc_node_track_caller+0x43/0xb0
[ 1278.723621] kmemdup+0x2c/0x60
[ 1278.724068] key_alloc+0x433/0x1280
[ 1278.724620] ? __pfx_key_alloc+0x10/0x10
[ 1278.725180] ? __pfx_sprintf+0x10/0x10
[ 1278.725740] ? lock_is_held_type+0xdb/0x130
[ 1278.726536] keyring_alloc+0x46/0xc0
[ 1278.727252] call_sbin_request_key+0x26d/0xc60
[ 1278.728121] ? __key_instantiate_and_link+0xfa/0x3f0
[ 1278.728957] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1278.729656] ? __pfx_request_key_auth_free_preparse+0x10/0x10
[ 1278.730470] ? key_instantiate_and_link+0x38d/0x4a0
[ 1278.731138] ? _raw_spin_unlock+0x28/0x50
[ 1278.731721] ? key_alloc+0xad0/0x1280
[ 1278.732268] ? __pfx_key_instantiate_and_link+0x10/0x10
[ 1278.733074] ? sprintf+0xc4/0x100
[ 1278.733597] ? rcu_read_lock_sched_held+0x42/0x80
[ 1278.734259] ? trace_kmalloc+0x2d/0xe0
[ 1278.734820] ? request_key_auth_new+0x6ef/0x940
[ 1278.735454] ? __pfx_request_key_auth_new+0x10/0x10
[ 1278.736156] ? refcount_dec_and_lock+0x36/0x150
[ 1278.736814] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1278.737491] request_key_and_link+0xdef/0x1210
[ 1278.738127] ? __pfx_request_key_and_link+0x10/0x10
[ 1278.738802] ? lock_acquire+0x32/0xc0
[ 1278.739334] ? key_type_lookup+0x1e/0x100
[ 1278.739918] ? __pfx_key_default_cmp+0x10/0x10
[ 1278.740567] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1278.741288] ? _copy_from_user+0xf6/0x180
[ 1278.741879] __do_sys_request_key+0x21f/0x3b0
[ 1278.742500] ? __pfx___do_sys_request_key+0x10/0x10
[ 1278.743185] ? syscall_enter_from_user_mode+0x21/0x50
[ 1278.743891] ? syscall_enter_from_user_mode+0x21/0x50
[ 1278.744622] do_syscall_64+0x3f/0x90
[ 1278.745158] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1278.745868] RIP: 0033:0x7f1da7f6db19
[ 1278.746373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1278.748708] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1278.749706] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1278.750643] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1278.751606] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1278.752563] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1278.753484] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1278.754486]
13:15:43 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x04', 0xffffffffffffffff)
13:15:43 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x301}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:15:43 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x05', 0xffffffffffffffff)
13:15:43 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0), 0x0, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:15:59 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r0 = syz_open_dev$vcsn(&(0x7f0000000180), 0x88b, 0x608040)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0xdd, 0x5, 0x7, 0x0, 0x3, 0x78400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x4}, 0x14410, 0x4a, 0x80, 0x9, 0x4, 0x0, 0x1, 0x0, 0x81d1, 0x0, 0xba}, 0x0, 0xd, r0, 0x18)
r1 = clone3(&(0x7f0000000480)={0x100048000, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), {0x2c}, &(0x7f0000000340)=""/20, 0x14, &(0x7f0000000380)=""/150, &(0x7f0000000440)=[0xffffffffffffffff], 0x1, {r0}}, 0x58)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500), 0x40002, 0x0)
perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x40, 0x7f, 0xec, 0x1, 0x0, 0x7, 0x200, 0xf, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0x42904, 0xbd, 0x2ff0, 0x2, 0x2, 0x2, 0x2, 0x0, 0x401, 0x0, 0x9}, r1, 0x4, r2, 0x2)
13:15:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x06', 0xffffffffffffffff)
13:15:59 executing program 4:
r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x410, &(0x7f0000000140)=ANY=[])
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0})
r3 = getuid()
fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000000fcc949db1c534e0defba2f1c04759997d605f837fd301a1abe82bca597f27a69cd8719b4840cc70fc2477cdd2cdb40d786e77ad55fc5935853ffb958dd521cb527ccc75a9e6f49e7bc29e5c3f411d4dfe3e325b231d13bbdf9951d4c11363aa20e5a", @ANYRES32=r2, @ANYBLOB="02000100", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000020000000000"], 0x3c, 0x0)
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lstat(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0})
r6 = getuid()
fsetxattr$system_posix_acl(r4, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r5}, {0x2, 0x1, r6}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0)
syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x2, &(0x7f0000000480)=[{&(0x7f00000002c0)="ab0c36532c541728af9121c8fca41a974e00ba3f167c8a2044783fcf8c3a19114e7bdf07442f42f429fb780ad633f674c61f2208c1206a1a7c422b5651f3a950ea740d477a013ee9e54dca6879c2de90cf3a5696ccc0f452b59cb9699db3eb95b56ae7704c9cdc2b1e90d1a568d86d9a12e6514d116773deb1cc76af318360fea82ca8ab64ad133abe4e5e7d9de520ffbd34b6b7919400f775f3d1166bfc53956aa27b940e4cb0f71b0a02d5c2e1bc4f68a53998d776c4ef0fa3e2adc5bbf7b6b7bc8c07bed11ffbca88fb88fa7c3c47296a3fd005f8e0f3e91ff3f9195ce50554cb46f05d237b8b5ab5278a4d", 0xed, 0x9}, {&(0x7f00000003c0)="796272f8df302965b786f5a1b260eb35f21ed322932733e01eb88e9c2d5e62213ab3b999a585ccdc312c36ac9fcc9af3db19c8ab152df72844c9eb26cbb48024d018a07b51aa81163b3369fa28c7f3cbc4401859d60e6ffa19d433d7e66a69379e0a7d0587ba03410f0791f02f659422cbb177f74586a654bf887f76c15f18470ec29b32073dcc71f6383242e4cdcfa8ddceb1ec30687adcc654e3aef61a5937", 0xa0, 0x2}], 0x8080, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, '\xd9\x00\x00\x00$\''}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_gt={'uid>', r5}}, {@smackfshat}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@hash}]})
fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000040)='fsname', &(0x7f0000000140)='./file0/file0\x00', r0)
chdir(&(0x7f0000000580)='.\x00')
r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r7, 0x0, 0x220)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r7, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r7, {0x2}}, './file1\x00'})
openat(r8, &(0x7f00000001c0)='./file0\x00', 0x200080, 0x180)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r7}, './file1\x00'})
r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r9, &(0x7f0000001180)=ANY=[], 0x220)
ftruncate(r9, 0x7f)
13:15:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:15:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8a", 0x72, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:15:59 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 41)
13:15:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x05', 0xffffffffffffffff)
13:15:59 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 42)
13:15:59 executing program 5:
mknod$loop(&(0x7f0000000100)='./file0\x00', 0x20, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:15:59 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x60d00, 0x0)
r3 = accept$unix(r2, 0x0, &(0x7f0000000000))
fcntl$setflags(r3, 0x2, 0x1)
write(r1, &(0x7f0000000200)='E', 0x140000)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r4, 0xe, 0xffffffffffffffff, 0xb)
r5 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x9, 0x3, 0x1, 0x99, 0x0, 0x8, 0x85020, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0x1f}, 0x14020, 0x9, 0x5, 0x2, 0xfff, 0x90da, 0x9, 0x0, 0xb4a80000, 0x0, 0x81}, r4, 0x4, r0, 0x6)
perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x20, 0x9, 0x8, 0x0, 0x93a, 0x16308, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000140), 0x9}, 0x40100, 0x9, 0x0, 0x7, 0xfffffffffffffffd, 0x3a19, 0x5, 0x0, 0x7, 0x0, 0x3}, 0xffffffffffffffff, 0x3, r5, 0x1)
openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x302e1cec00cdaec6, 0x0)
13:15:59 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e80}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:15:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x06', 0xffffffffffffffff)
[ 1294.920297] FAULT_INJECTION: forcing a failure.
