000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 14) [ 1743.234267] FAULT_INJECTION: forcing a failure. [ 1743.234267] name failslab, interval 1, probability 0, space 0, times 0 [ 1743.236506] CPU: 1 PID: 9866 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1743.237709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1743.239171] Call Trace: [ 1743.239634] dump_stack+0x107/0x167 [ 1743.240276] should_fail.cold+0x5/0xa [ 1743.240950] ? copy_mount_options+0x55/0x180 [ 1743.241740] should_failslab+0x5/0x20 [ 1743.242413] kmem_cache_alloc_trace+0x55/0x320 [ 1743.243224] ? _copy_from_user+0xfb/0x1b0 [ 1743.243959] copy_mount_options+0x55/0x180 [ 1743.244699] __x64_sys_mount+0x1a8/0x300 [ 1743.245415] ? copy_mnt_ns+0xa00/0xa00 [ 1743.246096] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1743.247016] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1743.247920] do_syscall_64+0x33/0x40 [ 1743.248560] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1743.249730] RIP: 0033:0x7fc4a8241b19 [ 1743.250660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1743.255021] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1743.256604] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1743.258081] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1743.259553] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1743.261027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1743.262508] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 [ 1743.296711] FAULT_INJECTION: forcing a failure. [ 1743.296711] name failslab, interval 1, probability 0, space 0, times 0 [ 1743.299499] CPU: 1 PID: 9867 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1743.300962] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1743.302773] Call Trace: [ 1743.303359] dump_stack+0x107/0x167 [ 1743.304161] should_fail.cold+0x5/0xa [ 1743.304996] ? v9fs_mount+0x5a/0x8f0 [ 1743.305802] should_failslab+0x5/0x20 [ 1743.306621] kmem_cache_alloc_trace+0x55/0x320 [ 1743.307602] ? v9fs_write_inode+0x60/0x60 [ 1743.308488] v9fs_mount+0x5a/0x8f0 [ 1743.309265] ? v9fs_write_inode+0x60/0x60 [ 1743.310155] legacy_get_tree+0x105/0x220 [ 1743.311028] vfs_get_tree+0x8e/0x300 [ 1743.311826] path_mount+0x1331/0x21c0 [ 1743.312648] ? strncpy_from_user+0x9e/0x470 [ 1743.313583] ? finish_automount+0xa90/0xa90 [ 1743.314509] ? getname_flags.part.0+0x1dd/0x4f0 [ 1743.315504] ? _copy_from_user+0xfb/0x1b0 [ 1743.316403] __x64_sys_mount+0x282/0x300 [ 1743.317276] ? copy_mnt_ns+0xa00/0xa00 [ 1743.318114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1743.319236] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1743.320341] do_syscall_64+0x33/0x40 [ 1743.321138] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1743.322244] RIP: 0033:0x7fbd09fc9b19 [ 1743.323039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1743.326999] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1743.328624] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1743.330135] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1743.331625] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1743.333115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1743.334610] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:14:12 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 5) 18:14:12 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x3, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:14:12 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x5, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:14:12 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x7, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:14:12 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x5, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 1743.533592] FAULT_INJECTION: forcing a failure. [ 1743.533592] name failslab, interval 1, probability 0, space 0, times 0 [ 1743.536231] CPU: 1 PID: 9871 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1743.537692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1743.539445] Call Trace: [ 1743.540006] dump_stack+0x107/0x167 [ 1743.540771] should_fail.cold+0x5/0xa [ 1743.541581] ? create_object.isra.0+0x3a/0xa20 [ 1743.542541] should_failslab+0x5/0x20 [ 1743.543344] kmem_cache_alloc+0x5b/0x310 [ 1743.544206] create_object.isra.0+0x3a/0xa20 [ 1743.545145] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1743.546240] kmem_cache_alloc_trace+0x151/0x320 [ 1743.547224] copy_mount_options+0x55/0x180 [ 1743.548120] __x64_sys_mount+0x1a8/0x300 [ 1743.548960] ? copy_mnt_ns+0xa00/0xa00 [ 1743.549813] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1743.550936] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1743.552021] do_syscall_64+0x33/0x40 [ 1743.552806] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1743.553914] RIP: 0033:0x7fc4a8241b19 [ 1743.554706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1743.558643] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1743.560270] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1743.561789] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1743.563325] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1743.564842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1743.566368] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:14:12 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x9, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:14:12 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x7, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:14:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 15) [ 1743.829657] FAULT_INJECTION: forcing a failure. [ 1743.829657] name failslab, interval 1, probability 0, space 0, times 0 [ 1743.832279] CPU: 0 PID: 9889 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1743.833752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1743.835525] Call Trace: [ 1743.836096] dump_stack+0x107/0x167 [ 1743.836883] should_fail.cold+0x5/0xa [ 1743.837711] ? create_object.isra.0+0x3a/0xa20 [ 1743.838683] should_failslab+0x5/0x20 [ 1743.839496] kmem_cache_alloc+0x5b/0x310 [ 1743.840369] ? cred_has_capability.isra.0+0x152/0x2b0 [ 1743.841484] create_object.isra.0+0x3a/0xa20 [ 1743.842393] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1743.843472] kmem_cache_alloc_trace+0x151/0x320 [ 1743.844455] ? v9fs_write_inode+0x60/0x60 [ 1743.845345] v9fs_mount+0x5a/0x8f0 [ 1743.846100] ? v9fs_write_inode+0x60/0x60 [ 1743.846976] legacy_get_tree+0x105/0x220 [ 1743.847843] vfs_get_tree+0x8e/0x300 [ 1743.848628] path_mount+0x1331/0x21c0 [ 1743.849448] ? strncpy_from_user+0x9e/0x470 [ 1743.850368] ? finish_automount+0xa90/0xa90 [ 1743.851262] ? getname_flags.part.0+0x1dd/0x4f0 [ 1743.852249] ? _copy_from_user+0xfb/0x1b0 [ 1743.853131] __x64_sys_mount+0x282/0x300 [ 1743.854000] ? copy_mnt_ns+0xa00/0xa00 [ 1743.854826] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1743.855939] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1743.857008] do_syscall_64+0x33/0x40 [ 1743.857803] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1743.858885] RIP: 0033:0x7fbd09fc9b19 [ 1743.859664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1743.863558] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1743.865181] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1743.866690] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1743.868202] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1743.869722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1743.871229] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:14:12 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 6) [ 1744.036468] FAULT_INJECTION: forcing a failure. [ 1744.036468] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1744.039052] CPU: 0 PID: 9896 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1744.040453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.042165] Call Trace: [ 1744.042710] dump_stack+0x107/0x167 [ 1744.043458] should_fail.cold+0x5/0xa [ 1744.044243] _copy_from_user+0x2e/0x1b0 [ 1744.045060] copy_mount_options+0x76/0x180 [ 1744.045961] __x64_sys_mount+0x1a8/0x300 [ 1744.046807] ? copy_mnt_ns+0xa00/0xa00 [ 1744.047625] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.048719] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.049807] do_syscall_64+0x33/0x40 [ 1744.050576] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1744.051644] RIP: 0033:0x7fc4a8241b19 [ 1744.052425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.056215] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1744.057826] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1744.059311] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1744.060765] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1744.062250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1744.063739] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:14:29 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x8, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:14:29 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x8, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:14:29 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 7) 18:14:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 16) 18:14:29 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x4, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:14:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsu(0x0, 0x0, 0x8000) syz_io_uring_setup(0x2ffe, &(0x7f00000003c0)={0x0, 0x2c22, 0x0, 0x0, 0x321, 0x0, r2}, &(0x7f000054c000/0x1000)=nil, &(0x7f000033a000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000440)=0x0) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x20040, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f00000014c0)={{0x2, 0x0, @remote}, {0x308}, 0xac1414fb, {0x2, 0x0, @broadcast}}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000005c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, r4, 0x0, &(0x7f0000000500)="915632a85abb58aec9d7c4bb70fea4c72d9bc157cefa9af603171a2b0b6eb28716679b40183549af38efa91e9c41842555121db63d25eb6ba67f53f093eb00da3f9fd42c7ed5578716a220b35efd435ef6840c3d1e445d4a0994abb0520d735de2670b49496ac59d1ce013e22a3afbe837abedf95d109e2b990ac4ed278646888b13e6a50cc168054b173296b3ff6b2c0f6c47dcd3a1206e4ed1e24a98ad8d23bce6c1c7e3c986", 0xa7, 0x100, 0x0, {0x0, r5}}, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000600)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r6, 0x8, 0x0, 0x8000) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000300)) r7 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000fffffdfd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c535479a59460bba00"/192]) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) creat(&(0x7f0000000380)='./file0\x00', 0x111) fchmodat(r6, &(0x7f0000000040)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x100000f, 0x1f012, r0, 0x0) 18:14:29 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xa, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:14:29 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x6, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 1760.565658] FAULT_INJECTION: forcing a failure. [ 1760.565658] name failslab, interval 1, probability 0, space 0, times 0 [ 1760.568557] CPU: 1 PID: 9910 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1760.570107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1760.571970] Call Trace: [ 1760.572575] dump_stack+0x107/0x167 [ 1760.573418] should_fail.cold+0x5/0xa [ 1760.574274] ? v9fs_mount+0x5a/0x8f0 [ 1760.575124] should_failslab+0x5/0x20 [ 1760.575989] kmem_cache_alloc_trace+0x55/0x320 [ 1760.577022] ? v9fs_write_inode+0x60/0x60 [ 1760.577970] v9fs_mount+0x5a/0x8f0 [ 1760.578774] ? v9fs_write_inode+0x60/0x60 [ 1760.579716] legacy_get_tree+0x105/0x220 [ 1760.580638] vfs_get_tree+0x8e/0x300 [ 1760.581498] path_mount+0x1331/0x21c0 [ 1760.582370] ? strncpy_from_user+0x9e/0x470 [ 1760.583352] ? finish_automount+0xa90/0xa90 [ 1760.584332] ? getname_flags.part.0+0x1dd/0x4f0 [ 1760.585391] ? _copy_from_user+0xfb/0x1b0 [ 1760.586352] __x64_sys_mount+0x282/0x300 [ 1760.587271] ? copy_mnt_ns+0xa00/0xa00 [ 1760.588161] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1760.589351] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1760.590527] do_syscall_64+0x33/0x40 [ 1760.591377] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1760.592551] RIP: 0033:0x7fbd09fc9b19 [ 1760.593392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1760.597630] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1760.599347] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1760.600966] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1760.602590] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1760.604205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1760.605837] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 1760.623481] FAULT_INJECTION: forcing a failure. [ 1760.623481] name failslab, interval 1, probability 0, space 0, times 0 [ 1760.626245] CPU: 1 PID: 9917 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1760.627792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1760.629673] Call Trace: [ 1760.630276] dump_stack+0x107/0x167 [ 1760.631098] should_fail.cold+0x5/0xa [ 1760.631968] ? getname_flags.part.0+0x50/0x4f0 [ 1760.632996] should_failslab+0x5/0x20 [ 1760.633868] kmem_cache_alloc+0x5b/0x310 [ 1760.634792] getname_flags.part.0+0x50/0x4f0 [ 1760.635792] ? _copy_from_user+0xfb/0x1b0 [ 1760.636730] user_path_at_empty+0xa1/0x100 [ 1760.637696] __x64_sys_mount+0x1e9/0x300 [ 1760.638620] ? copy_mnt_ns+0xa00/0xa00 [ 1760.639502] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1760.640685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1760.641864] do_syscall_64+0x33/0x40 [ 1760.642711] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1760.643872] RIP: 0033:0x7fc4a8241b19 [ 1760.644708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1760.648923] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1760.650653] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1760.652264] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1760.653909] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1760.655536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1760.657164] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:14:29 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x7, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:14:29 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 8) 18:14:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 17) [ 1760.899572] FAULT_INJECTION: forcing a failure. [ 1760.899572] name failslab, interval 1, probability 0, space 0, times 0 [ 1760.901104] CPU: 0 PID: 9936 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1760.901895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1760.902835] Call Trace: [ 1760.903141] dump_stack+0x107/0x167 [ 1760.903558] should_fail.cold+0x5/0xa [ 1760.903996] should_failslab+0x5/0x20 [ 1760.904429] __kmalloc_track_caller+0x79/0x370 [ 1760.904949] ? v9fs_session_init+0xa7/0x1680 [ 1760.905462] ? kernel_text_address+0xf2/0x120 [ 1760.905973] kstrdup+0x36/0x70 [ 1760.906341] v9fs_session_init+0xa7/0x1680 [ 1760.906829] ? lock_release+0x680/0x680 [ 1760.907280] ? find_held_lock+0x2c/0x110 [ 1760.907324] FAULT_INJECTION: forcing a failure. [ 1760.907324] name failslab, interval 1, probability 0, space 0, times 0 [ 1760.907743] ? kmem_cache_alloc_trace+0x151/0x320 [ 1760.907753] ? v9fs_show_options+0x690/0x690 [ 1760.907767] ? trace_hardirqs_on+0x5b/0x180 [ 1760.907778] ? kasan_unpoison_shadow+0x33/0x50 [ 1760.907786] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1760.907797] v9fs_mount+0x79/0x8f0 [ 1760.907806] ? v9fs_write_inode+0x60/0x60 [ 1760.907815] legacy_get_tree+0x105/0x220 [ 1760.907834] vfs_get_tree+0x8e/0x300 [ 1760.914691] path_mount+0x1331/0x21c0 [ 1760.915130] ? strncpy_from_user+0x9e/0x470 [ 1760.915619] ? finish_automount+0xa90/0xa90 [ 1760.916110] ? getname_flags.part.0+0x1dd/0x4f0 [ 1760.916638] ? _copy_from_user+0xfb/0x1b0 [ 1760.917117] __x64_sys_mount+0x282/0x300 [ 1760.917590] ? copy_mnt_ns+0xa00/0xa00 [ 1760.918040] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1760.918636] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1760.919230] do_syscall_64+0x33/0x40 [ 1760.919655] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1760.920244] RIP: 0033:0x7fbd09fc9b19 [ 1760.920670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1760.922781] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1760.923648] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1760.924463] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1760.925283] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1760.926101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1760.926916] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 1760.927809] CPU: 1 PID: 9934 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1760.929381] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1760.931274] Call Trace: [ 1760.931878] dump_stack+0x107/0x167 [ 1760.932702] should_fail.cold+0x5/0xa [ 1760.933583] ? create_object.isra.0+0x3a/0xa20 [ 1760.934625] should_failslab+0x5/0x20 [ 1760.935489] kmem_cache_alloc+0x5b/0x310 [ 1760.936419] create_object.isra.0+0x3a/0xa20 [ 1760.937426] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1760.938585] kmem_cache_alloc+0x159/0x310 [ 1760.939533] getname_flags.part.0+0x50/0x4f0 [ 1760.940540] ? _copy_from_user+0xfb/0x1b0 [ 1760.941489] user_path_at_empty+0xa1/0x100 [ 1760.942445] __x64_sys_mount+0x1e9/0x300 [ 1760.943368] ? copy_mnt_ns+0xa00/0xa00 [ 1760.944254] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1760.945453] ? syscall_enter_from_user_mode+0x1d/0x50 18:14:29 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x9, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) [ 1760.946630] do_syscall_64+0x33/0x40 [ 1760.947723] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1760.948885] RIP: 0033:0x7fc4a8241b19 [ 1760.949735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1760.953902] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1760.955620] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1760.957236] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1760.958865] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1760.960487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:14:29 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x7, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 1760.962142] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:14:29 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x9, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:14:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 18) 18:14:42 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xb, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:14:42 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xa, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1774.107003] FAULT_INJECTION: forcing a failure. [ 1774.107003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1774.108532] CPU: 1 PID: 9960 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1774.109357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1774.110367] Call Trace: [ 1774.110691] dump_stack+0x107/0x167 [ 1774.111133] should_fail.cold+0x5/0xa [ 1774.111601] strncpy_from_user+0x34/0x470 [ 1774.112108] getname_flags.part.0+0x95/0x4f0 [ 1774.112642] ? _copy_from_user+0xfb/0x1b0 [ 1774.113174] user_path_at_empty+0xa1/0x100 [ 1774.113698] __x64_sys_mount+0x1e9/0x300 [ 1774.114187] ? copy_mnt_ns+0xa00/0xa00 [ 1774.114659] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.115296] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1774.115923] do_syscall_64+0x33/0x40 [ 1774.116372] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1774.116994] RIP: 0033:0x7fc4a8241b19 [ 1774.117444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1774.119691] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1774.120618] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1774.121482] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1774.122353] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1774.123216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1774.124076] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:14:42 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x8, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:14:42 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 9) 18:14:42 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xa, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:14:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsu(0x0, 0x0, 0x8000) syz_io_uring_setup(0x2ffe, &(0x7f00000003c0)={0x0, 0x2c22, 0x0, 0x0, 0x321, 0x0, r2}, &(0x7f000054c000/0x1000)=nil, &(0x7f000033a000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000440)=0x0) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x20040, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f00000014c0)={{0x2, 0x0, @remote}, {0x308}, 0xac1414fb, {0x2, 0x0, @broadcast}}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000005c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, r4, 0x0, &(0x7f0000000500)="915632a85abb58aec9d7c4bb70fea4c72d9bc157cefa9af603171a2b0b6eb28716679b40183549af38efa91e9c41842555121db63d25eb6ba67f53f093eb00da3f9fd42c7ed5578716a220b35efd435ef6840c3d1e445d4a0994abb0520d735de2670b49496ac59d1ce013e22a3afbe837abedf95d109e2b990ac4ed278646888b13e6a50cc168054b173296b3ff6b2c0f6c47dcd3a1206e4ed1e24a98ad8d23bce6c1c7e3c986", 0xa7, 0x100, 0x0, {0x0, r5}}, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000600)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r6, 0x8, 0x0, 0x8000) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000300)) r7 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000fffffdfd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c535479a59460bba00"/192]) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) creat(&(0x7f0000000380)='./file0\x00', 0x111) fchmodat(r6, &(0x7f0000000040)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x100000f, 0x1f012, r0, 0x0) 18:14:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsu(0x0, 0x0, 0x8000) syz_io_uring_setup(0x2ffe, &(0x7f00000003c0)={0x0, 0x2c22, 0x0, 0x0, 0x321, 0x0, r2}, &(0x7f000054c000/0x1000)=nil, &(0x7f000033a000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000440)=0x0) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x20040, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f00000014c0)={{0x2, 0x0, @remote}, {0x308}, 0xac1414fb, {0x2, 0x0, @broadcast}}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000005c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, r4, 0x0, &(0x7f0000000500)="915632a85abb58aec9d7c4bb70fea4c72d9bc157cefa9af603171a2b0b6eb28716679b40183549af38efa91e9c41842555121db63d25eb6ba67f53f093eb00da3f9fd42c7ed5578716a220b35efd435ef6840c3d1e445d4a0994abb0520d735de2670b49496ac59d1ce013e22a3afbe837abedf95d109e2b990ac4ed278646888b13e6a50cc168054b173296b3ff6b2c0f6c47dcd3a1206e4ed1e24a98ad8d23bce6c1c7e3c986", 0xa7, 0x100, 0x0, {0x0, r5}}, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000600)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r6, 0x8, 0x0, 0x8000) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000300)) r7 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000fffffdfd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c535479a59460bba00"/192]) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) creat(&(0x7f0000000380)='./file0\x00', 0x111) fchmodat(r6, &(0x7f0000000040)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x100000f, 0x1f012, r0, 0x0) [ 1774.156005] FAULT_INJECTION: forcing a failure. [ 1774.156005] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.157518] CPU: 1 PID: 9965 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1774.158371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1774.159393] Call Trace: [ 1774.159721] dump_stack+0x107/0x167 [ 1774.160181] should_fail.cold+0x5/0xa [ 1774.160670] should_failslab+0x5/0x20 [ 1774.161139] __kmalloc_track_caller+0x79/0x370 [ 1774.161709] ? v9fs_session_init+0xe9/0x1680 [ 1774.162265] ? kernel_text_address+0xf2/0x120 [ 1774.162813] kstrdup+0x36/0x70 [ 1774.163211] v9fs_session_init+0xe9/0x1680 [ 1774.163729] ? lock_release+0x680/0x680 [ 1774.164217] ? find_held_lock+0x2c/0x110 [ 1774.164712] ? kmem_cache_alloc_trace+0x151/0x320 [ 1774.165314] ? v9fs_show_options+0x690/0x690 [ 1774.165858] ? trace_hardirqs_on+0x5b/0x180 [ 1774.166384] ? kasan_unpoison_shadow+0x33/0x50 [ 1774.166950] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1774.167579] v9fs_mount+0x79/0x8f0 [ 1774.168013] ? v9fs_write_inode+0x60/0x60 [ 1774.168516] legacy_get_tree+0x105/0x220 [ 1774.169025] vfs_get_tree+0x8e/0x300 [ 1774.169474] path_mount+0x1331/0x21c0 [ 1774.169946] ? strncpy_from_user+0x9e/0x470 [ 1774.170473] ? finish_automount+0xa90/0xa90 [ 1774.171002] ? getname_flags.part.0+0x1dd/0x4f0 [ 1774.171579] ? _copy_from_user+0xfb/0x1b0 [ 1774.172090] __x64_sys_mount+0x282/0x300 [ 1774.172591] ? copy_mnt_ns+0xa00/0xa00 [ 1774.173067] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.173715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1774.174340] do_syscall_64+0x33/0x40 [ 1774.174794] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1774.175424] RIP: 