[ 1294.920297] name failslab, interval 1, probability 0, space 0, times 0
[ 1294.922188] CPU: 1 PID: 10890 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1294.923388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1294.924593] Call Trace:
[ 1294.924998]
13:15:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\a', 0xffffffffffffffff)
[ 1294.925359] dump_stack_lvl+0x8f/0xb7
[ 1294.926123] should_fail_ex.cold+0x5/0xa
[ 1294.926742] should_failslab+0x9/0x20
[ 1294.927333] __kmem_cache_alloc_node+0x5b/0x400
[ 1294.928014] ? selinux_key_alloc+0x4a/0x1b0
[ 1294.928655] ? memcpy+0x3d/0x60
[ 1294.929183] kmalloc_trace+0x26/0x60
[ 1294.929747] selinux_key_alloc+0x4a/0x1b0
[ 1294.930364] security_key_alloc+0x5a/0xb0
[ 1294.930986] key_alloc+0x8a7/0x1280
[ 1294.931557] ? __pfx_key_alloc+0x10/0x10
[ 1294.932160] ? __pfx_sprintf+0x10/0x10
[ 1294.932763] ? lock_is_held_type+0xdb/0x130
[ 1294.933411] keyring_alloc+0x46/0xc0
[ 1294.933984] call_sbin_request_key+0x26d/0xc60
[ 1294.934672] ? __key_instantiate_and_link+0xfa/0x3f0
[ 1294.935424] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1294.936159] ? __pfx_request_key_auth_free_preparse+0x10/0x10
[ 1294.937009] ? key_instantiate_and_link+0x38d/0x4a0
[ 1294.937757] ? _raw_spin_unlock+0x28/0x50
[ 1294.938372] ? key_alloc+0xad0/0x1280
[ 1294.938937] ? __pfx_key_instantiate_and_link+0x10/0x10
[ 1294.939716] ? sprintf+0xc4/0x100
[ 1294.940291] ? rcu_read_lock_sched_held+0x42/0x80
[ 1294.941062] ? trace_kmalloc+0x2d/0xe0
[ 1294.941695] ? request_key_auth_new+0x6ef/0x940
[ 1294.942338] ? __pfx_request_key_auth_new+0x10/0x10
[ 1294.943056] ? refcount_dec_and_lock+0x36/0x150
[ 1294.943706] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1294.944391] request_key_and_link+0xdef/0x1210
[ 1294.945043] ? __pfx_request_key_and_link+0x10/0x10
13:15:59 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8a", 0x72, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
[ 1294.945725] ? lock_acquire+0x32/0xc0
[ 1294.946337] ? key_type_lookup+0x1e/0x100
[ 1294.946903] ? __pfx_key_default_cmp+0x10/0x10
[ 1294.947559] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1294.948317] ? _copy_from_user+0xf6/0x180
[ 1294.948913] __do_sys_request_key+0x21f/0x3b0
[ 1294.949535] ? __pfx___do_sys_request_key+0x10/0x10
[ 1294.950269] ? syscall_enter_from_user_mode+0x21/0x50
[ 1294.950981] ? syscall_enter_from_user_mode+0x21/0x50
[ 1294.951706] do_syscall_64+0x3f/0x90
[ 1294.952242] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1294.952987] RIP: 0033:0x7f1da7f6db19
[ 1294.953520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1294.956007] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1294.957034] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1294.958028] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1294.958994] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1294.959948] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1294.960899] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1294.961960]
13:15:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x65}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:15:59 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\b', 0xffffffffffffffff)
13:16:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3ec0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:16:16 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x68}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:16:16 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 43)
13:16:16 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8a", 0x72, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:16:16 executing program 4:
r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
write$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0)
getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@loopback, @remote, @remote}, &(0x7f0000000040)=0xc)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0)
syz_io_uring_setup(0x5ce2, &(0x7f0000000a00)={0x0, 0x0, 0x10, 0x0, 0x10a, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f0000000a80), &(0x7f0000000ac0))
ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'})
socket(0x0, 0x6, 0x80)
13:16:16 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\n', 0xffffffffffffffff)
13:16:16 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c000000b0acb50a15c55e069fff47fbee7550950e915ec9f3bc444347195ec276a423dc6015126ee7052300000800ba080000000000000022f44464681d56cd19ef2ab68f3c", @ANYRES16=r1, @ANYBLOB="0508000000f9ffffffff01000000180001801400020067656e65766530000000000000000000"], 0x2c}}, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0x2a, 0x4, 0x200, 0xd, @private0, @local, 0x1, 0x8000, 0x9}})
sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r1, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x2000c871}, 0x4040000)
r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xff, 0x63, 0x1f, 0x2, 0x0, 0x9, 0x0, 0x5, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x2}, 0x220, 0x1, 0x3, 0x3, 0x10001, 0x8, 0x1, 0x0, 0xc, 0x0, 0x9c000000}, 0xffffffffffffffff, 0x8, r3, 0x2)
13:16:16 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\a', 0xffffffffffffffff)
13:16:16 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 44)
13:16:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:16:16 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0xc002, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x2)
capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffff7ffe})
capget(&(0x7f0000000100)={0x20080522}, &(0x7f0000000140)={0x9, 0x80000001, 0x2, 0x4, 0x80000000, 0x5})
capget(&(0x7f00000001c0)={0x19980330}, &(0x7f0000000200)={0x3, 0x7, 0xe496, 0x0, 0x401, 0x100})
ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000240)={r0, 0x40, 0x1, 0x7})
[ 1312.249756] FAULT_INJECTION: forcing a failure.
[ 1312.249756] name failslab, interval 1, probability 0, space 0, times 0
[ 1312.251686] CPU: 0 PID: 11589 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1312.252794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1312.253905] Call Trace:
[ 1312.254275]
[ 1312.254613] dump_stack_lvl+0x8f/0xb7
[ 1312.255193] should_fail_ex.cold+0x5/0xa
[ 1312.255806] should_failslab+0x9/0x20
[ 1312.256376] __kmem_cache_alloc_node+0x5b/0x400
[ 1312.257067] ? assoc_array_insert+0xe2/0x2b70
[ 1312.257715] ? __mutex_unlock_slowpath+0x15c/0x5e0
[ 1312.258413] ? keyring_instantiate+0x1d3/0x2b0
[ 1312.259099] kmalloc_trace+0x26/0x60
[ 1312.259671] assoc_array_insert+0xe2/0x2b70
[ 1312.260322] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 1312.261056] ? rcu_read_lock_sched_held+0x42/0x80
[ 1312.261771] ? trace_lock_acquire+0x14c/0x1c0
[ 1312.262435] ? __pfx_assoc_array_insert+0x10/0x10
[ 1312.263131] ? lock_acquire+0x32/0xc0
[ 1312.263699] ? key_link+0xb5/0x350
[ 1312.264265] ? down_write+0x157/0x220
[ 1312.264850] ? __pfx_down_write+0x10/0x10
[ 1312.265520] __key_link_begin+0xf0/0x250
[ 1312.266156] key_link+0x107/0x350
[ 1312.266701] ? lock_is_held_type+0xdb/0x130
[ 1312.267342] ? __pfx_key_link+0x10/0x10
[ 1312.267968] ? keyring_alloc+0x90/0xc0
[ 1312.268574] call_sbin_request_key+0x2ca/0xc60
[ 1312.269267] ? __key_instantiate_and_link+0xfa/0x3f0
[ 1312.270020] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1312.270761] ? __pfx_request_key_auth_free_preparse+0x10/0x10
[ 1312.271613] ? key_instantiate_and_link+0x38d/0x4a0
[ 1312.272339] ? _raw_spin_unlock+0x28/0x50
[ 1312.272961] ? key_alloc+0xad0/0x1280
[ 1312.273534] ? __pfx_key_instantiate_and_link+0x10/0x10
[ 1312.274305] ? sprintf+0xc4/0x100
[ 1312.274869] ? trace_kmalloc+0x2d/0xe0
[ 1312.275484] ? request_key_auth_new+0x6ef/0x940
[ 1312.276171] ? __pfx_request_key_auth_new+0x10/0x10
[ 1312.276951] ? refcount_dec_and_lock+0x36/0x150
[ 1312.277659] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1312.278391] request_key_and_link+0xdef/0x1210
[ 1312.279092] ? __pfx_request_key_and_link+0x10/0x10
[ 1312.279829] ? lock_acquire+0x32/0xc0
[ 1312.280409] ? key_type_lookup+0x1e/0x100
[ 1312.281059] ? __pfx_key_default_cmp+0x10/0x10
[ 1312.281737] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1312.282492] ? _copy_from_user+0xf6/0x180
[ 1312.283108] __do_sys_request_key+0x21f/0x3b0
[ 1312.283778] ? __pfx___do_sys_request_key+0x10/0x10
[ 1312.284486] ? trace_rcu_dyntick+0x1a7/0x250
[ 1312.285175] ? syscall_enter_from_user_mode+0x21/0x50
[ 1312.285917] ? syscall_enter_from_user_mode+0x21/0x50
[ 1312.286674] do_syscall_64+0x3f/0x90
[ 1312.287255] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1312.287996] RIP: 0033:0x7f1da7f6db19
[ 1312.288522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1312.290933] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1312.291974] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1312.292947] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1312.293914] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1312.294893] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1312.295878] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1312.296942]
13:16:16 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x0f', 0xffffffffffffffff)
13:16:16 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\b', 0xffffffffffffffff)
13:16:16 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c00"/171, 0xab, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:16:37 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:16:37 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c00"/171, 0xab, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:16:37 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,H', 0xffffffffffffffff)
13:16:37 executing program 4:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8a", 0x72, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:16:37 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6e00}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:16:37 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x6c}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:16:37 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 45)
13:16:37 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\n', 0xffffffffffffffff)
13:16:38 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 46)
13:16:38 executing program 5:
perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x77, 0x0, 0x0, 0x40, 0x0, 0x0, 0x30880, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x4002, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x340, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
ioctl$CDROMEJECT(r0, 0x5309)
capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0xfffffffb, 0x1, 0xfffff001, 0x9, 0x401, 0x8})
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000240))
capset(&(0x7f00000001c0)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000200)={0x2, 0x401, 0xfffffd56, 0x6, 0xfffffffc})
[ 1333.663340] FAULT_INJECTION: forcing a failure.