0033:0x7fbd09fc9b19 [ 1774.175883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1774.178140] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1774.179063] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1774.179918] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1774.180776] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1774.181637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1774.182495] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:14:43 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 10) 18:14:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 19) [ 1774.374425] FAULT_INJECTION: forcing a failure. [ 1774.374425] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.375968] CPU: 1 PID: 9980 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1774.376756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1774.377699] Call Trace: [ 1774.378005] dump_stack+0x107/0x167 [ 1774.378419] should_fail.cold+0x5/0xa [ 1774.378857] should_failslab+0x5/0x20 [ 1774.379295] __kmalloc_track_caller+0x79/0x370 [ 1774.379815] ? v9fs_session_init+0xe9/0x1680 [ 1774.380313] ? kernel_text_address+0xf2/0x120 [ 1774.380825] kstrdup+0x36/0x70 [ 1774.381189] v9fs_session_init+0xe9/0x1680 [ 1774.381686] ? lock_release+0x680/0x680 [ 1774.382138] ? find_held_lock+0x2c/0x110 [ 1774.382606] ? kmem_cache_alloc_trace+0x151/0x320 [ 1774.383156] ? v9fs_show_options+0x690/0x690 [ 1774.383661] ? trace_hardirqs_on+0x5b/0x180 [ 1774.384149] ? kasan_unpoison_shadow+0x33/0x50 [ 1774.384666] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1774.385245] v9fs_mount+0x79/0x8f0 [ 1774.385658] ? v9fs_write_inode+0x60/0x60 [ 1774.386132] legacy_get_tree+0x105/0x220 [ 1774.386591] vfs_get_tree+0x8e/0x300 [ 1774.387012] path_mount+0x1331/0x21c0 [ 1774.387447] ? strncpy_from_user+0x9e/0x470 [ 1774.387942] ? finish_automount+0xa90/0xa90 [ 1774.388431] ? getname_flags.part.0+0x1dd/0x4f0 [ 1774.388961] ? _copy_from_user+0xfb/0x1b0 [ 1774.389439] __x64_sys_mount+0x282/0x300 [ 1774.389908] ? copy_mnt_ns+0xa00/0xa00 [ 1774.390349] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.390942] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1774.391527] do_syscall_64+0x33/0x40 [ 1774.391947] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1774.392531] RIP: 0033:0x7fbd09fc9b19 [ 1774.392954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1774.395069] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1774.395931] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1774.396748] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1774.397559] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1774.398382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1774.399201] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 1774.461644] FAULT_INJECTION: forcing a failure. [ 1774.461644] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.464624] CPU: 0 PID: 9983 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1774.466238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1774.468176] Call Trace: [ 1774.468787] dump_stack+0x107/0x167 [ 1774.469634] should_fail.cold+0x5/0xa [ 1774.470505] ? alloc_fs_context+0x57/0x840 [ 1774.471470] should_failslab+0x5/0x20 [ 1774.472342] kmem_cache_alloc_trace+0x55/0x320 [ 1774.473392] alloc_fs_context+0x57/0x840 [ 1774.474338] path_mount+0xaa3/0x21c0 [ 1774.475196] ? strncpy_from_user+0x9e/0x470 [ 1774.476191] ? finish_automount+0xa90/0xa90 [ 1774.477180] ? getname_flags.part.0+0x1dd/0x4f0 [ 1774.478272] ? _copy_from_user+0xfb/0x1b0 [ 1774.479229] __x64_sys_mount+0x282/0x300 [ 1774.480161] ? copy_mnt_ns+0xa00/0xa00 [ 1774.481060] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.482279] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1774.483463] do_syscall_64+0x33/0x40 [ 1774.484311] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1774.485485] RIP: 0033:0x7fc4a8241b19 [ 1774.486348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1774.490559] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1774.492294] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1774.493921] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1774.495540] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1774.497159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1774.498796] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:14:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 20) [ 1774.600579] FAULT_INJECTION: forcing a failure. [ 1774.600579] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.602135] CPU: 1 PID: 9985 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1774.602925] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1774.603866] Call Trace: [ 1774.604171] dump_stack+0x107/0x167 [ 1774.604587] should_fail.cold+0x5/0xa [ 1774.605025] ? create_object.isra.0+0x3a/0xa20 [ 1774.605552] should_failslab+0x5/0x20 [ 1774.605996] kmem_cache_alloc+0x5b/0x310 [ 1774.606466] create_object.isra.0+0x3a/0xa20 [ 1774.606967] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1774.607548] __kmalloc_track_caller+0x177/0x370 [ 1774.608081] ? v9fs_session_init+0xe9/0x1680 [ 1774.608583] ? kernel_text_address+0xf2/0x120 [ 1774.609100] kstrdup+0x36/0x70 [ 1774.609465] v9fs_session_init+0xe9/0x1680 [ 1774.609960] ? lock_release+0x680/0x680 [ 1774.610416] ? find_held_lock+0x2c/0x110 [ 1774.610882] ? kmem_cache_alloc_trace+0x151/0x320 [ 1774.611429] ? v9fs_show_options+0x690/0x690 [ 1774.611944] ? trace_hardirqs_on+0x5b/0x180 [ 1774.612440] ? kasan_unpoison_shadow+0x33/0x50 [ 1774.612965] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1774.613572] v9fs_mount+0x79/0x8f0 [ 1774.613985] ? v9fs_write_inode+0x60/0x60 [ 1774.614462] legacy_get_tree+0x105/0x220 [ 1774.614932] vfs_get_tree+0x8e/0x300 [ 1774.615363] path_mount+0x1331/0x21c0 [ 1774.615809] ? strncpy_from_user+0x9e/0x470 [ 1774.616302] ? finish_automount+0xa90/0xa90 [ 1774.616799] ? getname_flags.part.0+0x1dd/0x4f0 [ 1774.617334] ? _copy_from_user+0xfb/0x1b0 [ 1774.617820] __x64_sys_mount+0x282/0x300 [ 1774.618292] ? copy_mnt_ns+0xa00/0xa00 [ 1774.618738] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.619339] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1774.619928] do_syscall_64+0x33/0x40 [ 1774.620353] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1774.620957] RIP: 0033:0x7fbd09fc9b19 [ 1774.621379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1774.623493] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1774.624367] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1774.625191] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1774.626023] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1774.626834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1774.627647] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:14:43 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x9, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:14:43 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xb, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:14:43 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 11) 18:14:43 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xc, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:14:43 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xb, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) [ 1774.882403] FAULT_INJECTION: forcing a failure. [ 1774.882403] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.884958] CPU: 0 PID: 9994 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1774.886296] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1774.887898] Call Trace: [ 1774.888414] dump_stack+0x107/0x167 [ 1774.889118] should_fail.cold+0x5/0xa [ 1774.889866] ? create_object.isra.0+0x3a/0xa20 [ 1774.890723] should_failslab+0x5/0x20 [ 1774.891468] kmem_cache_alloc+0x5b/0x310 [ 1774.892288] create_object.isra.0+0x3a/0xa20 [ 1774.893153] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1774.894153] kmem_cache_alloc_trace+0x151/0x320 [ 1774.895070] alloc_fs_context+0x57/0x840 [ 1774.895880] path_mount+0xaa3/0x21c0 [ 1774.896612] ? strncpy_from_user+0x9e/0x470 [ 1774.897446] ? finish_automount+0xa90/0xa90 [ 1774.898292] ? getname_flags.part.0+0x1dd/0x4f0 [ 1774.899160] ? _copy_from_user+0xfb/0x1b0 [ 1774.899960] __x64_sys_mount+0x282/0x300 [ 1774.900752] ? copy_mnt_ns+0xa00/0xa00 [ 1774.901520] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.902533] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1774.903524] do_syscall_64+0x33/0x40 [ 1774.904234] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1774.905237] RIP: 0033:0x7fc4a8241b19 [ 1774.905960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1774.909513] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1774.910976] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1774.912341] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 18:14:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 21) [ 1774.913716] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1774.915306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1774.916683] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 [ 1774.979243] FAULT_INJECTION: forcing a failure. [ 1774.979243] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.980647] CPU: 1 PID: 10004 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1774.981440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1774.982409] Call Trace: [ 1774.982721] dump_stack+0x107/0x167 [ 1774.983141] should_fail.cold+0x5/0xa [ 1774.983585] ? create_object.isra.0+0x3a/0xa20 [ 1774.984096] should_failslab+0x5/0x20 [ 1774.984532] kmem_cache_alloc+0x5b/0x310 [ 1774.985001] ? kernel_text_address+0xf2/0x120 [ 1774.985508] create_object.isra.0+0x3a/0xa20 [ 1774.986023] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1774.986601] kmem_cache_alloc_trace+0x151/0x320 [ 1774.987129] ? find_held_lock+0x2c/0x110 [ 1774.987612] p9_client_create+0xaf/0x1230 [ 1774.988094] ? lock_downgrade+0x6d0/0x6d0 [ 1774.988576] ? p9_client_flush+0x430/0x430 [ 1774.989060] ? trace_hardirqs_on+0x5b/0x180 [ 1774.989558] ? lockdep_init_map_type+0x2c7/0x780 [ 1774.990111] ? __raw_spin_lock_init+0x36/0x110 [ 1774.990638] v9fs_session_init+0x1dd/0x1680 [ 1774.991126] ? lock_release+0x680/0x680 [ 1774.991595] ? kmem_cache_alloc_trace+0x151/0x320 [ 1774.992148] ? v9fs_show_options+0x690/0x690 [ 1774.992662] ? trace_hardirqs_on+0x5b/0x180 [ 1774.993161] ? kasan_unpoison_shadow+0x33/0x50 [ 1774.993685] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1774.994268] v9fs_mount+0x79/0x8f0 [ 1774.994679] ? v9fs_write_inode+0x60/0x60 [ 1774.995148] legacy_get_tree+0x105/0x220 [ 1774.995613] vfs_get_tree+0x8e/0x300 [ 1774.996043] path_mount+0x1331/0x21c0 [ 1774.996490] ? strncpy_from_user+0x9e/0x470 [ 1774.996990] ? finish_automount+0xa90/0xa90 [ 1774.997484] ? getname_flags.part.0+0x1dd/0x4f0 [ 1774.998035] ? _copy_from_user+0xfb/0x1b0 [ 1774.998522] __x64_sys_mount+0x282/0x300 [ 1774.998986] ? copy_mnt_ns+0xa00/0xa00 [ 1774.999427] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1775.000026] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1775.000627] do_syscall_64+0x33/0x40 [ 1775.001064] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1775.001659] RIP: 0033:0x7fbd09fc9b19 [ 1775.002096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1775.004217] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1775.005108] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1775.005957] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1775.006770] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1775.007589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1775.008407] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:14:43 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xb, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:14:43 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xa, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:14:43 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xd, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:14:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsu(0x0, 0x0, 0x8000) syz_io_uring_setup(0x2ffe, &(0x7f00000003c0)={0x0, 0x2c22, 0x0, 0x0, 0x321, 0x0, r2}, &(0x7f000054c000/0x1000)=nil, &(0x7f000033a000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000440)=0x0) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x20040, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f00000014c0)={{0x2, 0x0, @remote}, {0x308}, 0xac1414fb, {0x2, 0x0, @broadcast}}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000005c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, r4, 0x0, &(0x7f0000000500)="915632a85abb58aec9d7c4bb70fea4c72d9bc157cefa9af603171a2b0b6eb28716679b40183549af38efa91e9c41842555121db63d25eb6ba67f53f093eb00da3f9fd42c7ed5578716a220b35efd435ef6840c3d1e445d4a0994abb0520d735de2670b49496ac59d1ce013e22a3afbe837abedf95d109e2b990ac4ed278646888b13e6a50cc168054b173296b3ff6b2c0f6c47dcd3a1206e4ed1e24a98ad8d23bce6c1c7e3c986", 0xa7, 0x100, 0x0, {0x0, r5}}, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000600)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r6, 0x8, 0x0, 0x8000) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000300)) r7 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000fffffdfd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c535479a59460bba00"/192]) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) creat(&(0x7f0000000380)='./file0\x00', 0x111) fchmodat(r6, &(0x7f0000000040)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x100000f, 0x1f012, r0, 0x0) 18:14:57 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xd, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:14:57 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xc, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:14:57 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xc, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:14:57 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xa, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:14:57 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 12) 18:14:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 22) 18:14:57 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x9, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:14:57 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xe, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) [ 1788.408720] FAULT_INJECTION: forcing a failure. [ 1788.408720] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.411367] FAULT_INJECTION: forcing a failure. [ 1788.411367] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.411425] CPU: 1 PID: 10041 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1788.411435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.411448] Call Trace: [ 1788.417536] dump_stack+0x107/0x167 [ 1788.418313] should_fail.cold+0x5/0xa [ 1788.419121] should_failslab+0x5/0x20 [ 1788.419925] __kmalloc_track_caller+0x79/0x370 [ 1788.420888] ? p9_client_create+0x41d/0x1230 [ 1788.421824] kstrdup+0x36/0x70 [ 1788.422508] p9_client_create+0x41d/0x1230 [ 1788.423401] ? lock_downgrade+0x6d0/0x6d0 [ 1788.424280] ? p9_client_flush+0x430/0x430 [ 1788.425177] ? trace_hardirqs_on+0x5b/0x180 [ 1788.426096] ? lockdep_init_map_type+0x2c7/0x780 [ 1788.427101] ? __raw_spin_lock_init+0x36/0x110 [ 1788.428077] v9fs_session_init+0x1dd/0x1680 [ 1788.428988] ? lock_release+0x680/0x680 [ 1788.429847] ? kmem_cache_alloc_trace+0x151/0x320 [ 1788.430863] ? v9fs_show_options+0x690/0x690 [ 1788.431809] ? trace_hardirqs_on+0x5b/0x180 [ 1788.432720] ? kasan_unpoison_shadow+0x33/0x50 [ 1788.433682] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1788.434765] v9fs_mount+0x79/0x8f0 [ 1788.435519] ? v9fs_write_inode+0x60/0x60 [ 1788.436395] legacy_get_tree+0x105/0x220 [ 1788.437254] vfs_get_tree+0x8e/0x300 [ 1788.438058] path_mount+0x1331/0x21c0 [ 1788.438866] ? strncpy_from_user+0x9e/0x470 [ 1788.439785] ? finish_automount+0xa90/0xa90 [ 1788.440692] ? getname_flags.part.0+0x1dd/0x4f0 [ 1788.441685] ? _copy_from_user+0xfb/0x1b0 [ 1788.442578] __x64_sys_mount+0x282/0x300 [ 1788.443434] ? copy_mnt_ns+0xa00/0xa00 [ 1788.444260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1788.445365] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.446471] do_syscall_64+0x33/0x40 [ 1788.447261] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1788.448340] RIP: 0033:0x7fbd09fc9b19 [ 1788.449126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.453045] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1788.454659] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1788.456177] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1788.457689] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1788.459215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.460725] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 1788.463433] CPU: 0 PID: 10039 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1788.465454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.467682] Call Trace: [ 1788.468322] dump_stack+0x107/0x167 [ 1788.469206] should_fail.cold+0x5/0xa [ 1788.470141] ? legacy_init_fs_context+0x44/0xe0 [ 1788.471260] should_failslab+0x5/0x20 [ 1788.472186] kmem_cache_alloc_trace+0x55/0x320 [ 1788.473284] ? lockdep_init_map_type+0x2c7/0x780 [ 1788.474447] legacy_init_fs_context+0x44/0xe0 [ 1788.475520] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1788.476718] alloc_fs_context+0x4fd/0x840 [ 1788.477749] path_mount+0xaa3/0x21c0 [ 1788.478662] ? strncpy_from_user+0x9e/0x470 [ 1788.479723] ? finish_automount+0xa90/0xa90 [ 1788.480776] ? getname_flags.part.0+0x1dd/0x4f0 [ 1788.481919] ? _copy_from_user+0xfb/0x1b0 [ 1788.482921] __x64_sys_mount+0x282/0x300 [ 1788.483900] ? copy_mnt_ns+0xa00/0xa00 [ 1788.484848] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1788.486122] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.487379] do_syscall_64+0x33/0x40 [ 1788.488271] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1788.489497] RIP: 0033:0x7fc4a8241b19 [ 1788.490415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.494823] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1788.496652] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1788.498369] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1788.500069] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1788.501764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.503482] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:14:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 23) [ 1788.683263] FAULT_INJECTION: forcing a failure. [ 1788.683263] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.685987] CPU: 1 PID: 10051 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1788.687459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.689209] Call Trace: [ 1788.689779] dump_stack+0x107/0x167 [ 1788.690552] should_fail.cold+0x5/0xa [ 1788.691355] ? create_object.isra.0+0x3a/0xa20 [ 1788.692323] should_failslab+0x5/0x20 [ 1788.693128] kmem_cache_alloc+0x5b/0x310 [ 1788.693997] ? lock_downgrade+0x6d0/0x6d0 [ 1788.694877] create_object.isra.0+0x3a/0xa20 [ 1788.695802] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1788.696877] __kmalloc_track_caller+0x177/0x370 [ 1788.697864] ? p9_client_create+0x41d/0x1230 [ 1788.698800] kstrdup+0x36/0x70 [ 1788.699482] p9_client_create+0x41d/0x1230 [ 1788.700381] ? lock_downgrade+0x6d0/0x6d0 [ 1788.701284] ? p9_client_flush+0x430/0x430 [ 1788.702182] ? trace_hardirqs_on+0x5b/0x180 18:14:57 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 13) [ 1788.703095] ? lockdep_init_map_type+0x2c7/0x780 [ 1788.704385] ? __raw_spin_lock_init+0x36/0x110 [ 1788.705354] v9fs_session_init+0x1dd/0x1680 [ 1788.706273] ? lock_release+0x680/0x680 [ 1788.707119] ? kmem_cache_alloc_trace+0x151/0x320 [ 1788.708133] ? v9fs_show_options+0x690/0x690 [ 1788.709067] ? trace_hardirqs_on+0x5b/0x180 [ 1788.709988] ? kasan_unpoison_shadow+0x33/0x50 [ 1788.710948] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1788.712021] v9fs_mount+0x79/0x8f0 [ 1788.712767] ? v9fs_write_inode+0x60/0x60 [ 1788.713638] legacy_get_tree+0x105/0x220 [ 1788.714510] vfs_get_tree+0x8e/0x300 [ 1788.715296] path_mount+0x1331/0x21c0 [ 1788.716108] ? strncpy_from_user+0x9e/0x470 [ 1788.717019] ? finish_automount+0xa90/0xa90 [ 1788.717932] ? getname_flags.part.0+0x1dd/0x4f0 [ 1788.718914] ? _copy_from_user+0xfb/0x1b0 [ 1788.719795] __x64_sys_mount+0x282/0x300 [ 1788.720649] ? copy_mnt_ns+0xa00/0xa00 [ 1788.721473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1788.722584] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.723674] do_syscall_64+0x33/0x40 [ 1788.724458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1788.725538] RIP: 0033:0x7fbd09fc9b19 [ 1788.726328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.730216] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1788.731819] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1788.733323] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1788.734835] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1788.736340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.737861] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 1788.775480] FAULT_INJECTION: forcing a failure. [ 1788.775480] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.778168] CPU: 0 PID: 10053 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1788.779644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.781410] Call Trace: [ 1788.781987] dump_stack+0x107/0x167 [ 1788.782802] should_fail.cold+0x5/0xa [ 1788.783619] ? create_object.isra.0+0x3a/0xa20 [ 1788.784575] should_failslab+0x5/0x20 [ 1788.785375] kmem_cache_alloc+0x5b/0x310 [ 1788.786245] create_object.isra.0+0x3a/0xa20 [ 1788.787164] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1788.788235] kmem_cache_alloc_trace+0x151/0x320 [ 1788.789212] ? lockdep_init_map_type+0x2c7/0x780 [ 1788.790216] legacy_init_fs_context+0x44/0xe0 [ 1788.791154] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1788.792208] alloc_fs_context+0x4fd/0x840 [ 1788.793086] path_mount+0xaa3/0x21c0 [ 1788.793886] ? strncpy_from_user+0x9e/0x470 [ 1788.794796] ? finish_automount+0xa90/0xa90 [ 1788.795701] ? getname_flags.part.0+0x1dd/0x4f0 [ 1788.796674] ? _copy_from_user+0xfb/0x1b0 [ 1788.797552] __x64_sys_mount+0x282/0x300 [ 1788.798410] ? copy_mnt_ns+0xa00/0xa00 [ 1788.799230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1788.800503] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.801817] do_syscall_64+0x33/0x40 [ 1788.802757] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1788.804050] RIP: 0033:0x7fc4a8241b19 [ 1788.804976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.809588] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1788.811515] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1788.813316] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1788.815115] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1788.816904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.818684] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:14:57 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xc, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:14:57 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xa, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:14:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 24) [ 1789.263258] FAULT_INJECTION: forcing a failure. [ 1789.263258] name failslab, interval 1, probability 0, space 0, times 0 [ 1789.266037] CPU: 1 PID: 10065 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1789.267495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1789.269244] Call Trace: [ 1789.269817] dump_stack+0x107/0x167 [ 1789.270589] should_fail.cold+0x5/0xa [ 1789.271395] should_failslab+0x5/0x20 [ 1789.272197] __kmalloc_track_caller+0x79/0x370 [ 1789.273188] ? p9_client_create+0x51e/0x1230 [ 1789.274153] kmemdup_nul+0x2d/0xa0 [ 1789.274924] p9_client_create+0x51e/0x1230 [ 1789.275844] ? p9_client_flush+0x430/0x430 [ 1789.276743] ? trace_hardirqs_on+0x5b/0x180 [ 1789.277663] ? lockdep_init_map_type+0x2c7/0x780 [ 1789.278685] ? __raw_spin_lock_init+0x36/0x110 [ 1789.279654] v9fs_session_init+0x1dd/0x1680 [ 1789.280583] ? lock_release+0x680/0x680 [ 1789.281438] ? kmem_cache_alloc_trace+0x151/0x320 [ 1789.282464] ? v9fs_show_options+0x690/0x690 [ 1789.283396] ? trace_hardirqs_on+0x5b/0x180 [ 1789.284315] ? kasan_unpoison_shadow+0x33/0x50 [ 1789.285279] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1789.286353] v9fs_mount+0x79/0x8f0 [ 1789.287100] ? v9fs_write_inode+0x60/0x60 [ 1789.287986] legacy_get_tree+0x105/0x220 [ 1789.288846] vfs_get_tree+0x8e/0x300 [ 1789.289629] path_mount+0x1331/0x21c0 [ 1789.290446] ? strncpy_from_user+0x9e/0x470 [ 1789.291358] ? finish_automount+0xa90/0xa90 [ 1789.292267] ? getname_flags.part.0+0x1dd/0x4f0 [ 1789.293245] ? _copy_from_user+0xfb/0x1b0 [ 1789.294136] __x64_sys_mount+0x282/0x300 [ 1789.295001] ? copy_mnt_ns+0xa00/0xa00 [ 1789.295820] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1789.296934] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1789.298031] do_syscall_64+0x33/0x40 [ 1789.298812] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1789.299895] RIP: 0033:0x7fbd09fc9b19 [ 