[ 1333.663340] name failslab, interval 1, probability 0, space 0, times 0
[ 1333.664767] CPU: 1 PID: 12087 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1333.664812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1333.664827] Call Trace:
[ 1333.664835]
[ 1333.664845] dump_stack_lvl+0x8f/0xb7
[ 1333.664893] should_fail_ex.cold+0x5/0xa
[ 1333.664935] should_failslab+0x9/0x20
[ 1333.664968] __kmem_cache_alloc_node+0x5b/0x400
[ 1333.665001] ? assoc_array_insert+0x3cb/0x2b70
[ 1333.665046] kmalloc_trace+0x26/0x60
[ 1333.665078] assoc_array_insert+0x3cb/0x2b70
[ 1333.665121] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 1333.665161] ? rcu_read_lock_sched_held+0x42/0x80
[ 1333.665221] ? trace_lock_acquire+0x14c/0x1c0
[ 1333.665257] ? __pfx_assoc_array_insert+0x10/0x10
[ 1333.665288] ? lock_acquire+0x32/0xc0
[ 1333.665317] ? key_link+0xb5/0x350
[ 1333.665358] ? down_write+0x157/0x220
[ 1333.665393] ? __pfx_down_write+0x10/0x10
[ 1333.665437] __key_link_begin+0xf0/0x250
[ 1333.665472] key_link+0x107/0x350
[ 1333.665508] ? lock_is_held_type+0xdb/0x130
[ 1333.665543] ? __pfx_key_link+0x10/0x10
[ 1333.665580] ? keyring_alloc+0x90/0xc0
[ 1333.665617] call_sbin_request_key+0x2ca/0xc60
[ 1333.665645] ? __key_instantiate_and_link+0xfa/0x3f0
[ 1333.665678] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1333.665704] ? __pfx_request_key_auth_free_preparse+0x10/0x10
[ 1333.665730] ? key_instantiate_and_link+0x38d/0x4a0
[ 1333.665757] ? _raw_spin_unlock+0x28/0x50
[ 1333.665784] ? key_alloc+0xad0/0x1280
[ 1333.665811] ? __pfx_key_instantiate_and_link+0x10/0x10
[ 1333.665842] ? sprintf+0xc4/0x100
[ 1333.665881] ? rcu_read_lock_sched_held+0x42/0x80
[ 1333.665917] ? trace_kmalloc+0x2d/0xe0
[ 1333.665957] ? request_key_auth_new+0x6ef/0x940
[ 1333.665987] ? __pfx_request_key_auth_new+0x10/0x10
[ 1333.666027] ? refcount_dec_and_lock+0x36/0x150
[ 1333.666058] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1333.666083] request_key_and_link+0xdef/0x1210
[ 1333.666118] ? __pfx_request_key_and_link+0x10/0x10
[ 1333.666144] ? lock_acquire+0x32/0xc0
[ 1333.666173] ? key_type_lookup+0x1e/0x100
[ 1333.666208] ? __pfx_key_default_cmp+0x10/0x10
[ 1333.666241] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1333.666278] ? _copy_from_user+0xf6/0x180
[ 1333.666315] __do_sys_request_key+0x21f/0x3b0
[ 1333.666354] ? __pfx___do_sys_request_key+0x10/0x10
[ 1333.666387] ? trace_rcu_dyntick+0x1a7/0x250
[ 1333.666431] ? syscall_enter_from_user_mode+0x21/0x50
[ 1333.666467] ? syscall_enter_from_user_mode+0x21/0x50
[ 1333.666512] do_syscall_64+0x3f/0x90
[ 1333.666551] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1333.666591] RIP: 0033:0x7f1da7f6db19
[ 1333.666608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1333.666632] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1333.666657] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1333.666674] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1333.666690] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1333.666705] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1333.666721] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1333.666765]
13:16:38 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x0f', 0xffffffffffffffff)
13:16:38 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x74}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:16:38 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x803e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:16:38 executing program 5:
sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x1c}}, 0x44)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x9, 0x0, 0xdc08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x8000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:16:38 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c00"/171, 0xab, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:16:38 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 47)
13:16:38 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,L', 0xffffffffffffffff)
13:16:38 executing program 4:
r0 = syz_open_dev$ptys(0xc, 0x3, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000002880)=ANY=[])
ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000000c0)=0x8)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'})
bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14)
ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'veth0_to_hsr\x00'})
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r3, 0x0, 0x220)
ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000040)={'tunl0\x00', 0xeb})
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r4, 0x0, 0x220)
r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x400002, 0x20)
r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r6, 0x0, 0x220)
r7 = eventfd2(0x100, 0x80400)
r8 = syz_open_dev$loop(&(0x7f0000002500), 0x2, 0x468a00)
r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002600)={0x3, &(0x7f00000025c0)=[{0x0, 0x8a, 0x9, 0xf3}, {0x100, 0x7, 0x81, 0x2}, {0x7, 0x20, 0x40, 0x480000}]})
io_submit(0x0, 0x8, &(0x7f0000002840)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x40, r4, &(0x7f0000000280)="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", 0x1000, 0x5, 0x0, 0x3}, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x1, 0x7, r5, &(0x7f0000001280)="d0c409de2b9a586792a77e037e09a3c3014885361c84cb027e848626e43e49bf0c8ac416a2153a3d2f5c9f374483c8362bb4211bda92736039a80e6847eac62ca37261b95212696d5dc578bbcb8e4f0f3018e42a53e836", 0x57, 0x8, 0x0, 0x0, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x6, 0xffffffffffffffff, &(0x7f0000001340), 0x0, 0xfffffffffffff001, 0x0, 0x2}, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x7, r0, &(0x7f00000013c0)="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", 0x1000, 0xfffffffffffffffa, 0x0, 0x1, r6}, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x4, r7, &(0x7f0000002400)="e4815140fd10cddf0ef5def079d5b5da3164aeb05d26f6b52ae411edf7967324477f0c46afd0c1d43e4df9cda90e3ef1d5bc7312412105074cfcf1c3f10eebdd8cf3a325a26d139537df2be6940131e50ee8f3448844402819735b419e14edad5a0272a30e5af8e87410e912d62b4f2710e3ced760522d5bbb11a158f6e1d116efd1579675d1", 0x86, 0x2, 0x0, 0x3, r3}, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x8, 0x400, r8, &(0x7f0000002540)="fecda9796f25fa34d4e2681bde30dbcd98d1c5b14c", 0x15, 0x101, 0x0, 0x1}, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x1, 0x8000, r9, &(0x7f0000002640)="ad10d08df5bed6151d15d9da3a7833b451ed2a93f30d189568dfee36e325f7a01fd8580e818b0bb393b85efb5befb316a07ada7b6e6a306e36b9f3002edafc5155fb2584d8f7aa06e0ff643aa7940a5bbcf57ad0f56b828a98317f609a6c03753c51be4a4a43f067ecf9e733f075bad7bc3a6f4cd71a4f9ab9f9203d6ff3db556efab410834e485daaff", 0x8a, 0x6, 0x0, 0x1}, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x8, 0x6, r2, &(0x7f0000002740)="dacc7502a6321f160bafbabc9c7941125a00db4196e9040e93dea6017ce678f50319226809b2e7bdffe93890af242f834ebafc06c75656ac54de301fee8ef0ba120b882636d02773b2a13ddc2619dea34295ff2fb8e483ec9e73d6a96718924f2c87bdddaf9cea9cc68ff3cab30b9e26e31178e3dfbdd81f058dff52137e62313d50f0992c4cce85d85ca1f650d11863c558c180e2c86a", 0x97, 0x1, 0x0, 0x2, r3}])
13:16:38 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:16:53 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc03e}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:16:53 executing program 4:
r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0)
bind$802154_raw(r0, &(0x7f0000002100)={0x24, @short}, 0x14)
sendmsg$802154_raw(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x24, @short={0x2, 0x2}}, 0x14, &(0x7f00000000c0)={&(0x7f0000000040)="d65c602c25e46d64928c4b617f96ca9f981b07f88555a9af7031e488c386258fd5379d9f2b12e7bc977af116b5ff936d63ea516d85664b2ca9ff0ae3a09044e3f51504e1aaa4341cd0eacbb62f17c00a8a041e5b74b8a49cefdd37a7e0b58c97245b044c31c8b6", 0x67}, 0x1, 0x0, 0x0, 0x20000080}, 0x20004000)
pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800)
setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x5, 0x4)
r2 = socket$packet(0x11, 0x2, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0})
sendmmsg(r2, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x4, r4}, 0x80, 0x0}}], 0x1, 0x0)
sendmsg$inet(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f00000001c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000000200)="d6343857f261839bf81129919f6df0c49a3bd9f040ab56aa0d47851fb2522b39c2c449922f48f5ccd58f4ca3479b6a377825f7a142b51d3676edea3b8804d428db17f5277ec49df068cb57ed8bb923ad7f7fa5b88100f408fd2ae3438685f4d2e2ff8f95fb700e82b4cd52631784619d0d00418d7b4303d1f0dc080cb1fec62c57afeb424d5ae7af60feaa", 0x8b}, {&(0x7f00000002c0)="f6957d72727e301386e232a59f0324050899f7cbb215ed1a3b53584c533985b236de16613659fd8c93a7328ca9ef423006eb5cbf980ea68a0deecf83d2b7d4e26099e04989a8ef3afba990491ea534e91073ecef16585d337028c809e95f555120ed5102d0078c30f52b616484f08dee1809f299b7a36b60b1eee4bc61bc43a68df453408f2cb7370654281a8f4b84627cab80525e6a8b22dca0f29ccfd403b288ce242b8b0dbadc672387726ef327dee411f6d351f9e05aff2c794a317c73976c9f30c5d39db71a8fd41da915c9b7cb7c67dc69e051abf166a884c12040f4f0534c98e996a60b67ab31cbe3d89c1004b2", 0xf1}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="558e965b183025800ffec4edf7270b174327fff0a68b8f1b2a7740f504a6eed90009371f60fc48bc54badff516b2017f5b941b46e7315deb91983317b8e0be90594f1a3d32785843803355feeed4016a5548e95313139bd4f8db82cf69de9e4767df8d2574e3636512fe7814220422ed7c88783f9b1c417164ff9639a0aeb83011b3c89069ad4210899ab04dcc10a384b63d09d4f3ead95d5957b2352e38c51c6ff9f1c0e2b72919a9093b4ee54118726c14de0e7fd83212ac82b6cb667229b3876b0a52c783458377d528d61cc5767ea15a6076639c04152f88a15a55f232e97adfd812be57ca89d96ead9155c3e60723", 0xf1}, {&(0x7f00000014c0)="d51eaf7a08eb46a7ca8c", 0xa}, {&(0x7f0000001500)="7fae9385fe380d4859e07a7727eb692e462d5a50bc8f754d604e1f11b6199adfaf689381130c8d7c4e66dc444926ba60cfd17c976803e39f258948b685ee3f11012ae73d26636f937f294b6937f3a35511521876027879b93d66594235a3ffda3a551b01b683b299f54174061f721bc88572292d7baaead5b5", 0x79}, {&(0x7f0000001580)="5bab386537c41c06295bfaca1791de711258bc2cec9f686ab2dad2cbaeb3d5098f9761f486b04cb8c7fc696b2793", 0x2e}], 0x7, &(0x7f0000001640)=[@ip_ttl={{0x14, 0x0, 0x2, 0x48ec}}, @ip_retopts={{0x70, 0x0, 0x7, {[@noop, @ssrr={0x89, 0x1b, 0x30, [@local, @empty, @local, @local, @rand_addr=0x64010102, @empty]}, @cipso={0x86, 0x44, 0xffffffffffffffff, [{0x6, 0xc, "65e92e5bd6cbf2ec0de7"}, {0x5, 0x2}, {0x0, 0x11, "cba15e8b66df2bebe991ecebe856d2"}, {0x2, 0x8, "37d033eb957f"}, {0x5, 0xa, "3c05680cdb36db67"}, {0x5, 0xd, "6a24dd5dfdfdc88e77bbf5"}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @local, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xbd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3ff}}], 0xf0}, 0x881)
13:16:53 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,e', 0xffffffffffffffff)
13:16:53 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 48)
13:16:53 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,H', 0xffffffffffffffff)
13:16:53 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x7a}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:16:53 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362", 0xc7, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:16:53 executing program 5:
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0})
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x8}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r2 = dup(r1)
sendmsg$NL80211_CMD_SET_NOACK_MAP(r2, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x7, 0x2f}}}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x20}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
[ 1349.239413] FAULT_INJECTION: forcing a failure.
[ 1349.239413] name failslab, interval 1, probability 0, space 0, times 0
[ 1349.240290] CPU: 0 PID: 12595 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1349.240858] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1349.241427] Call Trace:
[ 1349.241621]
[ 1349.241791] dump_stack_lvl+0x8f/0xb7
[ 1349.242091] should_fail_ex.cold+0x5/0xa
[ 1349.242402] should_failslab+0x9/0x20
[ 1349.242690] __kmem_cache_alloc_node+0x5b/0x400
[ 1349.243033] ? call_usermodehelper_setup+0xa9/0x330
[ 1349.243408] ? __pfx_sprintf+0x10/0x10
[ 1349.243709] kmalloc_trace+0x26/0x60
[ 1349.243997] call_usermodehelper_setup+0xa9/0x330
[ 1349.244364] ? __pfx_umh_keys_init+0x10/0x10
[ 1349.244683] ? __pfx_umh_keys_cleanup+0x10/0x10
[ 1349.245034] call_sbin_request_key+0x632/0xc60
[ 1349.245403] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1349.245774] ? __pfx_request_key_auth_free_preparse+0x10/0x10
[ 1349.246200] ? key_instantiate_and_link+0x38d/0x4a0
[ 1349.246579] ? __pfx_key_instantiate_and_link+0x10/0x10
[ 1349.246973] ? sprintf+0xc4/0x100
[ 1349.247274] ? request_key_auth_new+0x6ef/0x940
[ 1349.247631] ? __pfx_request_key_auth_new+0x10/0x10
[ 1349.248014] ? refcount_dec_and_lock+0x36/0x150
[ 1349.248364] ? __pfx_call_sbin_request_key+0x10/0x10
[ 1349.248736] request_key_and_link+0xdef/0x1210
[ 1349.249090] ? __pfx_request_key_and_link+0x10/0x10
[ 1349.249476] ? lock_acquire+0x32/0xc0
[ 1349.249767] ? key_type_lookup+0x1e/0x100
[ 1349.250087] ? __pfx_key_default_cmp+0x10/0x10
[ 1349.250436] ? __pfx_keyring_search_iterator+0x10/0x10
[ 1349.250830] ? _copy_from_user+0xf6/0x180
[ 1349.251155] __do_sys_request_key+0x21f/0x3b0
[ 1349.251500] ? __pfx___do_sys_request_key+0x10/0x10
[ 1349.251890] ? syscall_enter_from_user_mode+0x21/0x50
[ 1349.252275] ? syscall_enter_from_user_mode+0x21/0x50
[ 1349.252669] do_syscall_64+0x3f/0x90
[ 1349.252962] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1349.253350] RIP: 0033:0x7f1da7f6db19
[ 1349.253638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1349.254898] RSP: 002b:00007f1da54e3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9
[ 1349.255444] RAX: ffffffffffffffda RBX: 00007f1da8080f60 RCX: 00007f1da7f6db19
[ 1349.255954] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0
[ 1349.256453] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1349.256949] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1349.257470] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1349.258008]
13:16:53 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
capget(&(0x7f0000000100)={0x20071026, r2}, &(0x7f0000000140)={0x8136, 0x3, 0x9, 0x8, 0x1, 0xffff})
13:16:53 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[\x00 ', 0xffffffffffffffff)
13:16:53 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x33fe0}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:16:53 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 49)