1789.300686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1789.304561] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1789.306178] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1789.307694] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1789.309196] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1789.310714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1789.312219] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:15:13 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xc, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:13 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xf, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 25) 18:15:13 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xb, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:15:13 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x8, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:15:13 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 14) 18:15:13 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xd, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:13 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xd, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) [ 1805.060445] FAULT_INJECTION: forcing a failure. [ 1805.060445] name failslab, interval 1, probability 0, space 0, times 0 [ 1805.063077] CPU: 1 PID: 10081 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1805.064545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1805.066320] Call Trace: [ 1805.066896] dump_stack+0x107/0x167 [ 1805.067678] should_fail.cold+0x5/0xa [ 1805.068502] ? v9fs_mount+0x5a/0x8f0 [ 1805.069297] should_failslab+0x5/0x20 [ 1805.070110] kmem_cache_alloc_trace+0x55/0x320 [ 1805.071085] ? v9fs_write_inode+0x60/0x60 [ 1805.071965] v9fs_mount+0x5a/0x8f0 [ 1805.072727] ? v9fs_write_inode+0x60/0x60 [ 1805.073606] legacy_get_tree+0x105/0x220 [ 1805.074484] vfs_get_tree+0x8e/0x300 [ 1805.075282] path_mount+0x1331/0x21c0 [ 1805.076093] ? strncpy_from_user+0x9e/0x470 [ 1805.077016] ? finish_automount+0xa90/0xa90 [ 1805.077948] ? getname_flags.part.0+0x1dd/0x4f0 [ 1805.078938] ? _copy_from_user+0xfb/0x1b0 [ 1805.079374] FAULT_INJECTION: forcing a failure. [ 1805.079374] name failslab, interval 1, probability 0, space 0, times 0 [ 1805.079821] __x64_sys_mount+0x282/0x300 [ 1805.079837] ? copy_mnt_ns+0xa00/0xa00 [ 1805.079860] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1805.079879] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.079898] do_syscall_64+0x33/0x40 [ 1805.079916] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1805.079938] RIP: 0033:0x7fc4a8241b19 [ 1805.089036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1805.092941] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1805.094581] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1805.096089] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1805.097600] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1805.099137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1805.100647] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 [ 1805.102211] CPU: 0 PID: 10084 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1805.103861] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1805.105809] Call Trace: [ 1805.106444] dump_stack+0x107/0x167 [ 1805.107298] should_fail.cold+0x5/0xa [ 1805.108200] ? create_object.isra.0+0x3a/0xa20 [ 1805.109267] should_failslab+0x5/0x20 [ 1805.110174] kmem_cache_alloc+0x5b/0x310 [ 1805.111140] create_object.isra.0+0x3a/0xa20 [ 1805.112166] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1805.113369] __kmalloc_track_caller+0x177/0x370 [ 1805.114473] ? p9_client_create+0x51e/0x1230 [ 1805.115507] kmemdup_nul+0x2d/0xa0 [ 1805.116342] p9_client_create+0x51e/0x1230 [ 1805.117339] ? p9_client_flush+0x430/0x430 [ 1805.118341] ? trace_hardirqs_on+0x5b/0x180 [ 1805.119350] ? lockdep_init_map_type+0x2c7/0x780 [ 1805.120458] ? __raw_spin_lock_init+0x36/0x110 [ 1805.121532] v9fs_session_init+0x1dd/0x1680 [ 1805.122547] ? lock_release+0x680/0x680 [ 1805.123484] ? kmem_cache_alloc_trace+0x151/0x320 [ 1805.124609] ? v9fs_show_options+0x690/0x690 [ 1805.125646] ? trace_hardirqs_on+0x5b/0x180 [ 1805.126663] ? kasan_unpoison_shadow+0x33/0x50 [ 1805.127739] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1805.128922] v9fs_mount+0x79/0x8f0 [ 1805.129735] ? v9fs_write_inode+0x60/0x60 [ 1805.130705] legacy_get_tree+0x105/0x220 [ 1805.131639] vfs_get_tree+0x8e/0x300 [ 1805.132510] path_mount+0x1331/0x21c0 [ 1805.133392] ? strncpy_from_user+0x9e/0x470 [ 1805.134400] ? finish_automount+0xa90/0xa90 [ 1805.135390] ? getname_flags.part.0+0x1dd/0x4f0 [ 1805.136476] ? _copy_from_user+0xfb/0x1b0 [ 1805.137448] __x64_sys_mount+0x282/0x300 [ 1805.138396] ? copy_mnt_ns+0xa00/0xa00 [ 1805.139307] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1805.140527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.141717] do_syscall_64+0x33/0x40 [ 1805.142599] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1805.143779] RIP: 0033:0x7fbd09fc9b19 [ 1805.144650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1805.148908] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1805.150692] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1805.152377] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1805.154130] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1805.155874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1805.157617] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:15:14 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 15) 18:15:14 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xe, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) [ 1805.487300] FAULT_INJECTION: forcing a failure. [ 1805.487300] name failslab, interval 1, probability 0, space 0, times 0 [ 1805.490374] CPU: 0 PID: 10097 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1805.492043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1805.494003] Call Trace: [ 1805.494631] dump_stack+0x107/0x167 [ 1805.495506] should_fail.cold+0x5/0xa [ 1805.496389] ? create_object.isra.0+0x3a/0xa20 [ 1805.497483] should_failslab+0x5/0x20 [ 1805.498382] kmem_cache_alloc+0x5b/0x310 [ 1805.499347] create_object.isra.0+0x3a/0xa20 [ 1805.500363] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1805.501565] kmem_cache_alloc_trace+0x151/0x320 [ 1805.502673] ? lockdep_init_map_type+0x2c7/0x780 [ 1805.503791] legacy_init_fs_context+0x44/0xe0 [ 1805.504832] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1805.506021] alloc_fs_context+0x4fd/0x840 [ 1805.506982] path_mount+0xaa3/0x21c0 [ 1805.507877] ? strncpy_from_user+0x9e/0x470 [ 1805.508872] ? finish_automount+0xa90/0xa90 [ 1805.509898] ? getname_flags.part.0+0x1dd/0x4f0 [ 1805.510974] ? _copy_from_user+0xfb/0x1b0 [ 1805.511964] __x64_sys_mount+0x282/0x300 [ 1805.512900] ? copy_mnt_ns+0xa00/0xa00 [ 1805.513817] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1805.515045] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.516241] do_syscall_64+0x33/0x40 [ 1805.517114] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1805.518338] RIP: 0033:0x7fc4a8241b19 [ 1805.519195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1805.523583] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1805.525380] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1805.527083] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1805.528750] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1805.530426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1805.532093] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:15:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 26) 18:15:14 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x7, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 1805.685374] FAULT_INJECTION: forcing a failure. [ 1805.685374] name failslab, interval 1, probability 0, space 0, times 0 [ 1805.687454] CPU: 1 PID: 10107 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1805.688656] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1805.690095] Call Trace: [ 1805.690560] dump_stack+0x107/0x167 [ 1805.691191] should_fail.cold+0x5/0xa [ 1805.691851] should_failslab+0x5/0x20 [ 1805.692509] __kmalloc_track_caller+0x79/0x370 [ 1805.693296] ? parse_opts.part.0+0x8e/0x340 [ 1805.694056] kstrdup+0x36/0x70 [ 1805.694610] parse_opts.part.0+0x8e/0x340 [ 1805.695327] ? p9_fd_show_options+0x1c0/0x1c0 [ 1805.696106] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1805.697009] ? quarantine_put+0x8b/0x1a0 [ 1805.697705] ? trace_hardirqs_on+0x5b/0x180 [ 1805.698465] ? kfree+0xd7/0x340 [ 1805.699039] p9_fd_create+0x98/0x4a0 [ 1805.699679] ? p9_conn_create+0x510/0x510 [ 1805.700397] ? p9_client_create+0x798/0x1230 [ 1805.701155] ? kfree+0xd7/0x340 [ 1805.701723] ? do_raw_spin_unlock+0x4f/0x220 [ 1805.702502] p9_client_create+0x7ff/0x1230 [ 1805.703246] ? p9_client_flush+0x430/0x430 [ 1805.703975] ? trace_hardirqs_on+0x5b/0x180 [ 1805.704726] ? lockdep_init_map_type+0x2c7/0x780 [ 1805.705546] ? __raw_spin_lock_init+0x36/0x110 [ 1805.706340] v9fs_session_init+0x1dd/0x1680 [ 1805.707075] ? lock_release+0x680/0x680 [ 1805.707755] ? kmem_cache_alloc_trace+0x151/0x320 [ 1805.708572] ? v9fs_show_options+0x690/0x690 [ 1805.709327] ? trace_hardirqs_on+0x5b/0x180 [ 1805.710077] ? kasan_unpoison_shadow+0x33/0x50 [ 1805.710861] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1805.711726] v9fs_mount+0x79/0x8f0 [ 1805.712337] ? v9fs_write_inode+0x60/0x60 [ 1805.713038] legacy_get_tree+0x105/0x220 [ 1805.713725] vfs_get_tree+0x8e/0x300 [ 1805.714367] path_mount+0x1331/0x21c0 [ 1805.715022] ? strncpy_from_user+0x9e/0x470 [ 1805.715770] ? finish_automount+0xa90/0xa90 [ 1805.716506] ? getname_flags.part.0+0x1dd/0x4f0 [ 1805.717300] ? _copy_from_user+0xfb/0x1b0 [ 1805.718026] __x64_sys_mount+0x282/0x300 [ 1805.718722] ? copy_mnt_ns+0xa00/0xa00 [ 1805.719390] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1805.720293] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.721170] do_syscall_64+0x33/0x40 [ 1805.721803] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1805.722684] RIP: 0033:0x7fbd09fc9b19 [ 1805.723309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1805.726436] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1805.727732] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1805.728933] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1805.730152] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1805.731361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1805.732564] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 1805.734031] 9pnet: Insufficient options for proto=fd 18:15:14 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 16) 18:15:14 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x10, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) [ 1805.923079] FAULT_INJECTION: forcing a failure. [ 1805.923079] name failslab, interval 1, probability 0, space 0, times 0 [ 1805.925585] CPU: 0 PID: 10112 Comm: syz-executor.7 Not tainted 5.10.240 #1 18:15:14 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xf, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) [ 1805.926998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1805.928860] Call Trace: [ 1805.929405] dump_stack+0x107/0x167 [ 1805.930160] should_fail.cold+0x5/0xa [ 1805.930937] should_failslab+0x5/0x20 [ 1805.931709] __kmalloc_track_caller+0x79/0x370 [ 1805.932623] ? v9fs_session_init+0xa7/0x1680 [ 1805.933506] ? kernel_text_address+0xf2/0x120 [ 1805.934417] kstrdup+0x36/0x70 [ 1805.935058] v9fs_session_init+0xa7/0x1680 [ 1805.935914] ? lock_release+0x680/0x680 [ 1805.936706] ? find_held_lock+0x2c/0x110 [ 1805.937520] ? kmem_cache_alloc_trace+0x151/0x320 [ 1805.938490] ? v9fs_show_options+0x690/0x690 [ 1805.939376] ? trace_hardirqs_on+0x5b/0x180 [ 1805.940236] ? kasan_unpoison_shadow+0x33/0x50 [ 1805.941151] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1805.942180] v9fs_mount+0x79/0x8f0 [ 1805.942886] ? v9fs_write_inode+0x60/0x60 [ 1805.943711] legacy_get_tree+0x105/0x220 [ 1805.944524] vfs_get_tree+0x8e/0x300 [ 1805.945271] path_mount+0x1331/0x21c0 [ 1805.946046] ? strncpy_from_user+0x9e/0x470 [ 1805.946913] ? finish_automount+0xa90/0xa90 [ 1805.947774] ? getname_flags.part.0+0x1dd/0x4f0 [ 1805.948701] ? _copy_from_user+0xfb/0x1b0 [ 1805.949544] __x64_sys_mount+0x282/0x300 [ 1805.950375] ? copy_mnt_ns+0xa00/0xa00 [ 1805.951163] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1805.952224] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.953264] do_syscall_64+0x33/0x40 [ 1805.954024] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1805.955055] RIP: 0033:0x7fc4a8241b19 [ 1805.955807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1805.959508] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1805.961039] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1805.962434] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1805.963884] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1805.965265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1805.966727] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:15:27 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xf, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 27) 18:15:27 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x11, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:27 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xe, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:15:27 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xe, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:27 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xc, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:15:27 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xd, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:27 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 17) [ 1818.441336] FAULT_INJECTION: forcing a failure. [ 1818.441336] name failslab, interval 1, probability 0, space 0, times 0 [ 1818.442930] CPU: 1 PID: 10138 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1818.443824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1818.444885] Call Trace: [ 1818.445222] dump_stack+0x107/0x167 [ 1818.445689] should_fail.cold+0x5/0xa [ 1818.446178] ? create_object.isra.0+0x3a/0xa20 [ 1818.446762] should_failslab+0x5/0x20 [ 1818.447250] kmem_cache_alloc+0x5b/0x310 [ 1818.447781] ? cred_has_capability.isra.0+0x152/0x2b0 [ 1818.448433] create_object.isra.0+0x3a/0xa20 [ 1818.448990] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1818.449631] kmem_cache_alloc_trace+0x151/0x320 [ 1818.450230] ? v9fs_write_inode+0x60/0x60 [ 1818.450558] FAULT_INJECTION: forcing a failure. [ 1818.450558] name failslab, interval 1, probability 0, space 0, times 0 [ 1818.450741] v9fs_mount+0x5a/0x8f0 [ 1818.450752] ? v9fs_write_inode+0x60/0x60 [ 1818.450762] legacy_get_tree+0x105/0x220 [ 1818.450773] vfs_get_tree+0x8e/0x300 [ 1818.450783] path_mount+0x1331/0x21c0 [ 1818.450797] ? strncpy_from_user+0x9e/0x470 [ 1818.450807] ? finish_automount+0xa90/0xa90 [ 1818.450817] ? getname_flags.part.0+0x1dd/0x4f0 [ 1818.450828] ? _copy_from_user+0xfb/0x1b0 [ 1818.450843] __x64_sys_mount+0x282/0x300 [ 1818.450852] ? copy_mnt_ns+0xa00/0xa00 [ 1818.450866] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1818.450877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1818.450898] do_syscall_64+0x33/0x40 [ 1818.460664] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1818.461311] RIP: 0033:0x7fc4a8241b19 [ 1818.461774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1818.464101] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1818.465056] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1818.465941] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1818.466858] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1818.467756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1818.468650] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 [ 1818.469569] CPU: 0 PID: 10133 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1818.471203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1818.473073] Call Trace: [ 1818.473671] dump_stack+0x107/0x167 [ 1818.474517] should_fail.cold+0x5/0xa [ 1818.475395] ? create_object.isra.0+0x3a/0xa20 [ 1818.476430] should_failslab+0x5/0x20 [ 1818.477306] kmem_cache_alloc+0x5b/0x310 [ 1818.478245] ? legacy_get_tree+0x105/0x220 [ 1818.479222] ? vfs_get_tree+0x8e/0x300 [ 1818.480121] create_object.isra.0+0x3a/0xa20 [ 1818.481112] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1818.482278] __kmalloc_track_caller+0x177/0x370 [ 1818.483327] ? parse_opts.part.0+0x8e/0x340 [ 1818.484302] kstrdup+0x36/0x70 [ 1818.485029] parse_opts.part.0+0x8e/0x340 [ 1818.485963] ? p9_fd_show_options+0x1c0/0x1c0 [ 1818.487003] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1818.488184] ? quarantine_put+0x8b/0x1a0 [ 1818.489090] ? trace_hardirqs_on+0x5b/0x180 [ 1818.490062] ? kfree+0xd7/0x340 [ 1818.490838] p9_fd_create+0x98/0x4a0 [ 1818.491664] ? p9_conn_create+0x510/0x510 [ 1818.492595] ? p9_client_create+0x798/0x1230 [ 1818.493585] ? kfree+0xd7/0x340 [ 1818.494359] ? do_raw_spin_unlock+0x4f/0x220 [ 1818.495393] p9_client_create+0x7ff/0x1230 [ 1818.496355] ? p9_client_flush+0x430/0x430 [ 1818.497296] ? trace_hardirqs_on+0x5b/0x180 [ 1818.498267] ? lockdep_init_map_type+0x2c7/0x780 [ 1818.499307] ? __raw_spin_lock_init+0x36/0x110 [ 1818.500311] v9fs_session_init+0x1dd/0x1680 [ 1818.501268] ? lock_release+0x680/0x680 [ 1818.502153] ? kmem_cache_alloc_trace+0x151/0x320 [ 1818.503206] ? v9fs_show_options+0x690/0x690 [ 1818.504179] ? trace_hardirqs_on+0x5b/0x180 [ 1818.505118] ? kasan_unpoison_shadow+0x33/0x50 [ 1818.506130] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1818.507248] v9fs_mount+0x79/0x8f0 [ 1818.508035] ? v9fs_write_inode+0x60/0x60 [ 1818.508939] legacy_get_tree+0x105/0x220 [ 1818.509836] vfs_get_tree+0x8e/0x300 [ 1818.510661] path_mount+0x1331/0x21c0 [ 1818.511505] ? strncpy_from_user+0x9e/0x470 [ 1818.512451] ? finish_automount+0xa90/0xa90 [ 1818.513394] ? getname_flags.part.0+0x1dd/0x4f0 [ 1818.514418] ? _copy_from_user+0xfb/0x1b0 [ 1818.515329] __x64_sys_mount+0x282/0x300 [ 1818.516203] ? copy_mnt_ns+0xa00/0xa00 [ 1818.517057] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1818.518188] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1818.519293] do_syscall_64+0x33/0x40 [ 1818.520106] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1818.521221] RIP: 0033:0x7fbd09fc9b19 [ 1818.522024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1818.526475] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1818.528519] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1818.530440] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1818.532002] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1818.533545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1818.535109] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:15:27 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xf, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:27 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xe, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:27 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xd, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:15:27 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 18) 18:15:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 28) [ 1818.887926] FAULT_INJECTION: forcing a failure. [ 1818.887926] name failslab, interval 1, probability 0, space 0, times 0 [ 1818.889456] CPU: 1 PID: 10164 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1818.890248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1818.891191] Call Trace: [ 1818.891499] dump_stack+0x107/0x167 [ 1818.891910] should_fail.cold+0x5/0xa [ 1818.892342] should_failslab+0x5/0x20 [ 1818.892784] __kmalloc_track_caller+0x79/0x370 [ 1818.893311] ? v9fs_session_init+0xe9/0x1680 [ 1818.893814] ? kernel_text_address+0xf2/0x120 [ 1818.894336] kstrdup+0x36/0x70 [ 1818.894706] v9fs_session_init+0xe9/0x1680 [ 1818.895191] ? lock_release+0x680/0x680 [ 1818.895642] ? find_held_lock+0x2c/0x110 [ 1818.896110] ? kmem_cache_alloc_trace+0x151/0x320 [ 1818.896658] ? v9fs_show_options+0x690/0x690 [ 1818.897172] ? trace_hardirqs_on+0x5b/0x180 [ 1818.897665] ? kasan_unpoison_shadow+0x33/0x50 [ 1818.898216] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1818.898817] v9fs_mount+0x79/0x8f0 [ 1818.899234] ? v9fs_write_inode+0x60/0x60 [ 1818.899718] legacy_get_tree+0x105/0x220 [ 1818.900199] vfs_get_tree+0x8e/0x300 [ 1818.900642] path_mount+0x1331/0x21c0 [ 1818.901099] ? strncpy_from_user+0x9e/0x470 [ 1818.901606] ? finish_automount+0xa90/0xa90 [ 1818.902122] ? getname_flags.part.0+0x1dd/0x4f0 [ 1818.902667] ? _copy_from_user+0xfb/0x1b0 [ 1818.903158] __x64_sys_mount+0x282/0x300 [ 1818.903642] ? copy_mnt_ns+0xa00/0xa00 [ 1818.904107] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1818.904727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1818.905337] do_syscall_64+0x33/0x40 [ 1818.905777] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1818.906398] RIP: 0033:0x7fc4a8241b19 [ 1818.906836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1818.909015] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1818.909918] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1818.910768] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1818.911611] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1818.912455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1818.913299] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:15:27 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xf, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:15:27 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xc, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:15:27 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) [ 1819.018092] FAULT_INJECTION: forcing a failure. [ 1819.018092] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.020694] CPU: 0 PID: 10168 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1819.022194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.023962] Call Trace: [ 1819.024527] dump_stack+0x107/0x167 [ 1819.025312] should_fail.cold+0x5/0xa [ 1819.026160] should_failslab+0x5/0x20 [ 1819.026987] __kmalloc_track_caller+0x79/0x370 [ 1819.027961] ? match_number+0xaf/0x1d0 [ 1819.028792] kmemdup_nul+0x2d/0xa0 [ 1819.029543] match_number+0xaf/0x1d0 [ 1819.030365] ? match_u64+0x190/0x190 [ 1819.031166] ? __kmalloc_track_caller+0x2c6/0x370 [ 1819.032206] ? memcpy+0x39/0x60 [ 1819.032920] parse_opts.part.0+0x1f3/0x340 [ 1819.033820] ? p9_fd_show_options+0x1c0/0x1c0 [ 1819.034800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.035926] ? trace_hardirqs_on+0x5b/0x180 [ 1819.036940] ? kfree+0xd7/0x340 [ 1819.037832] p9_fd_create+0x98/0x4a0 [ 1819.038844] ? p9_conn_create+0x510/0x510 [ 1819.039928] ? p9_client_create+0x798/0x1230 [ 1819.041073] ? kfree+0xd7/0x340 [ 1819.041913] ? do_raw_spin_unlock+0x4f/0x220 [ 1819.042892] p9_client_create+0x7ff/0x1230 [ 1819.043794] ? p9_client_flush+0x430/0x430 [ 1819.044676] ? trace_hardirqs_on+0x5b/0x180 [ 1819.045587] ? lockdep_init_map_type+0x2c7/0x780 [ 1819.046605] ? __raw_spin_lock_init+0x36/0x110 [ 1819.047593] v9fs_session_init+0x1dd/0x1680 [ 1819.048506] ? lock_release+0x680/0x680 [ 1819.049356] ? kmem_cache_alloc_trace+0x151/0x320 [ 1819.050385] ? v9fs_show_options+0x690/0x690 [ 1819.051348] ? trace_hardirqs_on+0x5b/0x180 [ 1819.052272] ? kasan_unpoison_shadow+0x33/0x50 [ 1819.053238] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1819.054331] v9fs_mount+0x79/0x8f0 [ 1819.055105] ? v9fs_write_inode+0x60/0x60 [ 1819.055990] legacy_get_tree+0x105/0x220 [ 1819.056859] vfs_get_tree+0x8e/0x300 [ 1819.057629] path_mount+0x1331/0x21c0 [ 1819.058463] ? strncpy_from_user+0x9e/0x470 [ 1819.059388] ? finish_automount+0xa90/0xa90 [ 1819.060299] ? getname_flags.part.0+0x1dd/0x4f0 [ 1819.061279] ? _copy_from_user+0xfb/0x1b0 [ 1819.062178] __x64_sys_mount+0x282/0x300 [ 1819.063049] ? copy_mnt_ns+0xa00/0xa00 [ 1819.063895] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.065011] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.066131] do_syscall_64+0x33/0x40 [ 1819.066940] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1819.068035] RIP: 0033:0x7fbd09fc9b19 [ 1819.068837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.072779] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1819.074394] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1819.075936] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1819.077438] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1819.079032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1819.080543] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 1819.269177] 9pnet: Insufficient options for proto=fd 18:15:40 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 19) 18:15:40 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xe, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:15:40 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:40 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x13, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:40 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x8, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:15:40 