13:16:53 executing program 5:
r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x20200, 0x0)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x101, 0x6, 0x4, 0x52b, 0xfffffffe})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:16:53 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,h', 0xffffffffffffffff)
13:16:53 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362", 0xc7, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:16:53 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,L', 0xffffffffffffffff)
13:16:54 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x8)
r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00')
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lstat(&(0x7f0000000380)='./file0\x00', 0x0)
r4 = getuid()
fsetxattr$system_posix_acl(r3, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{}, {0x2, 0x0, r4}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0)
r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00')
pread64(r5, &(0x7f00000000c0)=""/94, 0x5e, 0x2)
r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000240)=0x6e, 0x80000)
mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x161010, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@fscache}, {@dfltgid}], [{@permit_directio}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt}, {@measure}, {@subj_role={'subj_role', 0x3d, 'hugetlbfs\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'hugetlbfs\x00'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fowner_gt}]}})
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x220)
ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000006440)=0x0)
ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000006480)=0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0xa}, [{0x2, 0x6}, {0x2, 0x1}, {}], {}, [{0x8, 0x2, r9}, {0x8, 0x4}, {0x8, 0x2, r9}, {0x8, 0x1, r9}, {0x8, 0x2, r9}, {0x8, 0x4}, {0x8, 0x0, r9}, {0x8, 0x5, r9}, {0x8, 0x7, r9}], {0x10, 0x7}, {0x20, 0x4}}, 0x84, 0x2)
sendmmsg$unix(r3, &(0x7f0000006600)=[{{&(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000580)="db48846ff800763563d8504ffb55d85f710b162398babd5f97018c09470fee7378f7daff2fbe766e8c037e0116d4285e953c668e7e3195931a9a4f2a8f9bf9a6d839b762a5e2e3a0004ba6c6a7ceb6010b289b7596441ffb2e8f1cfe7f53a120fc079ab4807c45c6f744", 0x6a}, {&(0x7f0000000600)="f30ce259ceea367172952bf74c1c38fe5238a51511f09602a8d6dbcbd2eedbc03a16994e44967bf302d13398f86c3820b2d6b48eb95c8b0915a64531b3220a0f7092430af55f297d07733ceb1c4807b2e5709511610d6429b2299299d0c60a7de0a867ed1a5c453151b3241dbee3339b12ff2bd26807e0ea4d99a0b11e9b1e134f6823c95bc0ec3407af5ac847b92f60724cba1e567d21d2bc4ea298e3274aa25dbe692aed541d61b08f72c6e8c0a686ea", 0xb1}, {&(0x7f00000006c0)="bf7026c6e0d05b7610a099a74ca745c7ab560b28ba964d7285a8e7d1a2a2f1c71b203e2a1696536b57d93f34cf2d67c00db7f0191c7de0ea1ac7c70bda020a7bb7a7cc0d5c00e50deb0aac3aa6e783a37332d5b2cce8299f6e48ce64d485e7e4dc9de7eef469ee4a6fc7f465d4a47969ffa747c975933a526a25057d648a087b0da43851", 0x84}, {&(0x7f0000000780)="6ce7965cd84ba9e9893d0f930bb9c57df0e030992a4bf51c7b2939e55348ea4e2f517ee779a9fffe8b6518e6a8f1f455143a6541a3e9a2a2d925f8c1a50b490a5e3cb620ebe40ca47d180c8b648abdf52d1c1929023e6ffcc8ab762880b323655a3723c4dea0a7cb1ae1e1bb1d94830b4153556ed3d741ee371c34af", 0x7c}, {&(0x7f00000001c0)="83a677220af9960423c6a3f4e3aad4a82c798d4fd59e92ad46576dafdf5134cd559b73b0fcb9e9fd", 0x28}, {&(0x7f0000000440)="62846ec9db0c42a035f651d63a08af447db0f08f52e0b93b69c31ce339731692", 0x20}, {&(0x7f0000000880)="cabc98e79af552bc28195f7a7d726293293a742d1e6f5fa28c321a234a6b1c18838883889a9956905e7b7cb220614d29ad169386f930ccd33366963016833b7d70b65c0b89e615b0796ca5f123f28f0f5080bdc1a1bfe28c372e4fea6660aa57e873e29b4c8a7c39b14f140f7cfb1a8e7ecdc0270216257cba82f1e66fa0ecc4773fe203cb75", 0x86}], 0x7, &(0x7f0000000a00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, r0, 0xffffffffffffffff, r5, r5]}}], 0x50, 0x1}}, {{&(0x7f0000000a80)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000b00)="b5080c97fdb96fc424e147a56dac3e7b0e11fb1d3f13e9d0f3443b8417400f355ee21e88af9aace474562802ccf7460278c85848d2641f1016db2a8721f86f327605ecafe61cc5612e68cbfd6f6f070272341af08797499810f6784363ed673cfee7", 0x62}, {&(0x7f0000000b80)="ebeff13554624bbf", 0x8}, {&(0x7f0000000bc0)="cdc681026333e44ed7147729ffed91e1158f95d5d970c313f5c9d74e5d162d1aea9b5341019850bfa10dd908351a7703eeb391d1c27b20a3b8f8c2c0330d3ec9be79aca80b71abec70457bd4f1df3d574cba78204a8f6e78042e16bbedeba3c7eae6e3b8bc74e03cdff8b0d6b7ae5930e675210a4bd12c1857489202d2b7f1040003a67d7c100f40a77a38aa969ddfc8feac3977cd17e2b69e674358a67d4e4bed02ae7150f0902781f0667fe6ae2cecf087dbf4069170ff81cef1ad6d8e9778726b8160bd0423e1cd4b1568", 0xcc}, {&(0x7f0000000cc0)="443ca7b86ecc4a69717abf146df1f7c6589e021a74fcf081802e04b5af5eec5bd500b84ece57cb65d96b0d4e465398ab6557eb8a65f6ea42eea7715264c158ac44b7a2eb9f492686339e7c270e0716830c4ebbd4d5ee0cc448cc19f58773c5d06239569b1281681dbef61067f0429ff20f13f30cadff3f55b7daf0b0f5cf41fdd42631a8f5507615d9f4b4213804360505ea44e3eb2254863e35c91cd550310855879cc2041cc1cdb4d83433f0ea9ab2b4a13a7418c3994dadc38e7efff2693246101e262b959b3b902be0efd2ce771a2af6431f2aa2ba70b47553d42efe4c8be3e0db094fa8dd", 0xe7}, {&(0x7f0000000dc0)="7876a8ee9685a6363bd59679f4d0b5e29d51d7e0d1c4a356909013ce420378fedc1dd5f3d59c423120b174358f8abd25c6567b52325a7c60ab99172e6cb5a56275aa235b9c676ae7fcd58ee1419c581da792668763ce094875733a00a2ceb645d0731f5c085a250d0feabd0469369c0ec80449067648fa113b6bbaf1b36df3b0981664f77bc84397534622aaca012db56e54cbdda9dbf1f77f711498ee318b0b3d3b6fc5df0dca9ba7340b2934c5eded6cde212595181a95801abc5be5677c070c187aec7e4bf3f1dadec49c6d806fc2b23d680b629da167320c3693e33c06a6854fb20d3132f0bfbd", 0xe9}], 0x5, 0x0, 0x0, 0x20008000}}, {{&(0x7f0000000f40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000010c0)=[{&(0x7f0000000fc0)="19a11475cac493c5c3881965dd994e2d5648c66c1c58452168a60d28fe75a0238fd1d6c5a6fc0d0c24de82abf33787b373d29d9aee6a987f8b18462925681efcf9a07e477e0f1cea07be943696c9f590d1888958f1c3f1dc1f52401d270f5500f41edc4175c9d6313e23849b025a3836a9444d97ccc57eb7086ddab15c2236f641cccee7fc2cb067aa72349bf7664774515351c8fbe6219eee0fa46c3b03b5a864890f32dc81e567fedbddd9fc5ea1fdc87224c46d87477d31af67636a157ae637a9", 0xc2}], 0x1, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4}}}], 0xd8, 0x80}}, {{&(0x7f00000013c0)=@file={0x1}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001440)="9a376948d2500d662969fc4331d91160b3e96920bfe4f03e34932528a497353dc5ed117714e51436107f11785c17a7d5f651de43a3aa9b3a39e84a8f2c8c174dcd752aa689b618a29803ca44aacb87b4f992e4673b1afee2ccbf84dcb86bf5", 0x5f}, {&(0x7f00000014c0)="1c18319f4f9cc259883ad017c99438498aa9f2891f2c12f1629d77bef98e92dfc30e3858992d80ed4918fc7b104ad7fb923636b632aab5adcc8eb9c7ddd421a2954b2b6fcf460855c11e6c535d51b6ba39404ab00328cf4d08794bdbeb001f81219ffecfde566d52169ea5301bf36affce98f4e6d50d5b594e085f53796bc29005c05f7cc3ad2fab7f810357", 0x8c}, {&(0x7f0000001580)="e1974c3d6a94e807a1d7b5c441754fd41cdf0fbed98614f6755bff6d65820710ee234fac42dfef0f63ef867718aa85cefdaf1eea1b9c81302c123339a2b36c603e4dd130b79540cfcccdaf9426f4b367b9ee55e58c042a0234a5aa5edc1c92fba9240632ca2642252c71004e258b67be61ea25c468b1e9712c09ec05fdd19495cbad6dd8b1ab998f01fb3a9bf2ab3e5eb10909de47c2d34f7c895813d49aaa9b79db3157630c25c1ccaa11f4145c09bc0a1a80d4970fc7c343f6f196d0e9bb84e21f184165d9d9a066956a25ff1dbea5d5cae3443c1874e3f1deb0f065e12f7184f6", 0xe2}, {&(0x7f0000001680)="65c17966f387c3db206d7138b04c475f4817c9a6f7dfa9e2669a748a144a56e5872c2827a41af47011c4ad1ee33feda7605998", 0x33}, {&(0x7f00000016c0)="8728f0ea4baeca1bc7e80d436e91a503dd454e631993d124718b5e983f3171271948ca19e639bf9649580edfeba8a4ed0529dbd68c29229f7c6543e4d12c4c6cc64bd693f98051097d2ad7c92a4cd8d40e203bb6c964f1f7573f3150ac2270a2da5f853f512882aa0ab5a7e57c9654ae833a3b9782a742c252ede8bb18a0795752", 0x81}, {&(0x7f0000001780)="8f3df4acb37981fcbc9a0bb5e42b22681fc51f65e87006a5288b1154dd7cc9559ba071559bd37adb874820af5c8cbb2a47a1fa50b891029c3229a16582ef9456082f7ebc6d64682b65458e556ee9f4740f35932fa3ad60e5afc27ef003d425f868036fe702790afec59635b1a686b6873d0ad540b9252c9081ea46106e52c1c77fe75e2df0f0cf30a6a174755d72290f6c6c4dc8eba53e7a95842f4b34f938b963e8", 0xa2}, {&(0x7f0000001840)="4799b9f18e3ad07a93b48c", 0xb}, {&(0x7f0000001940)="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", 0xfa}], 0x8, 0x0, 0x0, 0x4000080}}, {{&(0x7f0000001a40)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001ac0)="557a40dc9b6362076a6ae647b02a693a9e26e5587af557f8", 0x18}, {&(0x7f0000001b00)="5fe4892a8b89f541e07611252a98cf6e7124c3c230849eca8efd9790c4d486217fb67ccfb82c0e33c5f86ff5d8beccffe4d552165953daefb1ad870f041181cfd10936538acdb88782033b2391605e5e4e423c66beffa835af3931d0eb643239815d3eb860e8c4a3f838b861c1ea1f42321784b67f20d0bc2ffcbdecd6862bf452b3a381cd4c72b3550e4f4e5b9956fcadc4aeb1efceb4798274d71f17f8edc815626ce4583dba89db65addba7", 0xad}, {&(0x7f0000001bc0)="f6977dd75ba4e219971b063808d234caf7b0dac04fcfb2b1d027935c0f5d37167a5f790fc74b4dcead61fc36ee2f5224f9", 0x31}, {&(0x7f0000001c00)="6a69696b33eb00f076312abb19ac3ff470d91cf9", 0x14}, {&(0x7f0000001c40)="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", 0x1000}], 0x5, &(0x7f0000002dc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r4}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x88, 0x48000}}, {{&(0x7f0000002e80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003280)=[{&(0x7f0000002f00)="86491fca54a8333c117483aa8a25ea6ace040bf5939f56910cc03efcda75d13bf563b736492a3b8007c960ea61b662da54a45f2173390f85fe93544b172f4c32f3048dabc7bca833da491cdfa89a349854754b8de624bc41fe104331aa7c583c73856ab8d40f41d6123c66b51565b2ade7359aad556367d83ea345f063f7b7f75442d13a8fbce277ca5b71b44ab1b17dbb346458afce193cee2c321df6ea93fd9c29b04d0c482a0ba37a2a322318c6d9f947c0470feeca6f8eaa95241bcb4e1dc53aef843dd4c18dec", 0xc9}, {&(0x7f0000003000)="c20991070d85db68ff0def13c794974b95f57ec0c625fa1256716e0859ad6327d2b69adc0ca2e8e290bb6685ab40c604ed46d4a9967877f791f7834704c6168c48b4b0941ab5dde0e8d9730026ac4d23a8e35753c140b50e023b7832a96354debffd65fdd589b26158c3218230b0e87e33b525dbf66e6840a548591e39c9563a377902688f6720f605c4c5a803c5918cda5510b846f29b2eee4dc4ba228f54f967069c48376aa982a1c3b2bf42fff0b631fc99c639043f68687d6c1ea6b1380482ca86b089835bc280135665a1ea5d973ed7b774", 0xd4}, {&(0x7f0000003100)="acbdc8aa4c485ba1332ee8d36ea2c9e58149fe95152c0bf0", 0x18}, {&(0x7f0000003140)="3f17bf21fd996c7cd0bc63c6c9b9d0ef8934f4f3b1fb5f0e68507098b08389", 0x1f}, {&(0x7f0000003180)="47c88376ba63c088ab0efa0c7b9d5967655d68b4004d1b2801fc4f2b256e546684729917a11b05b81cbdd7294a47bc945fac2a29a04602dbe2785b0d1b1dcc50bb178f688154fee858c4d0aeb64a99228970925668ff314e022387d3b9cca3b09ea3f0dc2ae8cb2b95e921b0b62c74085b7d8290bc5b6e43b47badde5bce4289b1ae31759e3801d71d86701bb2c4c0debd52e82fcd44ded17b608c2e6f394291abeea1f3addd44ba88a3e9516c93d6ed6a9926b3a177036bb1fafd4f33cefc79b5", 0xc1}], 0x5, &(0x7f0000003500)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, 0xee01}}}], 0x60, 0x4000001}}, {{&(0x7f0000003580)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000003a40)=[{&(0x7f0000003600)="a6d87c8e40072268dd70f805f440a552393ee68ad68d939babc4bf91303ee39d2bb22dab07e35b6d72776f4e6bcc434fa8e0090424757184dc7137a614f04492e012c743f63ce9275632d1cb63d577d0edcb2f850a9ea40eccfe14db259a868e5872fd5903db4225d25bdaf8a5b8925d7bf5f92dc5d18c324eb547bf97d23857c6a6b7fd8c8f40a4188249d48d05a65422b0c9daa2946bcba2cce04004fb60bd4a07d4", 0xa3}, {&(0x7f00000036c0)="b3678c4de24bf086df13e8681357be9bcdf935fd83044533cc682a08627b05e4c9de1698ed05422459c99ef9c039024e016e06a4c0491d48348c6a0282f193356fd4a99ca23f8973a5448c93927e288913022a2bbba7ff7902f036973a7bac4409451840da72c47b241c6119c2cde9205e0f84053368ffbca36dbd5d79f412061b3963d1874708ee44f9289d029fe886a45601845d7c05f9805534a46ae2cadb11d3f3f303dc97567f1090246f27a24ca586120d95e745b7c3874a1c759c5500516d698549d678b3ce568603827d1ef22a415638f829ddb5a06aaa60", 0xdc}, {&(0x7f00000037c0)="1735b931334d9ef8e3b18634860c00111fb505430166b014c3055e369002aa1bfdf125729975defc69f49e831fa86f10691d8797ccb162316ef6604a4f29cb61f603cd70a92de43dac13e0b5f5a7e00d994cd67912a54029ff710ff077573fb099ff84747e7d67affb7a4edb5081aa00bd30b9b006e07e12c653a4cbaf2f274eaaf40593815cc319cfd1bab2794ba21fbf0737120effd671d1c3240b720488a6367185c607", 0xa5}, {&(0x7f0000003880)="b891d6875df2ba17249834b3c6aea0303e21cee267c4c9b27f1b592fd75f267ee79d8c295fbefd5dff7a72db67c216fa05f925e80db3af2fc5b483f70a138a28ea0afcc531a64c29e99cfd3129167a145c50fa08b3ae8960795f9cb8c68764f62005484bb46431b0179b112b68da628e3c759298fcc9023dfb470b3815cdca858b93f32966150c49c00bbe2487749a7982f84d108079ab4a538ef0e271c4571ac3cb7155437cee9ced285183b869c4b77604d9866df3336f4e3e6458c2e63246d05394c0b952fad31c64a2", 0xcb}, {&(0x7f0000003980)="82630fb9c556b0b4fe86b325bc079251d005f2da3b0dde07edc31ba32a031786a2f7e538fcc314f45087e89e1dcfff1442fbca9b611dcbac06d7a7a4772a87519fa2ff45fcd90a4e86ef86f942d056053814d582ae6274e5ec52c5824684eb7f5f9f80d7d42364db6b41674592b3b6d987911e225b3fabda9dd08dd438892a731247cb58c75a3e26b9524522ffcfb9711f69595578970a53970f05d0612116438d5d767639edb6972f0dc2ea8f052e4572b80d4d06b708236b4ee2825919ce", 0xbf}], 0x5, &(0x7f0000003dc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r1, r0, 0xffffffffffffffff, r6]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r3, r5, 0xffffffffffffffff, 0xffffffffffffffff, r0, r6, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x118, 0x4000}}, {{0x0, 0x0, &(0x7f0000004080)=[{&(0x7f0000003f00)="f9d06fd0b350d63af2a282ba73a635cae04a101d109a17414104c1a86df8fae9fd419649604fac0f702a1219b6c3f9b8de1b580eb7f36a27a200eee822e1c5d6183e845717df73cee48cb16037d3b763595e818d46a9caf3b23c469d77f4bfe74d4ed4e3e14e723c2a410a02492f43d46b12b7a1cfc1fde945e970404c2269594973826577651371f7b6d92cde0f3d1d5b19576644b4fbee19933246df667986b8626bb06416dcf839c2ddb0a7d0070b2a8691dd16ed525b9fc6cc", 0xbb}, {&(0x7f0000003fc0)="7af49fca5b34516a5e64c37dbe101a372a1dab18a85a042e98a6cb68d0fbc52124d3d6259ba4f25556222d4f2e8f822cf76c513ea752172a76395f424711d78caa8a135fbdcb91c64cd344b0eb9e43057bc1991f91ada034e33787d3a177ff2ce7bb906db16a9f2d29e17e1dccff0e2da2941fe7bea035c3c026a887c7e08c7c60484d4df8bdab9fb350d8c04acb335d5777c2d3cae4b7b798a12098ab", 0x9d}], 0x2, &(0x7f00000064c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, r4}}}, @cred={{0x1c, 0x1, 0x2, {r8, r4, r9}}}], 0x128, 0x200000c5}}], 0x8, 0x40800)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000001900)={{}, {0x1, 0x4}, [{}, {0x2, 0x5}], {}, [{}], {0x10, 0x4}, {0x20, 0x5}}, 0x3c, 0x0)
13:16:54 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff) (fail_nth: 50)
[ 1349.725652] FAULT_INJECTION: forcing a failure.