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x10, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 29) 18:15:40 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x10, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) [ 1831.889424] FAULT_INJECTION: forcing a failure. [ 1831.889424] name failslab, interval 1, probability 0, space 0, times 0 [ 1831.891173] CPU: 0 PID: 10189 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1831.892079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1831.893184] Call Trace: [ 1831.893537] dump_stack+0x107/0x167 [ 1831.894028] should_fail.cold+0x5/0xa [ 1831.894553] ? create_object.isra.0+0x3a/0xa20 [ 1831.895154] should_failslab+0x5/0x20 [ 1831.895663] kmem_cache_alloc+0x5b/0x310 [ 1831.896214] create_object.isra.0+0x3a/0xa20 [ 1831.896786] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1831.897452] __kmalloc_track_caller+0x177/0x370 [ 1831.898073] ? v9fs_session_init+0xa7/0x1680 [ 1831.898672] ? kernel_text_address+0xf2/0x120 [ 1831.899273] kstrdup+0x36/0x70 [ 1831.899699] v9fs_session_init+0xa7/0x1680 [ 1831.900261] ? lock_release+0x680/0x680 [ 1831.900788] ? find_held_lock+0x2c/0x110 [ 1831.901343] ? kmem_cache_alloc_trace+0x151/0x320 [ 1831.901984] ? v9fs_show_options+0x690/0x690 [ 1831.902580] ? trace_hardirqs_on+0x5b/0x180 [ 1831.903148] ? kasan_unpoison_shadow+0x33/0x50 [ 1831.903758] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1831.904436] v9fs_mount+0x79/0x8f0 [ 1831.904896] ? v9fs_write_inode+0x60/0x60 [ 1831.905442] legacy_get_tree+0x105/0x220 [ 1831.905991] vfs_get_tree+0x8e/0x300 [ 1831.906493] path_mount+0x1331/0x21c0 [ 1831.907016] ? strncpy_from_user+0x9e/0x470 [ 1831.907590] ? finish_automount+0xa90/0xa90 [ 1831.908166] ? getname_flags.part.0+0x1dd/0x4f0 [ 1831.908796] ? _copy_from_user+0xfb/0x1b0 [ 1831.909352] __x64_sys_mount+0x282/0x300 [ 1831.909888] ? copy_mnt_ns+0xa00/0xa00 [ 1831.910409] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1831.911098] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1831.911646] FAULT_INJECTION: forcing a failure. [ 1831.911646] name failslab, interval 1, probability 0, space 0, times 0 [ 1831.911765] do_syscall_64+0x33/0x40 [ 1831.911777] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1831.911785] RIP: 0033:0x7fc4a8241b19 [ 1831.911796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1831.911801] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1831.911813] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1831.911819] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1831.911825] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1831.911831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1831.911837] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 [ 1831.931072] CPU: 1 PID: 10190 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1831.932537] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1831.934315] Call Trace: [ 1831.934888] dump_stack+0x107/0x167 [ 1831.935666] should_fail.cold+0x5/0xa [ 1831.936486] ? create_object.isra.0+0x3a/0xa20 [ 1831.937461] should_failslab+0x5/0x20 [ 1831.938282] kmem_cache_alloc+0x5b/0x310 [ 1831.939150] ? legacy_get_tree+0x105/0x220 [ 1831.940045] ? vfs_get_tree+0x8e/0x300 [ 1831.940881] create_object.isra.0+0x3a/0xa20 [ 1831.941818] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1831.942911] __kmalloc_track_caller+0x177/0x370 [ 1831.943896] ? parse_opts.part.0+0x8e/0x340 [ 1831.944804] kstrdup+0x36/0x70 [ 1831.945492] parse_opts.part.0+0x8e/0x340 [ 1831.946374] ? p9_fd_show_options+0x1c0/0x1c0 [ 1831.947333] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1831.948438] ? quarantine_put+0x8b/0x1a0 [ 1831.949296] ? trace_hardirqs_on+0x5b/0x180 [ 1831.950220] ? kfree+0xd7/0x340 [ 1831.950939] p9_fd_create+0x98/0x4a0 [ 1831.951731] ? p9_conn_create+0x510/0x510 [ 1831.952611] ? p9_client_create+0x798/0x1230 [ 1831.953546] ? kfree+0xd7/0x340 [ 1831.954246] ? do_raw_spin_unlock+0x4f/0x220 [ 1831.955184] p9_client_create+0x7ff/0x1230 [ 1831.956097] ? p9_client_flush+0x430/0x430 [ 1831.956994] ? trace_hardirqs_on+0x5b/0x180 [ 1831.957923] ? lockdep_init_map_type+0x2c7/0x780 [ 1831.958939] ? __raw_spin_lock_init+0x36/0x110 [ 1831.959922] v9fs_session_init+0x1dd/0x1680 [ 1831.960843] ? lock_release+0x680/0x680 [ 1831.961699] ? kmem_cache_alloc_trace+0x151/0x320 [ 1831.962734] ? v9fs_show_options+0x690/0x690 [ 1831.963673] ? trace_hardirqs_on+0x5b/0x180 [ 1831.964591] ? kasan_unpoison_shadow+0x33/0x50 [ 1831.965566] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1831.966658] v9fs_mount+0x79/0x8f0 [ 1831.967416] ? v9fs_write_inode+0x60/0x60 [ 1831.968292] legacy_get_tree+0x105/0x220 [ 1831.969156] vfs_get_tree+0x8e/0x300 [ 1831.969944] path_mount+0x1331/0x21c0 [ 1831.970767] ? strncpy_from_user+0x9e/0x470 [ 1831.971682] ? finish_automount+0xa90/0xa90 [ 1831.972597] ? getname_flags.part.0+0x1dd/0x4f0 [ 1831.973589] ? _copy_from_user+0xfb/0x1b0 [ 1831.974488] __x64_sys_mount+0x282/0x300 [ 1831.975351] ? copy_mnt_ns+0xa00/0xa00 [ 1831.976190] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1831.977308] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1831.978426] do_syscall_64+0x33/0x40 [ 1831.979215] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1831.980308] RIP: 0033:0x7fbd09fc9b19 [ 1831.981101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1831.985033] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1831.986679] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1831.988211] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1831.989737] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1831.991269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1831.992796] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:15:40 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:40 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 20) 18:15:40 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xf, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 1832.217560] FAULT_INJECTION: forcing a failure. [ 1832.217560] name failslab, interval 1, probability 0, space 0, times 0 [ 1832.218980] CPU: 0 PID: 10214 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1832.219754] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1832.220683] Call Trace: [ 1832.220985] dump_stack+0x107/0x167 [ 1832.221400] should_fail.cold+0x5/0xa [ 1832.221841] ? p9_client_create+0xaf/0x1230 [ 1832.222343] should_failslab+0x5/0x20 [ 1832.222781] kmem_cache_alloc_trace+0x55/0x320 [ 1832.223308] ? find_held_lock+0x2c/0x110 [ 1832.223780] p9_client_create+0xaf/0x1230 [ 1832.224254] ? lock_downgrade+0x6d0/0x6d0 [ 1832.224729] ? p9_client_flush+0x430/0x430 [ 1832.225213] ? trace_hardirqs_on+0x5b/0x180 [ 1832.225710] ? lockdep_init_map_type+0x2c7/0x780 [ 1832.226258] ? __raw_spin_lock_init+0x36/0x110 [ 1832.226784] v9fs_session_init+0x1dd/0x1680 [ 1832.227278] ? lock_release+0x680/0x680 [ 1832.227735] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1832.228345] ? trace_hardirqs_on+0x5b/0x180 [ 1832.228835] ? v9fs_show_options+0x690/0x690 [ 1832.229355] ? _raw_spin_unlock_irqrestore+0x25/0x40 [ 1832.229937] ? kasan_unpoison_shadow+0x33/0x50 [ 1832.230465] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1832.231046] v9fs_mount+0x79/0x8f0 [ 1832.231452] ? v9fs_write_inode+0x60/0x60 [ 1832.231930] legacy_get_tree+0x105/0x220 [ 1832.232399] vfs_get_tree+0x8e/0x300 [ 1832.232824] path_mount+0x1331/0x21c0 [ 1832.233265] ? strncpy_from_user+0x9e/0x470 [ 1832.233759] ? finish_automount+0xa90/0xa90 [ 1832.234272] ? getname_flags.part.0+0x1dd/0x4f0 [ 1832.234805] ? _copy_from_user+0xfb/0x1b0 [ 1832.235286] __x64_sys_mount+0x282/0x300 [ 1832.235748] ? copy_mnt_ns+0xa00/0xa00 [ 1832.236194] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1832.236798] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1832.237394] do_syscall_64+0x33/0x40 [ 1832.237822] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1832.238409] RIP: 0033:0x7fc4a8241b19 [ 1832.238831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1832.240944] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1832.241809] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1832.242633] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1832.243444] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1832.244255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1832.245070] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:15:41 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x7, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:15:41 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x11, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:15:41 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:41 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x11, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:41 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 21) [ 1832.472590] FAULT_INJECTION: forcing a failure. [ 1832.472590] name failslab, interval 1, probability 0, space 0, times 0 [ 1832.474073] CPU: 0 PID: 10229 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1832.474873] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1832.475827] Call Trace: [ 1832.476136] dump_stack+0x107/0x167 [ 1832.476558] should_fail.cold+0x5/0xa [ 1832.477004] ? create_object.isra.0+0x3a/0xa20 [ 1832.477525] should_failslab+0x5/0x20 [ 1832.477961] kmem_cache_alloc+0x5b/0x310 [ 1832.478438] create_object.isra.0+0x3a/0xa20 [ 1832.478946] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1832.479531] __kmalloc_track_caller+0x177/0x370 [ 1832.480071] ? v9fs_session_init+0xe9/0x1680 [ 1832.480576] ? kernel_text_address+0xf2/0x120 [ 1832.481094] kstrdup+0x36/0x70 [ 1832.481465] v9fs_session_init+0xe9/0x1680 [ 1832.481953] ? lock_release+0x680/0x680 [ 1832.482410] ? find_held_lock+0x2c/0x110 [ 1832.482880] ? kmem_cache_alloc_trace+0x151/0x320 [ 1832.483431] ? v9fs_show_options+0x690/0x690 [ 1832.483942] ? trace_hardirqs_on+0x5b/0x180 [ 1832.484436] ? kasan_unpoison_shadow+0x33/0x50 [ 1832.484968] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1832.485549] v9fs_mount+0x79/0x8f0 [ 1832.485959] ? v9fs_write_inode+0x60/0x60 [ 1832.486442] legacy_get_tree+0x105/0x220 [ 1832.486909] vfs_get_tree+0x8e/0x300 [ 1832.487331] path_mount+0x1331/0x21c0 [ 1832.487784] ? strncpy_from_user+0x9e/0x470 [ 1832.488280] ? finish_automount+0xa90/0xa90 [ 1832.488774] ? getname_flags.part.0+0x1dd/0x4f0 [ 1832.489304] ? _copy_from_user+0xfb/0x1b0 [ 1832.489786] __x64_sys_mount+0x282/0x300 [ 1832.490255] ? copy_mnt_ns+0xa00/0xa00 [ 1832.490705] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1832.491315] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1832.491901] do_syscall_64+0x33/0x40 [ 1832.492326] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1832.492909] RIP: 0033:0x7fc4a8241b19 [ 1832.493338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1832.495470] RSP: 002b:00007fc4a57b7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1832.496346] RAX: ffffffffffffffda RBX: 00007fc4a8354f60 RCX: 00007fc4a8241b19 [ 1832.497164] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1832.497984] RBP: 00007fc4a57b71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1832.498805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1832.499623] R13: 00007ffc2bcb700f R14: 00007fc4a57b7300 R15: 0000000000022000 18:15:41 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x14, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 30) [ 1832.544694] FAULT_INJECTION: forcing a failure. [ 1832.544694] name failslab, interval 1, probability 0, space 0, times 0 [ 1832.546250] CPU: 0 PID: 10236 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1832.547054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1832.548000] Call Trace: [ 1832.548312] dump_stack+0x107/0x167 [ 1832.548733] should_fail.cold+0x5/0xa [ 1832.549172] ? create_object.isra.0+0x3a/0xa20 [ 1832.549693] should_failslab+0x5/0x20 [ 1832.550133] kmem_cache_alloc+0x5b/0x310 [ 1832.550617] create_object.isra.0+0x3a/0xa20 [ 1832.551120] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1832.551702] __kmalloc_track_caller+0x177/0x370 [ 1832.552238] ? match_number+0xaf/0x1d0 [ 1832.552695] kmemdup_nul+0x2d/0xa0 [ 1832.553105] match_number+0xaf/0x1d0 [ 1832.553539] ? match_u64+0x190/0x190 [ 1832.553973] ? __kmalloc_track_caller+0x2c6/0x370 [ 1832.554526] ? memcpy+0x39/0x60 [ 1832.554908] parse_opts.part.0+0x1f3/0x340 [ 1832.555407] ? p9_fd_show_options+0x1c0/0x1c0 [ 1832.555934] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1832.556534] ? trace_hardirqs_on+0x5b/0x180 [ 1832.557036] ? kfree+0xd7/0x340 [ 1832.557416] p9_fd_create+0x98/0x4a0 [ 1832.557840] ? p9_conn_create+0x510/0x510 [ 1832.558317] ? p9_client_create+0x798/0x1230 [ 1832.558814] ? kfree+0xd7/0x340 [ 1832.559192] ? do_raw_spin_unlock+0x4f/0x220 [ 1832.559694] p9_client_create+0x7ff/0x1230 [ 1832.560193] ? p9_client_flush+0x430/0x430 [ 1832.560676] ? trace_hardirqs_on+0x5b/0x180 [ 1832.561170] ? lockdep_init_map_type+0x2c7/0x780 [ 1832.561709] ? __raw_spin_lock_init+0x36/0x110 [ 1832.562247] v9fs_session_init+0x1dd/0x1680 [ 1832.562741] ? lock_release+0x680/0x680 [ 1832.563212] ? kmem_cache_alloc_trace+0x151/0x320 [ 1832.563763] ? v9fs_show_options+0x690/0x690 [ 1832.564269] ? trace_hardirqs_on+0x5b/0x180 [ 1832.564760] ? kasan_unpoison_shadow+0x33/0x50 [ 1832.565292] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1832.565869] v9fs_mount+0x79/0x8f0 [ 1832.566278] ? v9fs_write_inode+0x60/0x60 [ 1832.566757] legacy_get_tree+0x105/0x220 [ 1832.567222] vfs_get_tree+0x8e/0x300 [ 1832.567661] path_mount+0x1331/0x21c0 [ 1832.568103] ? strncpy_from_user+0x9e/0x470 [ 1832.568604] ? finish_automount+0xa90/0xa90 [ 1832.569099] ? getname_flags.part.0+0x1dd/0x4f0 [ 1832.569629] ? _copy_from_user+0xfb/0x1b0 [ 1832.570101] __x64_sys_mount+0x282/0x300 [ 1832.570582] ? copy_mnt_ns+0xa00/0xa00 [ 1832.571033] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1832.571646] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1832.572231] do_syscall_64+0x33/0x40 [ 1832.572664] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1832.573252] RIP: 0033:0x7fbd09fc9b19 [ 1832.573679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1832.575783] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1832.576664] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1832.577484] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1832.578321] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1832.579156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1832.579979] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:15:41 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x10, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:15:55 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:55 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x10, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:15:55 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x15, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:15:55 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:15:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 31) 18:15:55 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:55 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x11, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:15:55 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 22) [ 1846.581656] FAULT_INJECTION: forcing a failure. [ 1846.581656] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.584326] CPU: 1 PID: 10262 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1846.585814] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1846.587600] Call Trace: [ 1846.588174] dump_stack+0x107/0x167 [ 1846.588958] should_fail.cold+0x5/0xa [ 1846.589774] ? create_object.isra.0+0x3a/0xa20 [ 1846.590763] should_failslab+0x5/0x20 [ 1846.591580] kmem_cache_alloc+0x5b/0x310 [ 1846.592462] create_object.isra.0+0x3a/0xa20 [ 1846.593408] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1846.594530] __kmalloc_track_caller+0x177/0x370 [ 1846.595644] ? match_number+0xaf/0x1d0 [ 1846.596581] kmemdup_nul+0x2d/0xa0 [ 1846.597436] match_number+0xaf/0x1d0 [ 1846.598327] ? match_u64+0x190/0x190 [ 1846.599151] ? __kmalloc_track_caller+0x2c6/0x370 [ 1846.600263] ? memcpy+0x39/0x60 [ 1846.601070] parse_opts.part.0+0x1f3/0x340 [ 1846.602085] ? p9_fd_show_options+0x1c0/0x1c0 [ 1846.603092] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1846.604309] ? trace_hardirqs_on+0x5b/0x180 [ 1846.605370] ? kfree+0xd7/0x340 [ 1846.606093] p9_fd_create+0x98/0x4a0 [ 1846.606948] ? p9_conn_create+0x510/0x510 [ 1846.607940] ? p9_client_create+0x798/0x1230 [ 1846.608948] ? kfree+0xd7/0x340 [ 1846.609671] ? do_raw_spin_unlock+0x4f/0x220 [ 1846.610753] p9_client_create+0x7ff/0x1230 [ 1846.611789] ? p9_client_flush+0x430/0x430 [ 1846.612814] ? trace_hardirqs_on+0x5b/0x180 [ 1846.613861] ? lockdep_init_map_type+0x2c7/0x780 [ 1846.614955] ? __raw_spin_lock_init+0x36/0x110 [ 1846.615996] v9fs_session_init+0x1dd/0x1680 [ 1846.617039] ? lock_release+0x680/0x680 [ 1846.618010] ? kmem_cache_alloc_trace+0x151/0x320 [ 1846.619187] ? v9fs_show_options+0x690/0x690 [ 1846.620252] ? trace_hardirqs_on+0x5b/0x180 [ 1846.621283] ? kasan_unpoison_shadow+0x33/0x50 [ 1846.622382] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1846.623615] v9fs_mount+0x79/0x8f0 [ 1846.624470] ? v9fs_write_inode+0x60/0x60 [ 1846.625483] legacy_get_tree+0x105/0x220 [ 1846.626357] vfs_get_tree+0x8e/0x300 [ 1846.627260] path_mount+0x1331/0x21c0 [ 1846.628190] ? strncpy_from_user+0x9e/0x470 [ 1846.629234] ? finish_automount+0xa90/0xa90 [ 1846.630276] ? getname_flags.part.0+0x1dd/0x4f0 [ 1846.631394] ? _copy_from_user+0xfb/0x1b0 [ 1846.632390] __x64_sys_mount+0x282/0x300 [ 1846.633353] ? copy_mnt_ns+0xa00/0xa00 [ 1846.634209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1846.635332] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.636548] do_syscall_64+0x33/0x40 [ 1846.637452] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1846.638565] RIP: 0033:0x7fbd09fc9b19 [ 1846.639358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1846.643766] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1846.645604] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1846.647240] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1846.648926] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1846.650650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1846.652255] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:15:55 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:15:55 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x11, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:15:55 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x10, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:16:09 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:16:09 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x2, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:09 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x13, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:16:09 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:09 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x13, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:16:09 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:16:09 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x13, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) [ 1860.795188] FAULT_INJECTION: forcing a failure. [ 1860.795188] name failslab, interval 1, probability 0, space 0, times 0 [ 1860.796716] CPU: 0 PID: 10306 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1860.797553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1860.798533] Call Trace: [ 1860.798857] dump_stack+0x107/0x167 [ 1860.799288] should_fail.cold+0x5/0xa [ 1860.799738] ? p9_fd_create+0x161/0x4a0 [ 1860.800211] should_failslab+0x5/0x20 [ 1860.800663] kmem_cache_alloc_trace+0x55/0x320 [ 1860.801206] p9_fd_create+0x161/0x4a0 [ 1860.801656] ? p9_conn_create+0x510/0x510 [ 1860.802147] ? p9_client_create+0x798/0x1230 [ 1860.802682] ? kfree+0xd7/0x340 [ 1860.803073] ? do_raw_spin_unlock+0x4f/0x220 [ 1860.803599] p9_client_create+0x7ff/0x1230 [ 1860.804108] ? p9_client_flush+0x430/0x430 [ 1860.804618] ? trace_hardirqs_on+0x5b/0x180 ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 32) [ 1860.805131] ? lockdep_init_map_type+0x2c7/0x780 [ 1860.805804] ? __raw_spin_lock_init+0x36/0x110 [ 1860.806355] v9fs_session_init+0x1dd/0x1680 [ 1860.806893] ? lock_release+0x680/0x680 [ 1860.807380] ? kmem_cache_alloc_trace+0x151/0x320 [ 1860.807955] ? v9fs_show_options+0x690/0x690 [ 1860.808483] ? trace_hardirqs_on+0x5b/0x180 [ 1860.809003] ? kasan_unpoison_shadow+0x33/0x50 [ 1860.809549] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1860.810159] v9fs_mount+0x79/0x8f0 [ 1860.810587] ? v9fs_write_inode+0x60/0x60 [ 1860.811081] legacy_get_tree+0x105/0x220 [ 1860.811564] vfs_get_tree+0x8e/0x300 [ 1860.812011] path_mount+0x1331/0x21c0 [ 1860.812477] ? strncpy_from_user+0x9e/0x470 [ 1860.813001] ? finish_automount+0xa90/0xa90 [ 1860.813509] ? getname_flags.part.0+0x1dd/0x4f0 [ 1860.814063] ? _copy_from_user+0xfb/0x1b0 [ 1860.814569] __x64_sys_mount+0x282/0x300 [ 1860.815055] ? copy_mnt_ns+0xa00/0xa00 [ 1860.815527] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1860.816159] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1860.816782] do_syscall_64+0x33/0x40 [ 1860.817233] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1860.817844] RIP: 0033:0x7fbd09fc9b19 [ 1860.818288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1860.820495] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1860.821422] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1860.822281] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1860.823139] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1860.823990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1860.824836] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:16:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 33) 18:16:09 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:09 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x13, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 1860.992117] FAULT_INJECTION: forcing a failure. [ 1860.992117] name failslab, interval 1, probability 0, space 0, times 0 [ 1860.993624] CPU: 0 PID: 10321 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1860.994422] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1860.995362] Call Trace: [ 1860.995668] dump_stack+0x107/0x167 [ 1860.996083] should_fail.cold+0x5/0xa [ 1860.996515] ? create_object.isra.0+0x3a/0xa20 [ 1860.997033] should_failslab+0x5/0x20 [ 1860.997459] kmem_cache_alloc+0x5b/0x310 [ 1860.997920] create_object.isra.0+0x3a/0xa20 [ 1860.998414] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1860.998997] __kmalloc_track_caller+0x177/0x370 [ 1860.999523] ? match_number+0xaf/0x1d0 [ 1860.999966] kmemdup_nul+0x2d/0xa0 [ 1861.000365] match_number+0xaf/0x1d0 [ 1861.000786] ? match_u64+0x190/0x190 [ 1861.001208] ? __kmalloc_track_caller+0x2c6/0x370 [ 1861.001756] ? memcpy+0x39/0x60 [ 1861.002137] parse_opts.part.0+0x1f3/0x340 [ 1861.002626] ? p9_fd_show_options+0x1c0/0x1c0 [ 1861.003145] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1861.003742] ? trace_hardirqs_on+0x5b/0x180 [ 1861.004235] ? kfree+0xd7/0x340 [ 1861.004618] p9_fd_create+0x98/0x4a0 [ 1861.005045] ? p9_conn_create+0x510/0x510 [ 1861.005517] ? p9_client_create+0x798/0x1230 [ 1861.006018] ? kfree+0xd7/0x340 [ 1861.006394] ? do_raw_spin_unlock+0x4f/0x220 [ 1861.006905] p9_client_create+0x7ff/0x1230 [ 1861.007391] ? p9_client_flush+0x430/0x430 [ 1861.007878] ? trace_hardirqs_on+0x5b/0x180 [ 1861.008373] ? lockdep_init_map_type+0x2c7/0x780 [ 1861.008917] ? __raw_spin_lock_init+0x36/0x110 [ 1861.009439] v9fs_session_init+0x1dd/0x1680 [ 1861.009931] ? lock_release+0x680/0x680 [ 1861.010388] ? kmem_cache_alloc_trace+0x151/0x320 [ 1861.010945] ? v9fs_show_options+0x690/0x690 [ 1861.011451] ? trace_hardirqs_on+0x5b/0x180 [ 1861.011945] ? kasan_unpoison_shadow+0x33/0x50 [ 1861.012466] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1861.013048] v9fs_mount+0x79/0x8f0 [ 1861.013455] ? v9fs_write_inode+0x60/0x60 [ 1861.013929] legacy_get_tree+0x105/0x220 [ 1861.014394] vfs_get_tree+0x8e/0x300 [ 1861.014830] path_mount+0x1331/0x21c0 [ 1861.015266] ? strncpy_from_user+0x9e/0x470 [ 1861.015757] ? finish_automount+0xa90/0xa90 [ 1861.016241] ? getname_flags.part.0+0x1dd/0x4f0 [ 1861.016765] ? _copy_from_user+0xfb/0x1b0 [ 1861.017233] __x64_sys_mount+0x282/0x300 [ 1861.017690] ? copy_mnt_ns+0xa00/0xa00 [ 1861.018130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1861.018729] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1861.019311] do_syscall_64+0x33/0x40 [ 1861.019733] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1861.020311] RIP: 0033:0x7fbd09fc9b19 [ 1861.020736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1861.022816] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1861.023672] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1861.024474] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1861.025277] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1861.026082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1861.026901] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:16:09 