[ 1349.725652] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1349.727299] CPU: 0 PID: 13030 Comm: syz-executor.7 Not tainted 6.2.0-rc1-next-20221226 #1
[ 1349.728357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1349.729381] Call Trace:
[ 1349.729755]
[ 1349.730072] dump_stack_lvl+0x8f/0xb7
[ 1349.730627] should_fail_ex.cold+0x5/0xa
[ 1349.731212] _copy_to_user+0x2e/0x150
[ 1349.731744] simple_read_from_buffer+0xd0/0x170
[ 1349.732415] proc_fail_nth_read+0x19c/0x230
[ 1349.733010] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 1349.733687] ? security_file_permission+0xb5/0xe0
[ 1349.734373] vfs_read+0x257/0x940
[ 1349.734879] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 1349.735540] ? __pfx_vfs_read+0x10/0x10
[ 1349.736116] ? __fget_files+0x270/0x450
[ 1349.736700] ksys_read+0x12b/0x260
[ 1349.737199] ? __pfx_ksys_read+0x10/0x10
[ 1349.737765] ? syscall_enter_from_user_mode+0x21/0x50
[ 1349.738451] ? syscall_enter_from_user_mode+0x21/0x50
[ 1349.739182] do_syscall_64+0x3f/0x90
[ 1349.739720] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1349.740415] RIP: 0033:0x7f1da7f2069c
[ 1349.740923] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 1349.743226] RSP: 002b:00007f1da54e3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 1349.744239] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f1da7f2069c
[ 1349.745196] RDX: 000000000000000f RSI: 00007f1da54e31e0 RDI: 0000000000000004
[ 1349.746165] RBP: 00007f1da54e31d0 R08: 0000000000000000 R09: 0000000000000000
[ 1349.747116] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002
[ 1349.748039] R13: 00007ffce996732f R14: 00007f1da54e3300 R15: 0000000000022000
[ 1349.749029]
13:17:11 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x15f)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xa4)
close(r0)
execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0)
13:17:11 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x02', 0xffffffffffffffff)
13:17:11 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:17:11 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362", 0xc7, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:17:11 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,l', 0xffffffffffffffff)
13:17:11 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:17:11 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,e', 0xffffffffffffffff)
13:17:11 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x8001, 0x3})
13:17:11 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:17:11 executing program 4:
syz_mount_image$vfat(0x0, &(0x7f0000003d40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004ec0)=ANY=[@ANYBLOB='nfs=nostYle_ro,\x00'])
r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x10, 0xffffffffffffffff, 0x0)
syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_WRITEV={0x2, 0x3, 0x4004, @fd_index, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="b37fe1ba63b4cd868d7e18f71429cf6a69ee3868932c0f3049b51765abbb8e0892b4d6e9fe85f8e603d49e7ecf05d14e49e4a9764fee5a5d50430ca1b15f0215b752c652a3b41901eb096bae2dcb5723961745ef5f055b8f7a017e3ef8cacd33c59d9afaef81882e69a095c639b4b3ffec04678520b340a550448105d61db059f07a21248fd6b066f3aa54c92c183453b7bcf59e44bbbc290fe8595ee64f83f3ce3ccf3979d35f", 0xa7}, {&(0x7f0000000140)="aef84baf6bb7bc4019b51dec68219888659e4db9790e47e4c90d628ab285b9bfb4185038b465ea2e1325bbb781e04279fb5b", 0x32}, {&(0x7f0000000180)="f61078f4dfd8a18c343a77a043a2d58a9daff7528379ae0426", 0x19}, {&(0x7f00000001c0)="99b3a71c5cfa48468cbe0e9273bcc2e3e6db667ec2a69cfefc6c2a", 0x1b}, {&(0x7f0000000200)="dfba20d4a7b0cae988bc661584e00f432ff64e805ecb2bac8a837e24628e112ff491d263eec820d903aa5782f7057db82f44bf1bfb52c2ff2a84abd640fd0fbe9eb542409ff7918bf65c1318b11a4cd0f05dbdc7f093e578d4c5354a4a442fcbfee887dec69e24a24a53d5db1cb2e1fd7bf1e3517c5610ff36f063457a1a91e006ea5b29adeb556dd63efd2e095e0da269882110fdcadadf86c4ab8a244add9eca926e1be201221b4a600b6544fea70b1b81c7b0e8934bbff40b4a5e068df0142c2713c531b3df19a8467e88a7190d41", 0xd0}], 0x5, 0x0, 0xa1817c9ad9627c3e, {0x2}}, 0x9)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
openat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x100)
13:17:11 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,h', 0xffffffffffffffff)
13:17:29 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,l', 0xffffffffffffffff)
13:17:29 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000100), &(0x7f0000000140)=ANY=[@ANYBLOB="00fb150323c7e18b5bddd800"/21], 0x15, 0x2)
13:17:29 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x03', 0xffffffffffffffff)
13:17:29 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:17:30 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c34", 0xd5, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:17:30 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:17:30 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2c, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x1}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x2b}, 0x0, @in6=@empty, 0x3507, 0x2}}, 0xe8)
sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffff}}, './file0\x00'})
r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000100), 0x42100, 0x0)
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000001300)={0x0, 0x79e, 0x5})
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x20010, r1, 0x0)
sendto(r1, &(0x7f0000000300)="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", 0x1000, 0x20041000, &(0x7f0000000080)=@ethernet={0x306, @random="9bd94d503c0f"}, 0x80)
13:17:30 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,t', 0xffffffffffffffff)
13:17:30 executing program 5:
perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r0, 0x0, 0x220)
clone3(&(0x7f0000001340)={0x80020080, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x30}, &(0x7f00000002c0)=""/44, 0x2c, &(0x7f0000000300)=""/4096, &(0x7f0000001300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0], 0x7, {r0}}, 0x58)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, 0x0, 0x220)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000013c0), 0x40a00, 0x0)