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x4, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 34) [ 1861.182687] FAULT_INJECTION: forcing a failure. [ 1861.182687] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.184117] CPU: 0 PID: 10332 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1861.184891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1861.185815] Call Trace: [ 1861.186122] dump_stack+0x107/0x167 [ 1861.186531] should_fail.cold+0x5/0xa [ 1861.186970] ? p9_client_prepare_req.part.0+0x3a/0xac0 [ 1861.187574] should_failslab+0x5/0x20 [ 1861.188004] kmem_cache_alloc+0x5b/0x310 [ 1861.188467] p9_client_prepare_req.part.0+0x3a/0xac0 [ 1861.189043] p9_client_rpc+0x220/0x1370 [ 1861.189490] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1861.190089] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1861.190697] ? pipe_poll+0x21b/0x800 [ 1861.191114] ? p9_fd_close+0x4a0/0x4a0 [ 1861.191551] ? wait_for_partner+0x3c0/0x3c0 [ 1861.192043] ? p9_fd_poll+0x1e0/0x2c0 [ 1861.192472] ? p9_fd_create+0x357/0x4a0 [ 1861.192918] ? p9_conn_create+0x510/0x510 [ 1861.193383] ? p9_client_create+0x798/0x1230 [ 1861.193879] ? kfree+0xd7/0x340 [ 1861.194247] ? do_raw_spin_unlock+0x4f/0x220 [ 1861.194753] p9_client_create+0xa76/0x1230 [ 1861.195235] ? p9_client_flush+0x430/0x430 [ 1861.195713] ? trace_hardirqs_on+0x5b/0x180 [ 1861.196197] ? lockdep_init_map_type+0x2c7/0x780 [ 1861.196731] ? __raw_spin_lock_init+0x36/0x110 [ 1861.197245] v9fs_session_init+0x1dd/0x1680 [ 1861.197730] ? lock_release+0x680/0x680 [ 1861.198181] ? kmem_cache_alloc_trace+0x151/0x320 [ 1861.198730] ? v9fs_show_options+0x690/0x690 [ 1861.199228] ? trace_hardirqs_on+0x5b/0x180 [ 1861.199713] ? kasan_unpoison_shadow+0x33/0x50 [ 1861.200224] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1861.200798] v9fs_mount+0x79/0x8f0 [ 1861.201202] ? v9fs_write_inode+0x60/0x60 [ 1861.201668] legacy_get_tree+0x105/0x220 [ 1861.202124] vfs_get_tree+0x8e/0x300 [ 1861.202543] path_mount+0x1331/0x21c0 [ 1861.202979] ? strncpy_from_user+0x9e/0x470 [ 1861.203464] ? finish_automount+0xa90/0xa90 [ 1861.203951] ? getname_flags.part.0+0x1dd/0x4f0 [ 1861.204486] ? _copy_from_user+0xfb/0x1b0 [ 1861.204957] __x64_sys_mount+0x282/0x300 [ 1861.205413] ? copy_mnt_ns+0xa00/0xa00 [ 1861.205853] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1861.206446] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1861.207040] do_syscall_64+0x33/0x40 [ 1861.207460] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1861.208037] RIP: 0033:0x7fbd09fc9b19 [ 1861.208456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1861.210524] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1861.211388] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1861.212187] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1861.212991] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1861.213800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1861.214616] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:16:10 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x5, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x4, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:10 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x14, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:22 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x14, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:16:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 35) 18:16:22 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x13, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:16:22 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x14, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:16:22 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x15, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:22 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x19, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:16:22 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x13, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:16:22 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x6, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) [ 1874.202388] FAULT_INJECTION: forcing a failure. [ 1874.202388] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.205008] CPU: 0 PID: 10361 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1874.206489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1874.208266] Call Trace: [ 1874.208836] dump_stack+0x107/0x167 [ 1874.209609] should_fail.cold+0x5/0xa [ 1874.210420] ? create_object.isra.0+0x3a/0xa20 [ 1874.211396] should_failslab+0x5/0x20 [ 1874.212205] kmem_cache_alloc+0x5b/0x310 [ 1874.213069] create_object.isra.0+0x3a/0xa20 [ 1874.214002] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1874.215089] kmem_cache_alloc+0x159/0x310 [ 1874.215976] p9_client_prepare_req.part.0+0x3a/0xac0 [ 1874.217060] p9_client_rpc+0x220/0x1370 [ 1874.217903] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1874.219025] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1874.220164] ? pipe_poll+0x21b/0x800 [ 1874.220953] ? p9_fd_close+0x4a0/0x4a0 [ 1874.221773] ? wait_for_partner+0x3c0/0x3c0 [ 1874.222680] ? p9_fd_poll+0x1e0/0x2c0 [ 1874.223495] ? p9_fd_create+0x357/0x4a0 [ 1874.224334] ? p9_conn_create+0x510/0x510 [ 1874.225209] ? p9_client_create+0x798/0x1230 [ 1874.226139] ? kfree+0xd7/0x340 [ 1874.226842] ? do_raw_spin_unlock+0x4f/0x220 [ 1874.227793] p9_client_create+0xa76/0x1230 [ 1874.228699] ? p9_client_flush+0x430/0x430 [ 1874.229608] ? trace_hardirqs_on+0x5b/0x180 [ 1874.230516] ? lockdep_init_map_type+0x2c7/0x780 [ 1874.231520] ? __raw_spin_lock_init+0x36/0x110 [ 1874.232503] v9fs_session_init+0x1dd/0x1680 [ 1874.233417] ? lock_release+0x680/0x680 [ 1874.234273] ? kmem_cache_alloc_trace+0x151/0x320 [ 1874.235311] ? v9fs_show_options+0x690/0x690 [ 1874.236249] ? trace_hardirqs_on+0x5b/0x180 [ 1874.237159] ? kasan_unpoison_shadow+0x33/0x50 [ 1874.238126] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1874.239217] v9fs_mount+0x79/0x8f0 [ 1874.239970] ? v9fs_write_inode+0x60/0x60 18:16:23 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x7, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) [ 1874.240844] legacy_get_tree+0x105/0x220 [ 1874.241828] vfs_get_tree+0x8e/0x300 [ 1874.242617] path_mount+0x1331/0x21c0 [ 1874.243446] ? strncpy_from_user+0x9e/0x470 [ 1874.244357] ? finish_automount+0xa90/0xa90 [ 1874.245272] ? getname_flags.part.0+0x1dd/0x4f0 [ 1874.246265] ? _copy_from_user+0xfb/0x1b0 [ 1874.247168] __x64_sys_mount+0x282/0x300 [ 1874.248031] ? copy_mnt_ns+0xa00/0xa00 [ 1874.248870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1874.249989] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1874.251094] do_syscall_64+0x33/0x40 [ 1874.251887] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1874.252978] RIP: 0033:0x7fbd09fc9b19 [ 1874.253770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1874.257704] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1874.259324] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1874.260838] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1874.262347] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1874.263857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1874.265374] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:16:23 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x8, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:23 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x14, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:23 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x9, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:23 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:16:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 36) 18:16:23 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x15, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:16:23 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) [ 1874.830057] FAULT_INJECTION: forcing a failure. [ 1874.830057] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.832928] CPU: 0 PID: 10392 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1874.834374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1874.836126] Call Trace: [ 1874.836690] dump_stack+0x107/0x167 [ 1874.837462] should_fail.cold+0x5/0xa [ 1874.838261] ? p9_fcall_init+0x97/0x290 [ 1874.839100] should_failslab+0x5/0x20 [ 1874.839900] __kmalloc+0x72/0x390 [ 1874.840628] p9_fcall_init+0x97/0x290 [ 1874.841430] p9_client_prepare_req.part.0+0x8c/0xac0 [ 1874.842495] p9_client_rpc+0x220/0x1370 [ 1874.843339] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1874.844444] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1874.845567] ? pipe_poll+0x21b/0x800 [ 1874.846340] ? p9_fd_close+0x4a0/0x4a0 [ 1874.847162] ? wait_for_partner+0x3c0/0x3c0 [ 1874.848069] ? p9_fd_poll+0x1e0/0x2c0 [ 1874.848878] ? p9_fd_create+0x357/0x4a0 [ 1874.849705] ? p9_conn_create+0x510/0x510 [ 1874.850564] ? p9_client_create+0x798/0x1230 [ 1874.851484] ? kfree+0xd7/0x340 [ 1874.852168] ? do_raw_spin_unlock+0x4f/0x220 [ 1874.853086] p9_client_create+0xa76/0x1230 [ 1874.853970] ? p9_client_flush+0x430/0x430 [ 1874.854856] ? trace_hardirqs_on+0x5b/0x180 [ 1874.855754] ? lockdep_init_map_type+0x2c7/0x780 [ 1874.856746] ? __raw_spin_lock_init+0x36/0x110 [ 1874.857704] v9fs_session_init+0x1dd/0x1680 [ 1874.858596] ? lock_release+0x680/0x680 [ 1874.859430] ? kmem_cache_alloc_trace+0x151/0x320 [ 1874.860428] ? v9fs_show_options+0x690/0x690 [ 1874.861350] ? trace_hardirqs_on+0x5b/0x180 [ 1874.862256] ? kasan_unpoison_shadow+0x33/0x50 [ 1874.863218] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1874.864275] v9fs_mount+0x79/0x8f0 [ 1874.865013] ? v9fs_write_inode+0x60/0x60 [ 1874.865871] legacy_get_tree+0x105/0x220 [ 1874.866708] vfs_get_tree+0x8e/0x300 [ 1874.867492] path_mount+0x1331/0x21c0 [ 1874.868281] ? strncpy_from_user+0x9e/0x470 [ 1874.869173] ? finish_automount+0xa90/0xa90 [ 1874.870062] ? getname_flags.part.0+0x1dd/0x4f0 [ 1874.871026] ? _copy_from_user+0xfb/0x1b0 [ 1874.871882] __x64_sys_mount+0x282/0x300 [ 1874.872713] ? copy_mnt_ns+0xa00/0xa00 [ 1874.873522] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1874.874603] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1874.875684] do_syscall_64+0x33/0x40 [ 1874.876467] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1874.877528] RIP: 0033:0x7fbd09fc9b19 [ 1874.878300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1874.882119] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1874.883685] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1874.885145] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1874.886605] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1874.888076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1874.889536] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:16:23 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1b, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:16:23 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x15, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:16:23 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xa, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:23 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xb, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:23 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:16:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 37) 18:16:38 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1c, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:16:38 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x19, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:38 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x12, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:38 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x14, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:38 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x10, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:38 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:16:38 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:16:38 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x2e, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) [ 1889.507406] FAULT_INJECTION: forcing a failure. [ 1889.507406] name failslab, interval 1, probability 0, space 0, times 0 [ 1889.508938] CPU: 0 PID: 10438 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1889.509811] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1889.510901] Call Trace: [ 1889.511242] dump_stack+0x107/0x167 [ 1889.511706] should_fail.cold+0x5/0xa [ 1889.512195] ? create_object.isra.0+0x3a/0xa20 [ 1889.512782] should_failslab+0x5/0x20 [ 1889.513267] kmem_cache_alloc+0x5b/0x310 [ 1889.513788] create_object.isra.0+0x3a/0xa20 [ 1889.514347] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1889.515011] __kmalloc+0x16e/0x390 [ 1889.515469] p9_fcall_init+0x97/0x290 [ 1889.515957] p9_client_prepare_req.part.0+0x8c/0xac0 [ 1889.516613] p9_client_rpc+0x220/0x1370 [ 1889.517122] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1889.517797] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1889.518481] ? pipe_poll+0x21b/0x800 [ 1889.518963] ? p9_fd_close+0x4a0/0x4a0 [ 1889.519462] ? wait_for_partner+0x3c0/0x3c0 [ 1889.520009] ? p9_fd_poll+0x1e0/0x2c0 [ 1889.520495] ? p9_fd_create+0x357/0x4a0 [ 1889.520999] ? p9_conn_create+0x510/0x510 [ 1889.521527] ? p9_client_create+0x798/0x1230 [ 1889.522094] ? kfree+0xd7/0x340 [ 1889.522514] ? do_raw_spin_unlock+0x4f/0x220 [ 1889.523087] p9_client_create+0xa76/0x1230 [ 1889.523632] ? p9_client_flush+0x430/0x430 [ 1889.524172] ? trace_hardirqs_on+0x5b/0x180 [ 1889.524721] ? lockdep_init_map_type+0x2c7/0x780 [ 1889.525325] ? __raw_spin_lock_init+0x36/0x110 [ 1889.525910] v9fs_session_init+0x1dd/0x1680 [ 1889.526461] ? lock_release+0x680/0x680 [ 1889.526978] ? kmem_cache_alloc_trace+0x151/0x320 [ 1889.527587] ? v9fs_show_options+0x690/0x690 [ 1889.528150] ? trace_hardirqs_on+0x5b/0x180 [ 1889.528697] ? kasan_unpoison_shadow+0x33/0x50 [ 1889.529274] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1889.529926] v9fs_mount+0x79/0x8f0 [ 1889.530378] ? v9fs_write_inode+0x60/0x60 [ 1889.530911] legacy_get_tree+0x105/0x220 [ 1889.531425] vfs_get_tree+0x8e/0x300 [ 1889.531904] path_mount+0x1331/0x21c0 [ 1889.532391] ? strncpy_from_user+0x9e/0x470 [ 1889.532935] ? finish_automount+0xa90/0xa90 [ 1889.533488] ? getname_flags.part.0+0x1dd/0x4f0 [ 1889.534085] ? _copy_from_user+0xfb/0x1b0 [ 1889.534613] __x64_sys_mount+0x282/0x300 [ 1889.535132] ? copy_mnt_ns+0xa00/0xa00 [ 1889.535629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1889.536293] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1889.536945] do_syscall_64+0x33/0x40 [ 1889.537416] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1889.538071] RIP: 0033:0x7fbd09fc9b19 [ 1889.538542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1889.540883] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1889.541851] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1889.542755] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1889.543669] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1889.544569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1889.545468] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:16:38 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:51 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x19, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 1902.942154] FAULT_INJECTION: forcing a failure. [ 1902.942154] name failslab, interval 1, probability 0, space 0, times 0 [ 1902.943864] CPU: 0 PID: 10474 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1902.944781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1902.945877] Call Trace: [ 1902.946231] dump_stack+0x107/0x167 [ 1902.946709] should_fail.cold+0x5/0xa [ 1902.947228] ? p9_fcall_init+0x97/0x290 [ 1902.947752] should_failslab+0x5/0x20 [ 1902.948253] __kmalloc+0x72/0x390 [ 1902.948710] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1902.949383] p9_fcall_init+0x97/0x290 [ 1902.949888] p9_client_prepare_req.part.0+0xf4/0xac0 [ 1902.950770] p9_client_rpc+0x220/0x1370 [ 1902.951314] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1902.952007] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1902.952708] ? pipe_poll+0x21b/0x800 [ 1902.953197] ? p9_fd_close+0x4a0/0x4a0 [ 1902.953708] ? wait_for_partner+0x3c0/0x3c0 [ 1902.954274] ? p9_fd_poll+0x1e0/0x2c0 [ 1902.954777] ? p9_fd_create+0x357/0x4a0 [ 1902.955311] ? p9_conn_create+0x510/0x510 [ 1902.955868] ? p9_client_create+0x798/0x1230 [ 1902.956453] ? kfree+0xd7/0x340 [ 1902.956895] ? do_raw_spin_unlock+0x4f/0x220 [ 1902.957478] p9_client_create+0xa76/0x1230 [ 1902.958049] ? p9_client_flush+0x430/0x430 [ 1902.958609] ? trace_hardirqs_on+0x5b/0x180 [ 1902.959186] ? lockdep_init_map_type+0x2c7/0x780 [ 1902.959808] ? __raw_spin_lock_init+0x36/0x110 [ 1902.960408] v9fs_session_init+0x1dd/0x1680 [ 1902.960975] ? lock_release+0x680/0x680 [ 1902.961503] ? kmem_cache_alloc_trace+0x151/0x320 [ 1902.962138] ? v9fs_show_options+0x690/0x690 [ 1902.962723] ? trace_hardirqs_on+0x5b/0x180 [ 1902.963301] ? kasan_unpoison_shadow+0x33/0x50 [ 1902.963904] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1902.964580] v9fs_mount+0x79/0x8f0 [ 1902.965051] ? v9fs_write_inode+0x60/0x60 [ 1902.965597] legacy_get_tree+0x105/0x220 [ 1902.966142] vfs_get_tree+0x8e/0x300 [ 1902.966627] path_mount+0x1331/0x21c0 [ 1902.967143] ? strncpy_from_user+0x9e/0x470 [ 1902.967705] ? finish_automount+0xa90/0xa90 [ 1902.968274] ? getname_flags.part.0+0x1dd/0x4f0 [ 1902.968888] ? _copy_from_user+0xfb/0x1b0 [ 1902.969445] __x64_sys_mount+0x282/0x300 [ 1902.969982] ? copy_mnt_ns+0xa00/0xa00 [ 1902.970498] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1902.971208] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1902.971886] do_syscall_64+0x33/0x40 [ 1902.972378] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1902.973055] RIP: 0033:0x7fbd09fc9b19 [ 1902.973547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1902.975991] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1902.976994] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1902.977944] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1902.978897] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1902.979863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1902.980790] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:16:51 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x19, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:16:51 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1d, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:16:51 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x48, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:51 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x9, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:16:51 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1b, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:51 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 38) 18:16:51 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x4c, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 39) 18:16:51 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x68, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:51 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1c, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:16:52 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x6c, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:52 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1b, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1903.258651] FAULT_INJECTION: forcing a failure. [ 1903.258651] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1903.262052] CPU: 1 PID: 10498 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1903.263672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1903.265570] Call Trace: [ 1903.266180] dump_stack+0x107/0x167 [ 1903.267023] should_fail.cold+0x5/0xa [ 1903.267910] __alloc_pages_nodemask+0x182/0x600 [ 1903.268977] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1903.270364] ? __kmalloc+0x379/0x390 [ 1903.271236] alloc_pages_current+0x187/0x280 [ 1903.272253] allocate_slab+0x26f/0x380 [ 1903.273150] ___slab_alloc+0x470/0x700 [ 1903.274045] ? p9_fcall_init+0x97/0x290 [ 1903.274969] ? p9_fcall_init+0x97/0x290 [ 1903.275888] ? __kmalloc+0x379/0x390 [ 1903.276737] ? p9_fcall_init+0x97/0x290 [ 1903.277647] __kmalloc+0x379/0x390 [ 1903.278469] p9_fcall_init+0x97/0x290 [ 1903.279357] p9_client_prepare_req.part.0+0xf4/0xac0 [ 1903.280522] p9_client_rpc+0x220/0x1370 [ 1903.281426] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1903.282624] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1903.283840] ? pipe_poll+0x21b/0x800 [ 1903.284681] ? p9_fd_close+0x4a0/0x4a0 [ 1903.285564] ? wait_for_partner+0x3c0/0x3c0 [ 1903.286534] ? p9_fd_poll+0x1e0/0x2c0 [ 1903.287409] ? p9_fd_create+0x357/0x4a0 [ 1903.288324] ? p9_conn_create+0x510/0x510 [ 1903.289264] ? p9_client_create+0x798/0x1230 [ 1903.290261] ? kfree+0xd7/0x340 [ 1903.291006] ? do_raw_spin_unlock+0x4f/0x220 [ 1903.292022] p9_client_create+0xa76/0x1230 [ 1903.292979] ? p9_client_flush+0x430/0x430 [ 1903.293933] ? trace_hardirqs_on+0x5b/0x180 [ 1903.294902] ? lockdep_init_map_type+0x2c7/0x780 [ 1903.295981] ? __raw_spin_lock_init+0x36/0x110 [ 1903.297012] v9fs_session_init+0x1dd/0x1680 [ 1903.297988] ? lock_release+0x680/0x680 [ 1903.298894] ? kmem_cache_alloc_trace+0x151/0x320 [ 1903.299982] ? v9fs_show_options+0x690/0x690 [ 1903.300983] ? trace_hardirqs_on+0x5b/0x180 [ 1903.301956] ? kasan_unpoison_shadow+0x33/0x50 [ 1903.302981] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1903.304129] v9fs_mount+0x79/0x8f0 [ 1903.304925] ? v9fs_write_inode+0x60/0x60 [ 1903.305847] legacy_get_tree+0x105/0x220 [ 1903.306751] vfs_get_tree+0x8e/0x300 [ 1903.307584] path_mount+0x1331/0x21c0 [ 1903.308438] ? strncpy_from_user+0x9e/0x470 [ 1903.309401] ? finish_automount+0xa90/0xa90 [ 1903.310358] ? getname_flags.part.0+0x1dd/0x4f0 [ 1903.311399] ? _copy_from_user+0xfb/0x1b0 [ 1903.312327] __x64_sys_mount+0x282/0x300 [ 1903.313229] ? copy_mnt_ns+0xa00/0xa00 [ 1903.314098] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1903.315279] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.316435] do_syscall_64+0x33/0x40 [ 1903.317255] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1903.318385] RIP: 0033:0x7fbd09fc9b19 [ 1903.319212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.323294] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1903.324969] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1903.326541] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1903.328121] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1903.329691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1903.331255] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:16:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x48, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:16:52 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x74, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:06 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x7a, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:06 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1b, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 1917.954358] FAULT_INJECTION: forcing a failure. [ 1917.954358] name failslab, interval 1, probability 0, space 0, times 0 18:17:06 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x19, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:17:06 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x2) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:17:06 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1d, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:17:06 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1c, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 40) 18:17:06 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) [ 1917.956118] CPU: 0 PID: 10533 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1917.957254] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1917.958469] Call Trace: [ 1917.958861] dump_stack+0x107/0x167 [ 1917.959406] should_fail.cold+0x5/0xa [ 1917.959972] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1917.960821] should_failslab+0x5/0x20 [ 1917.961386] kmem_cache_alloc+0x5b/0x310 [ 1917.961987] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1917.962811] idr_get_free+0x4b5/0x8f0 [ 1917.963376] idr_alloc_u32+0x170/0x2d0 [ 1917.963937] ? __fprop_inc_percpu_max+0x130/0x130 [ 1917.964639] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1917.965419] ? lock_release+0x680/0x680 [ 1917.966000] idr_alloc+0xc2/0x130 [ 1917.966505] ? idr_alloc_u32+0x2d0/0x2d0 [ 1917.967101] ? rwlock_bug.part.0+0x90/0x90 [ 1917.967728] p9_client_prepare_req.part.0+0x612/0xac0 [ 1917.968488] p9_client_rpc+0x220/0x1370 [ 1917.969068] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1917.969839] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1917.970626] ? pipe_poll+0x21b/0x800 [ 1917.971164] ? p9_fd_close+0x4a0/0x4a0 [ 1917.971745] ? wait_for_partner+0x3c0/0x3c0 [ 1917.972373] ? p9_fd_poll+0x1e0/0x2c0 [ 1917.972929] ? p9_fd_create+0x357/0x4a0 [ 1917.973506] ? p9_conn_create+0x510/0x510 [ 1917.974113] ? p9_client_create+0x798/0x1230 [ 1917.974759] ? kfree+0xd7/0x340 [ 1917.975248] ? do_raw_spin_unlock+0x4f/0x220 [ 1917.975896] p9_client_create+0xa76/0x1230 [ 1917.976523] ? p9_client_flush+0x430/0x430 [ 1917.977138] ? trace_hardirqs_on+0x5b/0x180 [ 1917.977774] ? lockdep_init_map_type+0x2c7/0x780 [ 1917.978473] ? __raw_spin_lock_init+0x36/0x110 [ 1917.979146] v9fs_session_init+0x1dd/0x1680 [ 1917.979788] ? lock_release+0x680/0x680 [ 1917.980375] ? kmem_cache_alloc_trace+0x151/0x320 [ 1917.981076] ? v9fs_show_options+0x690/0x690 [ 1917.981711] ? trace_hardirqs_on+0x5b/0x180 [ 1917.982333] ? kasan_unpoison_shadow+0x33/0x50 [ 1917.982991] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1917.983740] v9fs_mount+0x79/0x8f0 [ 1917.984252] ? v9fs_write_inode+0x60/0x60 [ 1917.984852] legacy_get_tree+0x105/0x220 [ 1917.985435] vfs_get_tree+0x8e/0x300 [ 1917.985973] path_mount+0x1331/0x21c0 [ 1917.986526] ? strncpy_from_user+0x9e/0x470 [ 1917.987148] ? finish_automount+0xa90/0xa90 [ 1917.987775] ? getname_flags.part.0+0x1dd/0x4f0 [ 1917.988439] ? _copy_from_user+0xfb/0x1b0 [ 1917.989043] __x64_sys_mount+0x282/0x300 [ 1917.989628] ? copy_mnt_ns+0xa00/0xa00 [ 1917.990196] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1917.990956] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1917.991702] do_syscall_64+0x33/0x40 [ 1917.992237] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1917.992971] RIP: 0033:0x7fbd09fc9b19 [ 1917.993513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1917.996180] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1917.997269] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1917.998283] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1917.999315] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1918.000322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1918.001333] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:17:06 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x300, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:06 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1d, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:06 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) 18:17:07 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x500, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:07 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x600, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:07 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x2) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:07 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x500, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 41) [ 1918.551663] FAULT_INJECTION: forcing a failure. [ 1918.551663] name failslab, interval 1, probability 0, space 0, times 0 [ 1918.553025] CPU: 0 PID: 10576 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1918.553809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1918.554796] Call Trace: [ 1918.555102] dump_stack+0x107/0x167 [ 1918.555546] should_fail.cold+0x5/0xa [ 1918.555986] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1918.556669] should_failslab+0x5/0x20 [ 1918.557104] kmem_cache_alloc+0x5b/0x310 [ 1918.557589] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1918.558232] idr_get_free+0x4b5/0x8f0 [ 1918.558687] idr_alloc_u32+0x170/0x2d0 [ 1918.559152] ? __fprop_inc_percpu_max+0x130/0x130 [ 1918.559730] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1918.560374] ? lock_release+0x680/0x680 [ 1918.560829] idr_alloc+0xc2/0x130 [ 1918.561241] ? idr_alloc_u32+0x2d0/0x2d0 [ 1918.561720] ? rwlock_bug.part.0+0x90/0x90 [ 1918.562228] p9_client_prepare_req.part.0+0x612/0xac0 [ 1918.562821] p9_client_rpc+0x220/0x1370 [ 1918.563304] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1918.563930] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1918.564541] ? pipe_poll+0x21b/0x800 [ 1918.564981] ? p9_fd_close+0x4a0/0x4a0 [ 1918.565424] ? wait_for_partner+0x3c0/0x3c0 [ 1918.565935] ? p9_fd_poll+0x1e0/0x2c0 [ 1918.566380] ? p9_fd_create+0x357/0x4a0 [ 1918.566851] ? p9_conn_create+0x510/0x510 [ 1918.567348] ? p9_client_create+0x798/0x1230 [ 1918.567869] ? kfree+0xd7/0x340 [ 1918.568259] ? do_raw_spin_unlock+0x4f/0x220 [ 1918.568787] p9_client_create+0xa76/0x1230 [ 1918.569292] ? p9_client_flush+0x430/0x430 [ 1918.569796] ? trace_hardirqs_on+0x5b/0x180 [ 1918.570307] ? lockdep_init_map_type+0x2c7/0x780 [ 1918.570867] ? __raw_spin_lock_init+0x36/0x110 [ 1918.571417] v9fs_session_init+0x1dd/0x1680 [ 1918.571934] ? lock_release+0x680/0x680 [ 1918.572410] ? kmem_cache_alloc_trace+0x151/0x320 [ 1918.572983] ? v9fs_show_options+0x690/0x690 [ 1918.573513] ? trace_hardirqs_on+0x5b/0x180 [ 1918.574025] ? kasan_unpoison_shadow+0x33/0x50 [ 1918.574565] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1918.575168] v9fs_mount+0x79/0x8f0 [ 1918.575599] ? v9fs_write_inode+0x60/0x60 [ 1918.576092] legacy_get_tree+0x105/0x220 [ 1918.576573] vfs_get_tree+0x8e/0x300 [ 1918.577018] path_mount+0x1331/0x21c0 [ 1918.577470] ? strncpy_from_user+0x9e/0x470 [ 1918.577979] ? finish_automount+0xa90/0xa90 [ 1918.578488] ? getname_flags.part.0+0x1dd/0x4f0 [ 1918.579037] ? _copy_from_user+0xfb/0x1b0 [ 1918.579536] __x64_sys_mount+0x282/0x300 [ 1918.580019] ? copy_mnt_ns+0xa00/0xa00 [ 1918.580480] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1918.581104] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1918.581713] do_syscall_64+0x33/0x40 [ 1918.582154] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1918.582759] RIP: 0033:0x7fbd09fc9b19 [ 1918.583199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1918.585380] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1918.586279] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1918.587124] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1918.587972] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1918.588815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1918.589657] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:17:20 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x700, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:20 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x2) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:17:20 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x3) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:17:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x600, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 42) 18:17:20 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x3) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:20 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1c, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:17:20 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 1932.010060] FAULT_INJECTION: forcing a failure. [ 1932.010060] name failslab, interval 1, probability 0, space 0, times 0 [ 1932.012441] CPU: 0 PID: 10598 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1932.013892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1932.015639] Call Trace: [ 1932.016193] dump_stack+0x107/0x167 [ 1932.016969] should_fail.cold+0x5/0xa [ 1932.017776] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1932.018980] should_failslab+0x5/0x20 [ 1932.019796] kmem_cache_alloc+0x5b/0x310 [ 1932.020649] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1932.021826] idr_get_free+0x4b5/0x8f0 [ 1932.022636] idr_alloc_u32+0x170/0x2d0 [ 1932.023461] ? __fprop_inc_percpu_max+0x130/0x130 [ 1932.024500] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1932.025608] ? lock_release+0x680/0x680 [ 1932.026451] idr_alloc+0xc2/0x130 [ 1932.027165] ? idr_alloc_u32+0x2d0/0x2d0 [ 1932.028055] ? rwlock_bug.part.0+0x90/0x90 [ 1932.028955] p9_client_prepare_req.part.0+0x612/0xac0 [ 1932.030050] p9_client_rpc+0x220/0x1370 [ 1932.030884] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1932.032027] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1932.033140] ? pipe_poll+0x21b/0x800 [ 1932.033926] ? p9_fd_close+0x4a0/0x4a0 [ 1932.034744] ? wait_for_partner+0x3c0/0x3c0 [ 1932.035670] ? p9_fd_poll+0x1e0/0x2c0 [ 1932.036486] ? p9_fd_create+0x357/0x4a0 [ 1932.037339] ? p9_conn_create+0x510/0x510 [ 1932.038220] ? p9_client_create+0x798/0x1230 [ 1932.039155] ? kfree+0xd7/0x340 [ 1932.039864] ? do_raw_spin_unlock+0x4f/0x220 [ 1932.040818] p9_client_create+0xa76/0x1230 [ 1932.041736] ? p9_client_flush+0x430/0x430 [ 1932.042645] ? trace_hardirqs_on+0x5b/0x180 [ 1932.043576] ? lockdep_init_map_type+0x2c7/0x780 [ 1932.044589] ? __raw_spin_lock_init+0x36/0x110 [ 1932.045571] v9fs_session_init+0x1dd/0x1680 [ 1932.046494] ? lock_release+0x680/0x680 [ 1932.047349] ? kmem_cache_alloc_trace+0x151/0x320 [ 1932.048390] ? v9fs_show_options+0x690/0x690 [ 1932.049339] ? trace_hardirqs_on+0x5b/0x180 [ 1932.050261] ? kasan_unpoison_shadow+0x33/0x50 [ 1932.051243] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1932.052345] v9fs_mount+0x79/0x8f0 [ 1932.053108] ? v9fs_write_inode+0x60/0x60 [ 1932.053981] legacy_get_tree+0x105/0x220 [ 1932.054829] vfs_get_tree+0x8e/0x300 [ 1932.055616] path_mount+0x1331/0x21c0 [ 1932.056425] ? strncpy_from_user+0x9e/0x470 [ 1932.057326] ? finish_automount+0xa90/0xa90 [ 1932.058255] ? getname_flags.part.0+0x1dd/0x4f0 [ 1932.059227] ? _copy_from_user+0xfb/0x1b0 [ 1932.060115] __x64_sys_mount+0x282/0x300 [ 1932.060960] ? copy_mnt_ns+0xa00/0xa00 [ 1932.061775] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1932.062877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1932.063975] do_syscall_64+0x33/0x40 [ 1932.064775] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1932.065859] RIP: 0033:0x7fbd09fc9b19 [ 1932.066641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1932.070521] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1932.072134] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1932.073662] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1932.075197] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1932.076737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1932.078267] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:17:20 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x900, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:20 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1b, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:17:21 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xa00, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:21 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) 18:17:21 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:21 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xb00, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 43) 18:17:21 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x3) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) [ 1932.689409] FAULT_INJECTION: forcing a failure. 18:17:21 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x3) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1932.689409] name failslab, interval 1, probability 0, space 0, times 0 [ 1932.691901] CPU: 0 PID: 10630 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1932.693350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1932.695073] Call Trace: [ 1932.695635] dump_stack+0x107/0x167 [ 1932.696405] should_fail.cold+0x5/0xa [ 1932.697209] ? create_object.isra.0+0x3a/0xa20 [ 1932.698159] should_failslab+0x5/0x20 [ 1932.698958] kmem_cache_alloc+0x5b/0x310 [ 1932.699817] create_object.isra.0+0x3a/0xa20 [ 1932.700735] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1932.701806] kmem_cache_alloc+0x159/0x310 [ 1932.702665] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1932.703846] idr_get_free+0x4b5/0x8f0 [ 1932.704653] idr_alloc_u32+0x170/0x2d0 [ 1932.705475] ? __fprop_inc_percpu_max+0x130/0x130 [ 1932.706482] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1932.707620] ? lock_release+0x680/0x680 [ 1932.708463] idr_alloc+0xc2/0x130 [ 1932.709190] ? idr_alloc_u32+0x2d0/0x2d0 [ 1932.710026] ? rwlock_bug.part.0+0x90/0x90 [ 1932.710923] p9_client_prepare_req.part.0+0x612/0xac0 [ 1932.712003] p9_client_rpc+0x220/0x1370 [ 1932.712837] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1932.713939] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1932.715091] ? pipe_poll+0x21b/0x800 [ 1932.715879] ? p9_fd_close+0x4a0/0x4a0 [ 1932.716720] ? wait_for_partner+0x3c0/0x3c0 [ 1932.717627] ? p9_fd_poll+0x1e0/0x2c0 [ 1932.718452] ? p9_fd_create+0x357/0x4a0 [ 1932.719281] ? p9_conn_create+0x510/0x510 [ 1932.720176] ? p9_client_create+0x798/0x1230 [ 1932.721120] ? kfree+0xd7/0x340 [ 1932.721807] ? do_raw_spin_unlock+0x4f/0x220 [ 1932.722765] p9_client_create+0xa76/0x1230 [ 1932.723665] ? p9_client_flush+0x430/0x430 [ 1932.724581] ? trace_hardirqs_on+0x5b/0x180 [ 1932.725486] ? lockdep_init_map_type+0x2c7/0x780 [ 1932.726504] ? __raw_spin_lock_init+0x36/0x110 [ 1932.727479] v9fs_session_init+0x1dd/0x1680 [ 1932.728409] ? lock_release+0x680/0x680 [ 1932.729259] ? kmem_cache_alloc_trace+0x151/0x320 [ 1932.730290] ? v9fs_show_options+0x690/0x690 [ 1932.731223] ? trace_hardirqs_on+0x5b/0x180 [ 1932.732163] ? kasan_unpoison_shadow+0x33/0x50 [ 1932.733119] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1932.734212] v9fs_mount+0x79/0x8f0 [ 1932.734959] ? v9fs_write_inode+0x60/0x60 [ 1932.735861] legacy_get_tree+0x105/0x220 [ 1932.736738] vfs_get_tree+0x8e/0x300 [ 1932.737542] path_mount+0x1331/0x21c0 [ 1932.738366] ? strncpy_from_user+0x9e/0x470 [ 1932.739299] ? finish_automount+0xa90/0xa90 [ 1932.740240] ? getname_flags.part.0+0x1dd/0x4f0 [ 1932.741248] ? _copy_from_user+0xfb/0x1b0 [ 1932.742148] __x64_sys_mount+0x282/0x300 [ 1932.743023] ? copy_mnt_ns+0xa00/0xa00 [ 1932.743879] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1932.745007] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1932.746119] do_syscall_64+0x33/0x40 [ 1932.746928] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1932.748043] RIP: 0033:0x7fbd09fc9b19 [ 1932.748845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1932.752822] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1932.754467] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1932.756018] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1932.757555] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1932.759101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1932.760648] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:17:40 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:17:40 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x5) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:40 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x1020, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:40 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1d, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:17:40 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) 18:17:40 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:17:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 44) 18:17:40 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1c, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:17:40 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x2000, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) [ 1951.667544] FAULT_INJECTION: forcing a failure. [ 1951.667544] name failslab, interval 1, probability 0, space 0, times 0 [ 1951.670001] CPU: 1 PID: 10655 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1951.671491] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1951.673287] Call Trace: [ 1951.673852] dump_stack+0x107/0x167 [ 1951.674642] should_fail.cold+0x5/0xa [ 1951.675472] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1951.676712] should_failslab+0x5/0x20 [ 1951.677528] kmem_cache_alloc+0x5b/0x310 [ 1951.678408] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1951.679608] idr_get_free+0x4b5/0x8f0 [ 1951.680436] idr_alloc_u32+0x170/0x2d0 [ 1951.681276] ? __fprop_inc_percpu_max+0x130/0x130 [ 1951.682291] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1951.683447] ? lock_release+0x680/0x680 [ 1951.684320] idr_alloc+0xc2/0x130 [ 1951.685059] ? idr_alloc_u32+0x2d0/0x2d0 [ 1951.685926] ? rwlock_bug.part.0+0x90/0x90 [ 1951.686851] p9_client_prepare_req.part.0+0x612/0xac0 [ 1951.687977] p9_client_rpc+0x220/0x1370 [ 1951.688830] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1951.689973] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1951.691123] ? pipe_poll+0x21b/0x800 [ 1951.691933] ? p9_fd_close+0x4a0/0x4a0 [ 1951.692774] ? wait_for_partner+0x3c0/0x3c0 [ 1951.693712] ? p9_fd_poll+0x1e0/0x2c0 [ 1951.694538] ? p9_fd_create+0x357/0x4a0 [ 1951.695398] ? p9_conn_create+0x510/0x510 [ 1951.696305] ? p9_client_create+0x798/0x1230 [ 1951.697257] ? kfree+0xd7/0x340 [ 1951.697962] ? do_raw_spin_unlock+0x4f/0x220 [ 1951.698929] p9_client_create+0xa76/0x1230 [ 1951.699865] ? p9_client_flush+0x430/0x430 [ 1951.700778] ? trace_hardirqs_on+0x5b/0x180 [ 1951.701715] ? lockdep_init_map_type+0x2c7/0x780 [ 1951.702742] ? __raw_spin_lock_init+0x36/0x110 [ 1951.703753] v9fs_session_init+0x1dd/0x1680 [ 1951.704691] ? lock_release+0x680/0x680 [ 1951.705565] ? kmem_cache_alloc_trace+0x151/0x320 [ 1951.706613] ? v9fs_show_options+0x690/0x690 [ 1951.707583] ? trace_hardirqs_on+0x5b/0x180 [ 1951.708532] ? kasan_unpoison_shadow+0x33/0x50 [ 1951.709529] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1951.710636] v9fs_mount+0x79/0x8f0 [ 1951.711408] ? v9fs_write_inode+0x60/0x60 [ 1951.712319] legacy_get_tree+0x105/0x220 [ 1951.713207] vfs_get_tree+0x8e/0x300 [ 1951.714012] path_mount+0x1331/0x21c0 [ 1951.714843] ? strncpy_from_user+0x9e/0x470 [ 1951.715784] ? finish_automount+0xa90/0xa90 [ 1951.716719] ? getname_flags.part.0+0x1dd/0x4f0 [ 1951.717727] ? _copy_from_user+0xfb/0x1b0 [ 1951.718635] __x64_sys_mount+0x282/0x300 [ 1951.719516] ? copy_mnt_ns+0xa00/0xa00 [ 1951.720366] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1951.721501] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1951.722617] do_syscall_64+0x33/0x40 [ 1951.723417] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1951.724534] RIP: 0033:0x7fbd09fc9b19 [ 1951.725341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1951.729332] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1951.730982] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1951.732533] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1951.734074] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1951.735633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1951.737162] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:17:40 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x2010, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:40 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x2e00, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:40 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) 18:17:40 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x5) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:17:40 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:40 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:17:40 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) 18:17:41 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3f00, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 45) 18:17:41 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) [ 1952.295485] FAULT_INJECTION: forcing a failure. [ 1952.295485] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.297772] CPU: 1 PID: 10697 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1952.299151] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.300808] Call Trace: [ 1952.301336] dump_stack+0x107/0x167 [ 1952.302055] should_fail.cold+0x5/0xa [ 1952.302807] ? create_object.isra.0+0x3a/0xa20 [ 1952.303729] should_failslab+0x5/0x20 [ 1952.304485] kmem_cache_alloc+0x5b/0x310 [ 1952.305285] create_object.isra.0+0x3a/0xa20 [ 1952.306145] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.307150] kmem_cache_alloc+0x159/0x310 [ 1952.307992] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1952.309094] idr_get_free+0x4b5/0x8f0 [ 1952.309861] idr_alloc_u32+0x170/0x2d0 [ 1952.310637] ? __fprop_inc_percpu_max+0x130/0x130 [ 1952.311596] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1952.312669] ? lock_release+0x680/0x680 [ 1952.313453] idr_alloc+0xc2/0x130 [ 1952.314140] ? idr_alloc_u32+0x2d0/0x2d0 [ 1952.314935] ? rwlock_bug.part.0+0x90/0x90 [ 1952.315789] p9_client_prepare_req.part.0+0x612/0xac0 [ 1952.316816] p9_client_rpc+0x220/0x1370 [ 1952.317601] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.318638] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1952.319693] ? pipe_poll+0x21b/0x800 [ 1952.320417] ? p9_fd_close+0x4a0/0x4a0 [ 1952.321172] ? wait_for_partner+0x3c0/0x3c0 [ 1952.322015] ? p9_fd_poll+0x1e0/0x2c0 [ 1952.322763] ? p9_fd_create+0x357/0x4a0 [ 1952.323534] ? p9_conn_create+0x510/0x510 [ 1952.324353] ? p9_client_create+0x798/0x1230 [ 1952.325218] ? kfree+0xd7/0x340 [ 1952.325858] ? do_raw_spin_unlock+0x4f/0x220 [ 1952.326728] p9_client_create+0xa76/0x1230 [ 1952.327586] ? p9_client_flush+0x430/0x430 [ 1952.328427] ? trace_hardirqs_on+0x5b/0x180 [ 1952.329270] ? lockdep_init_map_type+0x2c7/0x780 [ 1952.330203] ? __raw_spin_lock_init+0x36/0x110 [ 1952.331100] v9fs_session_init+0x1dd/0x1680 [ 1952.331956] ? lock_release+0x680/0x680 [ 1952.332747] ? kmem_cache_alloc_trace+0x151/0x320 [ 1952.333689] ? v9fs_show_options+0x690/0x690 [ 1952.334556] ? trace_hardirqs_on+0x5b/0x180 [ 1952.335408] ? kasan_unpoison_shadow+0x33/0x50 [ 1952.336314] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.337314] v9fs_mount+0x79/0x8f0 [ 1952.338009] ? v9fs_write_inode+0x60/0x60 [ 1952.338818] legacy_get_tree+0x105/0x220 [ 1952.339628] vfs_get_tree+0x8e/0x300 [ 1952.340351] path_mount+0x1331/0x21c0 [ 1952.341097] ? strncpy_from_user+0x9e/0x470 [ 1952.341931] ? finish_automount+0xa90/0xa90 [ 1952.342767] ? getname_flags.part.0+0x1dd/0x4f0 [ 1952.343678] ? _copy_from_user+0xfb/0x1b0 [ 1952.344493] __x64_sys_mount+0x282/0x300 [ 1952.345275] ? copy_mnt_ns+0xa00/0xa00 [ 1952.346029] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.347054] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.348065] do_syscall_64+0x33/0x40 [ 1952.348790] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1952.349782] RIP: 0033:0x7fbd09fc9b19 [ 1952.350498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.354065] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1952.355544] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1952.356936] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1952.358325] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1952.359716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.361092] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:17:41 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 18:17:41 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x5) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:17:41 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x4000, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:41 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x3) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:17:41 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x2) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:17:41 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:41 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x4084, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:41 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) 18:17:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 46) [ 1952.842983] FAULT_INJECTION: forcing a failure. [ 1952.842983] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.844857] CPU: 1 PID: 10727 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1952.845832] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.846978] Call Trace: [ 1952.847357] dump_stack+0x107/0x167 [ 1952.847873] should_fail.cold+0x5/0xa [ 1952.848390] ? p9pdu_readf+0xadb/0x1d40 [ 1952.848932] should_failslab+0x5/0x20 [ 1952.849455] __kmalloc+0x72/0x390 [ 1952.849929] p9pdu_readf+0xadb/0x1d40 [ 1952.850454] ? pipe_poll+0x21b/0x800 [ 1952.850958] ? p9pdu_writef+0x100/0x100 [ 1952.851499] ? p9_fd_poll+0x1e0/0x2c0 [ 1952.852031] ? p9_fd_create+0x357/0x4a0 [ 1952.852572] ? p9_conn_create+0x510/0x510 [ 1952.853163] ? p9_client_create+0x798/0x1230 [ 1952.853778] ? kfree+0xd7/0x340 [ 1952.854227] ? do_raw_spin_unlock+0x4f/0x220 [ 1952.854831] p9_client_create+0xaee/0x1230 [ 1952.855422] ? p9_client_flush+0x430/0x430 [ 1952.856007] ? trace_hardirqs_on+0x5b/0x180 [ 1952.856598] ? lockdep_init_map_type+0x2c7/0x780 [ 1952.857242] ? __raw_spin_lock_init+0x36/0x110 [ 1952.857870] v9fs_session_init+0x1dd/0x1680 [ 1952.858452] ? lock_release+0x680/0x680 [ 1952.858996] ? kmem_cache_alloc_trace+0x151/0x320 [ 1952.859655] ? v9fs_show_options+0x690/0x690 [ 1952.860253] ? trace_hardirqs_on+0x5b/0x180 [ 1952.860838] ? kasan_unpoison_shadow+0x33/0x50 [ 1952.861456] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.862144] v9fs_mount+0x79/0x8f0 [ 1952.862630] ? v9fs_write_inode+0x60/0x60 [ 1952.863196] legacy_get_tree+0x105/0x220 [ 1952.863758] vfs_get_tree+0x8e/0x300 [ 1952.864272] path_mount+0x1331/0x21c0 [ 1952.864796] ? strncpy_from_user+0x9e/0x470 [ 1952.865381] ? finish_automount+0xa90/0xa90 [ 1952.865964] ? getname_flags.part.0+0x1dd/0x4f0 [ 1952.866594] ? _copy_from_user+0xfb/0x1b0 [ 1952.867163] __x64_sys_mount+0x282/0x300 [ 1952.867721] ? copy_mnt_ns+0xa00/0xa00 [ 1952.868262] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.868974] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.869679] do_syscall_64+0x33/0x40 [ 1952.870189] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1952.870879] RIP: 0033:0x7fbd09fc9b19 [ 1952.871378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.873864] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1952.874896] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1952.875874] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1952.876831] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1952.877788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.878747] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:17:56 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:17:56 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x3) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:17:56 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x18, 0x0, 0xfffffffffffffffc, r0, 0x0) 18:17:56 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x4800, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:56 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:56 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xa) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:17:56 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 47) 18:17:56 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) [ 1967.870218] FAULT_INJECTION: forcing a failure. [ 1967.870218] name failslab, interval 1, probability 0, space 0, times 0 [ 1967.871742] CPU: 1 PID: 10752 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1967.872670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1967.873760] Call Trace: [ 1967.874117] dump_stack+0x107/0x167 [ 1967.874595] should_fail.cold+0x5/0xa [ 1967.875101] ? create_object.isra.0+0x3a/0xa20 [ 1967.875708] should_failslab+0x5/0x20 [ 1967.876218] kmem_cache_alloc+0x5b/0x310 [ 1967.876750] create_object.isra.0+0x3a/0xa20 [ 1967.877334] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1967.878013] kmem_cache_alloc+0x159/0x310 [ 1967.878578] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1967.879316] idr_get_free+0x4b5/0x8f0 [ 1967.879841] idr_alloc_u32+0x170/0x2d0 [ 1967.880372] ? __fprop_inc_percpu_max+0x130/0x130 [ 1967.881018] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1967.881723] ? lock_release+0x680/0x680 [ 1967.882253] idr_alloc+0xc2/0x130 [ 1967.882712] ? idr_alloc_u32+0x2d0/0x2d0 [ 1967.883247] ? rwlock_bug.part.0+0x90/0x90 [ 1967.883824] p9_client_prepare_req.part.0+0x612/0xac0 [ 1967.884511] p9_client_rpc+0x220/0x1370 [ 1967.885039] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1967.885729] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1967.886446] ? pipe_poll+0x21b/0x800 [ 1967.886937] ? p9_fd_close+0x4a0/0x4a0 [ 1967.887454] ? wait_for_partner+0x3c0/0x3c0 [ 1967.888037] ? p9_fd_poll+0x1e0/0x2c0 [ 1967.888551] ? p9_fd_create+0x357/0x4a0 [ 1967.889074] ? p9_conn_create+0x510/0x510 [ 1967.889622] ? p9_client_create+0x798/0x1230 [ 1967.890207] ? kfree+0xd7/0x340 [ 1967.890638] ? do_raw_spin_unlock+0x4f/0x220 [ 1967.891216] p9_client_create+0xa76/0x1230 [ 1967.891775] ? p9_client_flush+0x430/0x430 [ 1967.892351] ? trace_hardirqs_on+0x5b/0x180 [ 1967.892918] ? lockdep_init_map_type+0x2c7/0x780 [ 1967.893553] ? __raw_spin_lock_init+0x36/0x110 [ 1967.894169] v9fs_session_init+0x1dd/0x1680 [ 1967.894734] ? lock_release+0x680/0x680 [ 1967.895259] ? kmem_cache_alloc_trace+0x151/0x320 [ 1967.895909] ? v9fs_show_options+0x690/0x690 [ 1967.896500] ? trace_hardirqs_on+0x5b/0x180 [ 1967.897072] ? kasan_unpoison_shadow+0x33/0x50 [ 1967.897675] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1967.898341] v9fs_mount+0x79/0x8f0 [ 1967.898817] ? v9fs_write_inode+0x60/0x60 [ 1967.899357] legacy_get_tree+0x105/0x220 [ 1967.899898] vfs_get_tree+0x8e/0x300 [ 1967.900387] path_mount+0x1331/0x21c0 [ 1967.900892] ? strncpy_from_user+0x9e/0x470 [ 1967.901463] ? finish_automount+0xa90/0xa90 [ 1967.902029] ? getname_flags.part.0+0x1dd/0x4f0 [ 1967.902635] ? _copy_from_user+0xfb/0x1b0 [ 1967.903193] __x64_sys_mount+0x282/0x300 [ 1967.903718] ? copy_mnt_ns+0xa00/0xa00 [ 1967.904255] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1967.904950] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1967.905624] do_syscall_64+0x33/0x40 [ 1967.906112] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1967.906794] RIP: 0033:0x7fbd09fc9b19 [ 1967.907277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1967.909722] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1967.910740] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1967.911674] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1967.912620] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1967.913566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1967.914506] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:17:56 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_MOVE(0x18, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:17:56 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x4c00, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:56 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x6800, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:17:56 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1d, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:17:56 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_MOVE(0x18, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:17:56 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:17:56 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:17:56 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xf) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:18:11 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xa) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:18:11 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:18:11 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x6c00, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:11 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x5) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:18:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 48) 18:18:11 executing program 5: keyctl$KEYCTL_MOVE(0x18, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:18:11 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x3) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:18:11 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x48) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1982.929030] FAULT_INJECTION: forcing a failure. [ 1982.929030] name failslab, interval 1, probability 0, space 0, times 0 [ 1982.931765] CPU: 1 PID: 10801 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1982.933319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1982.935171] Call Trace: [ 1982.935763] dump_stack+0x107/0x167 [ 1982.936592] should_fail.cold+0x5/0xa [ 1982.937445] should_failslab+0x5/0x20 [ 1982.938303] __kmalloc_track_caller+0x79/0x370 [ 1982.939323] ? kasprintf+0xbb/0xf0 [ 1982.940128] ? __delete_object+0xb3/0x100 [ 1982.941060] kvasprintf+0xb5/0x150 [ 1982.941856] ? bust_spinlocks+0xe0/0xe0 [ 1982.942745] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1982.943922] kasprintf+0xbb/0xf0 [ 1982.944694] ? kvasprintf_const+0x1a0/0x1a0 [ 1982.945663] ? kmem_cache_free+0x249/0x2d0 [ 1982.946618] ? p9_client_create+0xbfa/0x1230 [ 1982.947607] p9_client_create+0xc1b/0x1230 [ 1982.948573] ? p9_client_flush+0x430/0x430 [ 1982.949519] ? trace_hardirqs_on+0x5b/0x180 [ 1982.950491] ? lockdep_init_map_type+0x2c7/0x780 [ 1982.951556] ? __raw_spin_lock_init+0x36/0x110 [ 1982.952581] v9fs_session_init+0x1dd/0x1680 [ 1982.953538] ? lock_release+0x680/0x680 [ 1982.954419] ? kmem_cache_alloc_trace+0x151/0x320 [ 1982.955488] ? v9fs_show_options+0x690/0x690 [ 1982.956479] ? trace_hardirqs_on+0x5b/0x180 [ 1982.957437] ? kasan_unpoison_shadow+0x33/0x50 [ 1982.958446] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1982.959573] v9fs_mount+0x79/0x8f0 [ 1982.960358] ? v9fs_write_inode+0x60/0x60 [ 1982.961275] legacy_get_tree+0x105/0x220 [ 1982.962168] vfs_get_tree+0x8e/0x300 [ 1982.962993] path_mount+0x1331/0x21c0 [ 1982.963842] ? strncpy_from_user+0x9e/0x470 [ 1982.964810] ? finish_automount+0xa90/0xa90 [ 1982.965768] ? getname_flags.part.0+0x1dd/0x4f0 [ 1982.966800] ? _copy_from_user+0xfb/0x1b0 [ 1982.967727] __x64_sys_mount+0x282/0x300 [ 1982.968638] ? copy_mnt_ns+0xa00/0xa00 [ 1982.969505] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1982.970667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1982.971802] do_syscall_64+0x33/0x40 [ 1982.972635] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1982.973771] RIP: 0033:0x7fbd09fc9b19 [ 1982.974587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1982.978651] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1982.980339] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1982.981909] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1982.983479] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1982.985056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1982.986630] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:18:11 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x7400, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:11 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:18:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 49) 18:18:11 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x7a00, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) [ 1983.179201] FAULT_INJECTION: forcing a failure. [ 1983.179201] name failslab, interval 1, probability 0, space 0, times 0 [ 1983.181994] CPU: 1 PID: 10830 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1983.183383] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1983.185057] Call Trace: [ 1983.185580] dump_stack+0x107/0x167 [ 1983.186303] should_fail.cold+0x5/0xa [ 1983.187065] ? create_object.isra.0+0x3a/0xa20 [ 1983.187979] should_failslab+0x5/0x20 [ 1983.188741] kmem_cache_alloc+0x5b/0x310 [ 1983.189556] create_object.isra.0+0x3a/0xa20 [ 1983.190433] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1983.191446] __kmalloc_track_caller+0x177/0x370 [ 1983.192388] ? kasprintf+0xbb/0xf0 [ 1983.193100] kvasprintf+0xb5/0x150 [ 1983.193814] ? bust_spinlocks+0xe0/0xe0 [ 1983.194602] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1983.195663] kasprintf+0xbb/0xf0 [ 1983.196344] ? kvasprintf_const+0x1a0/0x1a0 [ 1983.197207] ? kmem_cache_free+0x249/0x2d0 [ 1983.198055] ? p9_client_create+0xbfa/0x1230 [ 1983.198938] p9_client_create+0xc1b/0x1230 [ 1983.199784] ? p9_client_flush+0x430/0x430 [ 1983.200725] ? trace_hardirqs_on+0x5b/0x180 [ 1983.201700] ? lockdep_init_map_type+0x2c7/0x780 [ 1983.202778] ? __raw_spin_lock_init+0x36/0x110 [ 1983.203813] v9fs_session_init+0x1dd/0x1680 [ 1983.204793] ? lock_release+0x680/0x680 [ 1983.205700] ? kmem_cache_alloc_trace+0x151/0x320 [ 1983.206785] ? v9fs_show_options+0x690/0x690 [ 1983.207784] ? trace_hardirqs_on+0x5b/0x180 [ 1983.208773] ? kasan_unpoison_shadow+0x33/0x50 [ 1983.209804] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1983.210951] v9fs_mount+0x79/0x8f0 [ 1983.211752] ? v9fs_write_inode+0x60/0x60 [ 1983.212692] legacy_get_tree+0x105/0x220 [ 1983.213613] vfs_get_tree+0x8e/0x300 [ 1983.214449] path_mount+0x1331/0x21c0 [ 1983.215310] ? strncpy_from_user+0x9e/0x470 [ 1983.216285] ? finish_automount+0xa90/0xa90 [ 1983.217255] ? getname_flags.part.0+0x1dd/0x4f0 [ 1983.218293] ? _copy_from_user+0xfb/0x1b0 [ 1983.219232] __x64_sys_mount+0x282/0x300 [ 1983.220148] ? copy_mnt_ns+0xa00/0xa00 [ 1983.221018] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1983.222191] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1983.223344] do_syscall_64+0x33/0x40 [ 1983.224188] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1983.225336] RIP: 0033:0x7fbd09fc9b19 [ 1983.226159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1983.230264] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1983.231956] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1983.233558] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1983.235138] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1983.236732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1983.238314] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:18:12 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xedc0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x7a00, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:12 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4c) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:18:12 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xf) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:18:27 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4c) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:18:27 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xf) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:18:27 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xfeff, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:27 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x3) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:18:27 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x68) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:18:27 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xa) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:18:27 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:18:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 50) [ 1998.537296] FAULT_INJECTION: forcing a failure. [ 1998.537296] name failslab, interval 1, probability 0, space 0, times 0 [ 1998.540252] CPU: 0 PID: 10869 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1998.541778] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1998.543597] Call Trace: [ 1998.544189] dump_stack+0x107/0x167 [ 1998.544996] should_fail.cold+0x5/0xa [ 1998.545834] should_failslab+0x5/0x20 [ 1998.546670] __kmalloc_track_caller+0x79/0x370 [ 1998.547667] ? kstrdup_const+0x53/0x80 [ 1998.548530] ? kasprintf+0xbb/0xf0 [ 1998.549314] kstrdup+0x36/0x70 [ 1998.550015] kstrdup_const+0x53/0x80 [ 1998.550837] kmem_cache_create_usercopy+0x12f/0x2f0 [ 1998.551944] p9_client_create+0xc6a/0x1230 [ 1998.552887] ? p9_client_flush+0x430/0x430 [ 1998.553810] ? trace_hardirqs_on+0x5b/0x180 [ 1998.554758] ? lockdep_init_map_type+0x2c7/0x780 [ 1998.555805] ? __raw_spin_lock_init+0x36/0x110 [ 1998.556825] v9fs_session_init+0x1dd/0x1680 [ 1998.557773] ? lock_release+0x680/0x680 [ 1998.558650] ? kmem_cache_alloc_trace+0x151/0x320 [ 1998.559704] ? v9fs_show_options+0x690/0x690 [ 1998.560680] ? trace_hardirqs_on+0x5b/0x180 [ 1998.561627] ? kasan_unpoison_shadow+0x33/0x50 [ 1998.562623] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1998.563738] v9fs_mount+0x79/0x8f0 [ 1998.564522] ? v9fs_write_inode+0x60/0x60 [ 1998.565424] legacy_get_tree+0x105/0x220 [ 1998.566313] vfs_get_tree+0x8e/0x300 [ 1998.567127] path_mount+0x1331/0x21c0 [ 1998.567969] ? strncpy_from_user+0x9e/0x470 [ 1998.568923] ? finish_automount+0xa90/0xa90 [ 1998.569863] ? getname_flags.part.0+0x1dd/0x4f0 [ 1998.570881] ? _copy_from_user+0xfb/0x1b0 [ 1998.571791] __x64_sys_mount+0x282/0x300 [ 1998.572681] ? copy_mnt_ns+0xa00/0xa00 [ 1998.573533] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1998.574682] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1998.575815] do_syscall_64+0x33/0x40 [ 1998.576634] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1998.577760] RIP: 0033:0x7fbd09fc9b19 [ 1998.578573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1998.582612] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1998.584287] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1998.585857] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1998.587422] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1998.588991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1998.590554] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 1998.593436] kmem_cache_create(9p-fcall-cache-484) failed with error -12 [ 1998.595236] CPU: 0 PID: 10869 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1998.596750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1998.598561] Call Trace: [ 1998.599136] dump_stack+0x107/0x167 [ 1998.599939] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1998.601096] p9_client_create+0xc6a/0x1230 [ 1998.602033] ? p9_client_flush+0x430/0x430 [ 1998.602953] ? trace_hardirqs_on+0x5b/0x180 [ 1998.603897] ? lockdep_init_map_type+0x2c7/0x780 [ 1998.604936] ? __raw_spin_lock_init+0x36/0x110 [ 1998.605943] v9fs_session_init+0x1dd/0x1680 [ 1998.606891] ? lock_release+0x680/0x680 [ 1998.607768] ? kmem_cache_alloc_trace+0x151/0x320 [ 1998.608804] ? v9fs_show_options+0x690/0x690 [ 1998.609785] ? trace_hardirqs_on+0x5b/0x180 [ 1998.610732] ? kasan_unpoison_shadow+0x33/0x50 [ 1998.611737] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1998.612870] v9fs_mount+0x79/0x8f0 [ 1998.613654] ? v9fs_write_inode+0x60/0x60 [ 1998.614561] legacy_get_tree+0x105/0x220 [ 1998.615454] vfs_get_tree+0x8e/0x300 [ 1998.616284] path_mount+0x1331/0x21c0 [ 1998.617127] ? strncpy_from_user+0x9e/0x470 [ 1998.618074] ? finish_automount+0xa90/0xa90 [ 1998.619023] ? getname_flags.part.0+0x1dd/0x4f0 [ 1998.620047] ? _copy_from_user+0xfb/0x1b0 [ 1998.620978] __x64_sys_mount+0x282/0x300 [ 1998.621873] ? copy_mnt_ns+0xa00/0xa00 [ 1998.622733] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1998.623888] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1998.625059] do_syscall_64+0x33/0x40 [ 1998.625879] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1998.627007] RIP: 0033:0x7fbd09fc9b19 [ 1998.627827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1998.631873] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1998.633554] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 1998.635122] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1998.636692] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1998.638259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1998.639824] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:18:27 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1c, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:18:27 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xff03, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:40 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1d, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:18:40 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6c) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:18:40 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xf) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:18:40 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:18:40 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xfffe, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 51) 18:18:40 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x48) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:18:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xff03, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) [ 2012.201389] FAULT_INJECTION: forcing a failure. [ 2012.201389] name failslab, interval 1, probability 0, space 0, times 0 [ 2012.204132] CPU: 1 PID: 10901 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2012.205708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2012.207557] Call Trace: [ 2012.208153] dump_stack+0x107/0x167 [ 2012.208984] should_fail.cold+0x5/0xa [ 2012.209850] should_failslab+0x5/0x20 [ 2012.210714] __kmalloc_track_caller+0x79/0x370 [ 2012.211743] ? kstrdup_const+0x53/0x80 [ 2012.212628] ? kasprintf+0xbb/0xf0 [ 2012.213435] kstrdup+0x36/0x70 [ 2012.214161] kstrdup_const+0x53/0x80 [ 2012.215007] kmem_cache_create_usercopy+0x12f/0x2f0 [ 2012.216146] p9_client_create+0xc6a/0x1230 [ 2012.217125] ? p9_client_flush+0x430/0x430 [ 2012.218082] ? trace_hardirqs_on+0x5b/0x180 [ 2012.219051] ? lockdep_init_map_type+0x2c7/0x780 [ 2012.220115] ? __raw_spin_lock_init+0x36/0x110 [ 2012.221154] v9fs_session_init+0x1dd/0x1680 [ 2012.222124] ? lock_release+0x680/0x680 [ 2012.223012] ? kmem_cache_alloc_trace+0x151/0x320 [ 2012.224094] ? v9fs_show_options+0x690/0x690 [ 2012.225098] ? trace_hardirqs_on+0x5b/0x180 [ 2012.226069] ? kasan_unpoison_shadow+0x33/0x50 [ 2012.227092] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2012.228233] v9fs_mount+0x79/0x8f0 [ 2012.229047] ? v9fs_write_inode+0x60/0x60 [ 2012.229967] legacy_get_tree+0x105/0x220 [ 2012.230867] vfs_get_tree+0x8e/0x300 [ 2012.231700] path_mount+0x1331/0x21c0 [ 2012.232562] ? strncpy_from_user+0x9e/0x470 [ 2012.233529] ? finish_automount+0xa90/0xa90 [ 2012.234492] ? getname_flags.part.0+0x1dd/0x4f0 [ 2012.235536] ? _copy_from_user+0xfb/0x1b0 [ 2012.236478] __x64_sys_mount+0x282/0x300 [ 2012.237383] ? copy_mnt_ns+0xa00/0xa00 [ 2012.238254] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2012.239421] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2012.240582] do_syscall_64+0x33/0x40 [ 2012.241413] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2012.242546] RIP: 0033:0x7fbd09fc9b19 [ 2012.243380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2012.247502] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2012.249211] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2012.250804] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2012.252405] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2012.253993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2012.255584] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 2012.259158] kmem_cache_create(9p-fcall-cache-485) failed with error -12 [ 2012.261073] CPU: 1 PID: 10901 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2012.262549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2012.264316] Call Trace: [ 2012.264882] dump_stack+0x107/0x167 [ 2012.265660] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2012.266782] p9_client_create+0xc6a/0x1230 [ 2012.267694] ? p9_client_flush+0x430/0x430 [ 2012.268597] ? trace_hardirqs_on+0x5b/0x180 [ 2012.269515] ? lockdep_init_map_type+0x2c7/0x780 [ 2012.270521] ? __raw_spin_lock_init+0x36/0x110 [ 2012.271494] v9fs_session_init+0x1dd/0x1680 [ 2012.272420] ? lock_release+0x680/0x680 [ 2012.273276] ? kmem_cache_alloc_trace+0x151/0x320 [ 2012.274300] ? v9fs_show_options+0x690/0x690 [ 2012.275245] ? trace_hardirqs_on+0x5b/0x180 [ 2012.276161] ? kasan_unpoison_shadow+0x33/0x50 [ 2012.277131] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2012.278208] v9fs_mount+0x79/0x8f0 [ 2012.278963] ? v9fs_write_inode+0x60/0x60 [ 2012.279838] legacy_get_tree+0x105/0x220 [ 2012.280708] vfs_get_tree+0x8e/0x300 [ 2012.281500] path_mount+0x1331/0x21c0 [ 2012.282310] ? strncpy_from_user+0x9e/0x470 [ 2012.283218] ? finish_automount+0xa90/0xa90 [ 2012.284130] ? getname_flags.part.0+0x1dd/0x4f0 [ 2012.285120] ? _copy_from_user+0xfb/0x1b0 [ 2012.286006] __x64_sys_mount+0x282/0x300 [ 2012.286862] ? copy_mnt_ns+0xa00/0xa00 [ 2012.287686] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2012.288803] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2012.289904] do_syscall_64+0x33/0x40 [ 2012.290689] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2012.291765] RIP: 0033:0x7fbd09fc9b19 [ 2012.292560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2012.296428] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2012.298017] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2012.299496] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2012.301003] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2012.302507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2012.304020] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:18:41 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1c, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:18:41 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a334, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0xfffe, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:41 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x74) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:18:41 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x48) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:18:41 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a335, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:41 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xa) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:18:56 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:18:56 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4c) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:18:56 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7a) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:18:56 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4c) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:18:56 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a336, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:18:56 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1c, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:18:56 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xf) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:18:56 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 52) [ 2027.495201] FAULT_INJECTION: forcing a failure. [ 2027.495201] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.496878] CPU: 0 PID: 10957 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2027.497777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2027.498847] Call Trace: [ 2027.499184] dump_stack+0x107/0x167 [ 2027.499654] should_fail.cold+0x5/0xa [ 2027.500144] ? create_object.isra.0+0x3a/0xa20 [ 2027.500745] should_failslab+0x5/0x20 [ 2027.501238] kmem_cache_alloc+0x5b/0x310 [ 2027.501774] create_object.isra.0+0x3a/0xa20 [ 2027.502352] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2027.503007] kmem_cache_alloc+0x159/0x310 [ 2027.503543] kmem_cache_create_usercopy+0x190/0x2f0 [ 2027.504177] p9_client_create+0xc6a/0x1230 [ 2027.504737] ? p9_client_flush+0x430/0x430 [ 2027.505275] ? trace_hardirqs_on+0x5b/0x180 [ 2027.505829] ? lockdep_init_map_type+0x2c7/0x780 [ 2027.506428] ? __raw_spin_lock_init+0x36/0x110 [ 2027.507018] v9fs_session_init+0x1dd/0x1680 [ 2027.507562] ? lock_release+0x680/0x680 [ 2027.508076] ? kmem_cache_alloc_trace+0x151/0x320 [ 2027.508694] ? v9fs_show_options+0x690/0x690 [ 2027.509258] ? trace_hardirqs_on+0x5b/0x180 [ 2027.509805] ? kasan_unpoison_shadow+0x33/0x50 [ 2027.510388] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2027.511044] v9fs_mount+0x79/0x8f0 [ 2027.511493] ? v9fs_write_inode+0x60/0x60 [ 2027.512030] legacy_get_tree+0x105/0x220 [ 2027.512550] vfs_get_tree+0x8e/0x300 [ 2027.513021] path_mount+0x1331/0x21c0 [ 2027.513515] ? strncpy_from_user+0x9e/0x470 [ 2027.514067] ? finish_automount+0xa90/0xa90 [ 2027.514617] ? getname_flags.part.0+0x1dd/0x4f0 [ 2027.515220] ? _copy_from_user+0xfb/0x1b0 [ 2027.515749] __x64_sys_mount+0x282/0x300 [ 2027.516265] ? copy_mnt_ns+0xa00/0xa00 [ 2027.516776] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2027.517439] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2027.518107] do_syscall_64+0x33/0x40 [ 2027.518585] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2027.519241] RIP: 0033:0x7fbd09fc9b19 [ 2027.519716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2027.522045] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2027.523022] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2027.523942] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2027.524882] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2027.525781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2027.526676] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:18:56 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a337, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 53) 18:19:09 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x300) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:19:09 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x68) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:19:09 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x74) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:19:09 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a338, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:09 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x48) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:19:09 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x68) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:19:09 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x48) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 2040.326486] FAULT_INJECTION: forcing a failure. [ 2040.326486] name failslab, interval 1, probability 0, space 0, times 0 [ 2040.329375] CPU: 1 PID: 10989 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2040.330928] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.332814] Call Trace: [ 2040.333403] dump_stack+0x107/0x167 [ 2040.334220] should_fail.cold+0x5/0xa [ 2040.335065] ? __kmem_cache_create+0x10e/0x520 [ 2040.336078] should_failslab+0x5/0x20 [ 2040.336960] kmem_cache_alloc_node+0x55/0x330 [ 2040.337964] __kmem_cache_create+0x10e/0x520 [ 2040.338947] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2040.340072] p9_client_create+0xc6a/0x1230 [ 2040.341055] ? p9_client_flush+0x430/0x430 [ 2040.341999] ? trace_hardirqs_on+0x5b/0x180 [ 2040.342962] ? lockdep_init_map_type+0x2c7/0x780 [ 2040.344026] ? __raw_spin_lock_init+0x36/0x110 [ 2040.345080] v9fs_session_init+0x1dd/0x1680 [ 2040.346040] ? lock_release+0x680/0x680 [ 2040.346943] ? kmem_cache_alloc_trace+0x151/0x320 [ 2040.348009] ? v9fs_show_options+0x690/0x690 [ 2040.349021] ? trace_hardirqs_on+0x5b/0x180 [ 2040.349974] ? kasan_unpoison_shadow+0x33/0x50 [ 2040.350981] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2040.352103] v9fs_mount+0x79/0x8f0 [ 2040.352918] ? v9fs_write_inode+0x60/0x60 [ 2040.353831] legacy_get_tree+0x105/0x220 [ 2040.354731] vfs_get_tree+0x8e/0x300 [ 2040.355552] path_mount+0x1331/0x21c0 [ 2040.356400] ? strncpy_from_user+0x9e/0x470 [ 2040.357384] ? finish_automount+0xa90/0xa90 [ 2040.358336] ? getname_flags.part.0+0x1dd/0x4f0 [ 2040.359363] ? _copy_from_user+0xfb/0x1b0 [ 2040.360286] __x64_sys_mount+0x282/0x300 [ 2040.361205] ? copy_mnt_ns+0xa00/0xa00 [ 2040.362069] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2040.363239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2040.364392] do_syscall_64+0x33/0x40 [ 2040.365245] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2040.366375] RIP: 0033:0x7fbd09fc9b19 [ 2040.367198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2040.371251] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2040.372950] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2040.374508] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2040.376073] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2040.377660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2040.379222] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 2040.382638] kmem_cache_create(9p-fcall-cache-487) failed with error -22 [ 2040.384594] CPU: 1 PID: 10989 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2040.386136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.387931] Call Trace: [ 2040.388508] dump_stack+0x107/0x167 [ 2040.389324] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2040.390466] p9_client_create+0xc6a/0x1230 [ 2040.391390] ? p9_client_flush+0x430/0x430 [ 2040.392305] ? trace_hardirqs_on+0x5b/0x180 [ 2040.393265] ? lockdep_init_map_type+0x2c7/0x780 [ 2040.394289] ? __raw_spin_lock_init+0x36/0x110 [ 2040.395293] v9fs_session_init+0x1dd/0x1680 [ 2040.396230] ? lock_release+0x680/0x680 [ 2040.397129] ? kmem_cache_alloc_trace+0x151/0x320 [ 2040.398172] ? v9fs_show_options+0x690/0x690 [ 2040.399134] ? trace_hardirqs_on+0x5b/0x180 [ 2040.400068] ? kasan_unpoison_shadow+0x33/0x50 [ 2040.401088] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2040.402187] v9fs_mount+0x79/0x8f0 [ 2040.402957] ? v9fs_write_inode+0x60/0x60 [ 2040.403854] legacy_get_tree+0x105/0x220 [ 2040.404757] vfs_get_tree+0x8e/0x300 [ 2040.405556] path_mount+0x1331/0x21c0 [ 2040.406378] ? strncpy_from_user+0x9e/0x470 [ 2040.407305] ? finish_automount+0xa90/0xa90 [ 2040.408237] ? getname_flags.part.0+0x1dd/0x4f0 [ 2040.409264] ? _copy_from_user+0xfb/0x1b0 [ 2040.410161] __x64_sys_mount+0x282/0x300 [ 2040.411032] ? copy_mnt_ns+0xa00/0xa00 [ 2040.411874] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2040.413040] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2040.414147] do_syscall_64+0x33/0x40 [ 2040.414949] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2040.416051] RIP: 0033:0x7fbd09fc9b19 [ 2040.416879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2040.420858] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2040.422492] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2040.424013] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2040.425565] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2040.427090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2040.428615] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:19:09 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4c) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:19:09 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x48) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:19:09 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a339, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:09 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x500) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:19:09 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a33a, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:09 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6c) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:19:09 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x68) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:19:09 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a33b, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:09 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a33c, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 54) 18:19:09 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x68) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:19:09 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4c) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:19:09 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6c) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:19:09 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x600) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2040.925064] FAULT_INJECTION: forcing a failure. [ 2040.925064] name failslab, interval 1, probability 0, space 0, times 0 [ 2040.926493] CPU: 0 PID: 11044 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2040.927282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.928220] Call Trace: [ 2040.928524] dump_stack+0x107/0x167 [ 2040.928951] should_fail.cold+0x5/0xa [ 2040.929398] ? __kmem_cache_create+0x10e/0x520 [ 2040.929929] should_failslab+0x5/0x20 [ 2040.930365] kmem_cache_alloc_node+0x55/0x330 [ 2040.930879] __kmem_cache_create+0x10e/0x520 [ 2040.931382] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2040.931953] p9_client_create+0xc6a/0x1230 [ 2040.932441] ? p9_client_flush+0x430/0x430 [ 2040.932934] ? trace_hardirqs_on+0x5b/0x180 [ 2040.933427] ? lockdep_init_map_type+0x2c7/0x780 [ 2040.933967] ? __raw_spin_lock_init+0x36/0x110 [ 2040.934497] v9fs_session_init+0x1dd/0x1680 [ 2040.934988] ? lock_release+0x680/0x680 [ 2040.935446] ? kmem_cache_alloc_trace+0x151/0x320 [ 2040.935997] ? v9fs_show_options+0x690/0x690 [ 2040.936500] ? trace_hardirqs_on+0x5b/0x180 [ 2040.936995] ? kasan_unpoison_shadow+0x33/0x50 [ 2040.937507] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2040.938087] v9fs_mount+0x79/0x8f0 [ 2040.938491] ? v9fs_write_inode+0x60/0x60 [ 2040.938973] legacy_get_tree+0x105/0x220 [ 2040.939440] vfs_get_tree+0x8e/0x300 [ 2040.939865] path_mount+0x1331/0x21c0 [ 2040.940298] ? strncpy_from_user+0x9e/0x470 [ 2040.940798] ? finish_automount+0xa90/0xa90 [ 2040.941289] ? getname_flags.part.0+0x1dd/0x4f0 [ 2040.941817] ? _copy_from_user+0xfb/0x1b0 [ 2040.942301] __x64_sys_mount+0x282/0x300 [ 2040.942761] ? copy_mnt_ns+0xa00/0xa00 [ 2040.943211] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2040.943806] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2040.944394] do_syscall_64+0x33/0x40 [ 2040.944828] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2040.945409] RIP: 0033:0x7fbd09fc9b19 [ 2040.945831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2040.947923] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2040.948794] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2040.949603] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2040.950423] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2040.951233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2040.952039] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 2040.953052] kmem_cache_create(9p-fcall-cache-488) failed with error -22 [ 2040.953857] CPU: 0 PID: 11044 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2040.954646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.955586] Call Trace: [ 2040.955887] dump_stack+0x107/0x167 [ 2040.956305] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2040.956912] p9_client_create+0xc6a/0x1230 [ 2040.957398] ? p9_client_flush+0x430/0x430 [ 2040.957876] ? trace_hardirqs_on+0x5b/0x180 [ 2040.958371] ? lockdep_init_map_type+0x2c7/0x780 [ 2040.958911] ? __raw_spin_lock_init+0x36/0x110 [ 2040.959439] v9fs_session_init+0x1dd/0x1680 [ 2040.959937] ? lock_release+0x680/0x680 [ 2040.960394] ? kmem_cache_alloc_trace+0x151/0x320 [ 2040.960946] ? v9fs_show_options+0x690/0x690 [ 2040.961452] ? trace_hardirqs_on+0x5b/0x180 [ 2040.961954] ? kasan_unpoison_shadow+0x33/0x50 [ 2040.962484] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2040.963060] v9fs_mount+0x79/0x8f0 [ 2040.963463] ? v9fs_write_inode+0x60/0x60 [ 2040.963940] legacy_get_tree+0x105/0x220 [ 2040.964400] vfs_get_tree+0x8e/0x300 [ 2040.964833] path_mount+0x1331/0x21c0 [ 2040.965270] ? strncpy_from_user+0x9e/0x470 [ 2040.965763] ? finish_automount+0xa90/0xa90 [ 2040.966263] ? getname_flags.part.0+0x1dd/0x4f0 [ 2040.966794] ? _copy_from_user+0xfb/0x1b0 [ 2040.967279] __x64_sys_mount+0x282/0x300 [ 2040.967743] ? copy_mnt_ns+0xa00/0xa00 [ 2040.968198] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2040.968807] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2040.969393] do_syscall_64+0x33/0x40 [ 2040.969822] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2040.970411] RIP: 0033:0x7fbd09fc9b19 [ 2040.970836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2040.972960] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2040.973827] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2040.974646] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2040.975461] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2040.976266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2040.977087] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:19:22 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6c) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:19:22 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x700) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:19:22 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x18, r1, 0xfffffffffffffffc, r0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:19:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 55) 18:19:22 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a33d, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:22 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x74) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:19:22 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x74) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:19:22 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xa) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:19:22 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a33e, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) [ 2053.731168] FAULT_INJECTION: forcing a failure. [ 2053.731168] name failslab, interval 1, probability 0, space 0, times 0 [ 2053.733900] CPU: 0 PID: 11076 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2053.735481] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2053.737407] Call Trace: [ 2053.738002] dump_stack+0x107/0x167 [ 2053.738826] should_fail.cold+0x5/0xa [ 2053.739682] ? create_object.isra.0+0x3a/0xa20 [ 2053.740709] should_failslab+0x5/0x20 [ 2053.741578] kmem_cache_alloc+0x5b/0x310 [ 2053.742497] create_object.isra.0+0x3a/0xa20 [ 2053.743472] kmemleak_alloc_percpu+0xa0/0x100 [ 2053.744474] pcpu_alloc+0x4e2/0x1240 [ 2053.745340] __kmem_cache_create+0x35a/0x520 [ 2053.746328] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2053.747465] p9_client_create+0xc6a/0x1230 [ 2053.748429] ? p9_client_flush+0x430/0x430 [ 2053.749379] ? trace_hardirqs_on+0x5b/0x180 [ 2053.750344] ? lockdep_init_map_type+0x2c7/0x780 [ 2053.751399] ? __raw_spin_lock_init+0x36/0x110 [ 2053.752444] v9fs_session_init+0x1dd/0x1680 [ 2053.753409] ? lock_release+0x680/0x680 [ 2053.754319] ? kmem_cache_alloc_trace+0x151/0x320 [ 2053.755397] ? v9fs_show_options+0x690/0x690 [ 2053.756408] ? trace_hardirqs_on+0x5b/0x180 [ 2053.757384] ? kasan_unpoison_shadow+0x33/0x50 [ 2053.758420] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2053.759570] v9fs_mount+0x79/0x8f0 [ 2053.760371] ? v9fs_write_inode+0x60/0x60 [ 2053.761309] legacy_get_tree+0x105/0x220 [ 2053.762213] vfs_get_tree+0x8e/0x300 [ 2053.763047] path_mount+0x1331/0x21c0 [ 2053.763901] ? strncpy_from_user+0x9e/0x470 [ 2053.764883] ? finish_automount+0xa90/0xa90 [ 2053.765850] ? getname_flags.part.0+0x1dd/0x4f0 [ 2053.766902] ? _copy_from_user+0xfb/0x1b0 [ 2053.767831] __x64_sys_mount+0x282/0x300 [ 2053.768743] ? copy_mnt_ns+0xa00/0xa00 [ 2053.769609] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2053.770788] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2053.771952] do_syscall_64+0x33/0x40 [ 2053.772861] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2053.774023] RIP: 0033:0x7fbd09fc9b19 [ 2053.774845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2053.778997] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2053.780699] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2053.782312] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2053.783903] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2053.785515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2053.787081] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:19:35 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7a) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:19:35 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a33f, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:35 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xa00) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:19:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 56) 18:19:35 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1c, r1, 0xfffffffffffffffc, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:19:35 executing program 5: keyctl$KEYCTL_MOVE(0x18, 0x0, 0xfffffffffffffffc, 0x0, 0x0) (fail_nth: 1) 18:19:35 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7a) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:19:35 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x74) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) [ 2066.511816] FAULT_INJECTION: forcing a failure. [ 2066.511816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2066.513347] CPU: 0 PID: 11105 Comm: syz-executor.5 Not tainted 5.10.240 #1 [ 2066.514236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2066.515306] Call Trace: [ 2066.515652] dump_stack+0x107/0x167 [ 2066.516121] should_fail.cold+0x5/0xa [ 2066.516616] _copy_to_user+0x2e/0x180 [ 2066.517135] simple_read_from_buffer+0xcc/0x160 [ 2066.517750] proc_fail_nth_read+0x198/0x230 [ 2066.518310] ? proc_sessionid_read+0x230/0x230 [ 2066.518901] ? security_file_permission+0xb1/0xe0 [ 2066.519528] ? proc_sessionid_read+0x230/0x230 [ 2066.520128] vfs_read+0x228/0x620 [ 2066.520577] ksys_read+0x12d/0x260 [ 2066.521048] ? vfs_write+0xb10/0xb10 [ 2066.521532] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2066.522227] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2066.522893] do_syscall_64+0x33/0x40 [ 2066.523382] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2066.524041] RIP: 0033:0x7f98d82ec69c [ 2066.524523] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2066.526887] RSP: 002b:00007f98d58af170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2066.527876] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f98d82ec69c [ 2066.528790] RDX: 000000000000000f RSI: 00007f98d58af1e0 RDI: 0000000000000003 [ 2066.529717] RBP: 00007f98d58af1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2066.530636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2066.531560] R13: 00007ffe15f0c1ff R14: 00007f98d58af300 R15: 0000000000022000 [ 2066.567341] FAULT_INJECTION: forcing a failure. [ 2066.567341] name failslab, interval 1, probability 0, space 0, times 0 [ 2066.568876] CPU: 0 PID: 11115 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2066.569794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2066.570874] Call Trace: [ 2066.571222] dump_stack+0x107/0x167 [ 2066.571684] should_fail.cold+0x5/0xa [ 2066.572173] ? create_object.isra.0+0x3a/0xa20 [ 2066.572757] should_failslab+0x5/0x20 [ 2066.573259] kmem_cache_alloc+0x5b/0x310 [ 2066.573782] create_object.isra.0+0x3a/0xa20 [ 2066.574343] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2066.574995] kmem_cache_alloc_node+0x169/0x330 [ 2066.575577] __kmem_cache_create+0x10e/0x520 [ 2066.576141] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2066.576777] p9_client_create+0xc6a/0x1230 [ 2066.577325] ? p9_client_flush+0x430/0x430 [ 2066.577861] ? trace_hardirqs_on+0x5b/0x180 [ 2066.578415] ? lockdep_init_map_type+0x2c7/0x780 [ 2066.579018] ? __raw_spin_lock_init+0x36/0x110 [ 2066.579602] v9fs_session_init+0x1dd/0x1680 [ 2066.580153] ? lock_release+0x680/0x680 [ 2066.580661] ? kmem_cache_alloc_trace+0x151/0x320 [ 2066.581275] ? v9fs_show_options+0x690/0x690 [ 2066.581835] ? trace_hardirqs_on+0x5b/0x180 [ 2066.582378] ? kasan_unpoison_shadow+0x33/0x50 [ 2066.582955] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2066.583596] v9fs_mount+0x79/0x8f0 [ 2066.584043] ? v9fs_write_inode+0x60/0x60 [ 2066.584569] legacy_get_tree+0x105/0x220 [ 2066.585097] vfs_get_tree+0x8e/0x300 [ 2066.585565] path_mount+0x1331/0x21c0 [ 2066.586054] ? strncpy_from_user+0x9e/0x470 [ 2066.586597] ? finish_automount+0xa90/0xa90 [ 2066.587148] ? getname_flags.part.0+0x1dd/0x4f0 [ 2066.587745] ? _copy_from_user+0xfb/0x1b0 [ 2066.588286] __x64_sys_mount+0x282/0x300 [ 2066.588808] ? copy_mnt_ns+0xa00/0xa00 [ 2066.589309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2066.589993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2066.590649] do_syscall_64+0x33/0x40 [ 2066.591119] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2066.591763] RIP: 0033:0x7fbd09fc9b19 [ 2066.592233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2066.594565] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2066.595521] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2066.596420] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2066.597348] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2066.598261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2066.599166] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:19:35 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a340, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:35 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x7a) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:19:35 executing program 5: keyctl$KEYCTL_MOVE(0x18, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:19:35 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x300) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:19:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 57) 18:19:35 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xf00) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:19:35 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a341, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:35 executing program 5: keyctl$KEYCTL_MOVE(0x2, 0x0, 0xfffffffffffffffc, 0x0, 0x0) [ 2066.963698] FAULT_INJECTION: forcing a failure. [ 2066.963698] name failslab, interval 1, probability 0, space 0, times 0 [ 2066.965267] CPU: 0 PID: 11145 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2066.966064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2066.967018] Call Trace: [ 2066.967327] dump_stack+0x107/0x167 [ 2066.967740] should_fail.cold+0x5/0xa [ 2066.968185] ? create_object.isra.0+0x3a/0xa20 [ 2066.968717] should_failslab+0x5/0x20 [ 2066.969163] kmem_cache_alloc+0x5b/0x310 [ 2066.969634] create_object.isra.0+0x3a/0xa20 [ 2066.970148] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2066.970735] kmem_cache_alloc_node+0x169/0x330 [ 2066.971267] __kmem_cache_create+0x10e/0x520 [ 2066.971779] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2066.972365] p9_client_create+0xc6a/0x1230 [ 2066.972860] ? p9_client_flush+0x430/0x430 [ 2066.973356] ? trace_hardirqs_on+0x5b/0x180 [ 2066.973849] ? lockdep_init_map_type+0x2c7/0x780 [ 2066.974391] ? __raw_spin_lock_init+0x36/0x110 [ 2066.974923] v9fs_session_init+0x1dd/0x1680 [ 2066.975412] ? lock_release+0x680/0x680 [ 2066.975880] ? kmem_cache_alloc_trace+0x151/0x320 [ 2066.976429] ? v9fs_show_options+0x690/0x690 [ 2066.976949] ? trace_hardirqs_on+0x5b/0x180 [ 2066.977448] ? kasan_unpoison_shadow+0x33/0x50 [ 2066.977968] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2066.978558] v9fs_mount+0x79/0x8f0 [ 2066.978968] ? v9fs_write_inode+0x60/0x60 [ 2066.979445] legacy_get_tree+0x105/0x220 [ 2066.979919] vfs_get_tree+0x8e/0x300 [ 2066.980347] path_mount