syz_mount_image$vfat(&(0x7f0000001400), &(0x7f0000001440)='./file0\x00', 0xffffffff, 0x8, &(0x7f0000001ac0)=[{&(0x7f0000001480)="c368e68019fcf57574c7fda148e037df64a6d76da34c4ac59661c0c22356c834bae15dae1617528fd23a738a990f00babcaacb575cf3788f29392c074737fdf6c6fa4506035614bc0e39f97242a7ff4819cc67472b69a7738cad89364713fbd5bac0102af9b6296a06168a2ab256449de4b23cfaae4a3b627224942e6b3d6486330a67351b64a38afe1361fd9a1c49759082679a106966d1177f7113e36257071280555d611276110809b3c41b4eea305354883cee34b87e6b524c036c4db2616ce210cf8b2b8eb74837055f7e7229ae7827ed364f", 0xd5, 0x100}, {&(0x7f0000001580)="7b5fb535a15b369571ab7a9db46e759b", 0x10, 0x9}, {&(0x7f00000015c0)="ac4fbe36f7fb83ae1ed95d2dcc956ad8df33235d2b9c8a2d73df33ad1fd6e7f05c9bb81761ebf5323200c506867841aed5ebf5b2cf1e409a33c12d72f1f6f0623223350fd7ec7b17c109302ce3f1191fd74fca1438f52b6db157676ccdc6d033e853dacc71157cd74bf56f89ea860576aaaf0a190ab0591e8b03fc4b2e1f48f8e44f6a004ede4bd9ab638a1cd212aebbc52f686eaa5680d0a9f7d33d1df0cdd530c4a9a5b064ad910330db67dde3c5f4790fdeb9c97e4b8985c452fd385a47d44a3b71f383e79bd0e58175289cd7bd910ab8b00582f4a53599ad2e984a3a0a6b9e17367476a459ca6321", 0xea, 0x1}, {&(0x7f00000016c0)="354e2b5477538ff1199093258ea8bcc35a5e98b54947ddd3", 0x18, 0x5}, {&(0x7f0000001700)="60144b0ebb7ad22e1b61a15f7a44537f5958e0ba0341f8c3e529c4146f00317b05c9f7ec95450701c4be91d514ea54ea90459a71c3f6819257febc19eeb226fb85d70fba4896e4c852a5203e0459a53c1a14e2e87451db5b9e861bd0524de0cd295ec7a2ca125e5c0f2b5a1660572a51c070466cd9cdd4afe6c0bedea8dd35604b7421a574d9775ada652034e8296ea2335458a19ab29db8ce9fbece8323f424e9edd2e39e23a654904b4aa8cf240f2e9bec9b8b42ffc65e855a7e120e6254fefdb442877dad9af11482652865978508cc6c2ad599b05fe39920e139ff80566e0f281649d5743e7514d8b1", 0xeb, 0x401}, {&(0x7f0000001800)="9c675bb5e6f92c11e983efbb33d563684c796595c8030c06ed194bb4a3df7f9e5abfe720e07ccd83704ad07f0e11a118bf62c06bed93a1ec01a55091d698ac1efe396f187d2473c7767021e95c3cc03726316b1cc151fbac10cb9dd34b440e07b6cb4402a2afd3ecd46f32846f3e710e84ff7f4e3bd1343ba6393e3d68e275298dc044915dd531e08fa106ff3db522168a1a6708711432afd5994067838083f991eff038640a920325014846f2fd689097c61f4f0f350b8c955457dd78c3b944f81afbf24a00d4342ed49ab9dda6", 0xce, 0xffff}, {&(0x7f0000001900)="ad32575b384d68b59066c88745559e9f373a14524b3735dbd42b198108db6d5eff29cd568733b9cec6ae830542a6f0408e50edacc6e898a2164ce8f1e07a38f7646b30583af7a4c8e74fe7494b173d2ca9deaaaa556c54e4029200f481cd0f1518be7ab56e96448517bc192d238cd754bf2870f868c725c3009651c861320db899551f2ce544bad475816d0f3fd573b6d70990b6fde89752ca8189f95f63430f4e3128ee8c", 0xa5, 0x3}, {&(0x7f00000019c0)="6478ffe5a33bd8b4430660ce0a6e95c1094fefaa46cbe38c9645d727e50c0badbf062e2d2062fb94c63f933bcc9076b843de8449965dca3e635ad4e6dde27221bdd62b065dd97521803b4065835657770a1da417348c58255b292412df730f4c041220604e8b67b7a6ad6f0e2969de2361aa75d38861a9b7869f8fd77687c9d150a79a3be1231ef13f74069c6de954d8968df0990fb35f1c48b28323e5151246763bf84b05c7c02f55ee392c4694e9d95ece7c65914064b277c297297db3f2e38ea1", 0xc2, 0x1}], 0xe0484, &(0x7f0000001b80)={[{@nonumtail}, {@shortname_win95}, {@shortname_mixed}, {@iocharset={'iocharset', 0x3d, 'cp865'}}, {@fat=@time_offset={'time_offset', 0x3d, 0x22b}}], [{@subj_type={'subj_type', 0x3d, '/dev/snapshot\x00'}}, {@dont_measure}]})
ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000001c0)={r2, 0x10000008000002, 0x40000000003, 0x75})
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0)
capset(&(0x7f0000000140)={0x20071026, r3}, &(0x7f0000000180)={0x0, 0x3, 0x80000001, 0x9, 0x20, 0x80000000})
13:17:30 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:17:30 executing program 4:
r0 = socket$unix(0x1, 0x5, 0x0)
bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e)
link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
listen(r0, 0x0)
r1 = socket$unix(0x1, 0x5, 0x0)
connect$unix(r1, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e)
r2 = socket$unix(0x1, 0x5, 0x0)
connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e)
13:17:30 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:17:30 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,z', 0xffffffffffffffff)
13:17:30 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,t', 0xffffffffffffffff)
13:17:30 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x04', 0xffffffffffffffff)
13:17:30 executing program 5:
r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/i8042', 0x410201, 0x146)
sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3f2, 0x1, 0x70bd27, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x90)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:17:30 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:17:30 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x3}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:17:30 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c34", 0xd5, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:17:46 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:17:46 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff})
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
gettid()
sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3010000}}, {{&(0x7f0000000000)=@file={0x1, './file1/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0)
13:17:46 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = socket$nl_audit(0x10, 0x3, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0})
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'})
ioctl$sock_netdev_private(r5, 0x89f0, &(0x7f00000017c0)="33a9a38919044b4ea4821e4925af8f6a949d97e720f4c061d86d2e180688ac16c7e57743decf2e2ac49cad466ebabb184809dd3360bc2b98a5e813743ca486bed2bf70c4d4acca31380f28a02f715327638ede1a6bf95477ac3ee33242a8fbe543d24e5ed446")
setsockopt$inet_tcp_int(r4, 0x6, 0x1, &(0x7f0000000140), 0x4)
ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000180))
getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000100)={@local, @empty}, &(0x7f0000000140)=0xc)
socket$packet(0x11, 0x3, 0x300)
accept$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000200)=0x10)
13:17:46 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,\x05', 0xffffffffffffffff)
13:17:46 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='%{!,[,z', 0xffffffffffffffff)
13:17:46 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x4}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:17:46 executing program 6:
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001b80), 0x0)
syz_open_dev$vcsa(0x0, 0x496, 0x0)
socket$inet_icmp(0x2, 0x2, 0x1)
r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xca, 0x400002)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="6acde76c5b7c562ce79ff0924e2c483315d6fd555e72c453c6b0a668778ff8a151bc8f8417c98527710da69ca1311585912c0adf87c4d879db92d8bd6adb497c2cd62e0aa64455d80b2dc9636500a315e6d41146f9c023cef101088b0b1f95b429be8dc2e47e3439ace86a3e970ec09e9a8aa3a47e7690fe157905cab7c2b96cff513db332a473f7a028a617509f04000000ccaa86b0f57a74f25c8dd0a493f72c000000000000000000000000000bc4017efbe977fa0f65981b03bd7e55f8c8845fddc8a8c362b5fa80e49329b658f7e79c329c34", 0xd5, 0x2000081}, {&(0x7f0000000000)="927bb337b1d95611cf1efd33e79a2cf0dfa9eab2ec3ff944792687d986807082dd8fe3", 0x23, 0x6}])
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'})
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa)
13:17:46 executing program 5:
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
13:17:46 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r1, 0x0, 0x0, 0x87ffffc)
r2 = fcntl$getown(r1, 0x9)
perf_event_open(0x0, r2, 0x0, r0, 0x8)
r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7, 0x80, 0x80, 0x3, 0x0, 0x0, 0xf1406, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x9, 0x100}, 0x10108, 0x0, 0x2, 0x9, 0xffff, 0x1ff, 0x401, 0x0, 0xc2, 0x0, 0x10000}, r2, 0xb, 0xffffffffffffffff, 0x2)
capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040))
r4 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x8000)
ftruncate(0xffffffffffffffff, 0x1)
ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000001c0)={r4, 0x9, 0xa5, 0x4})
syncfs(r3)
13:17:47 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2, 0x5}, &(0x7f0000000240)='%{!,[,\x00', 0xffffffffffffffff)
13:17:47 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff,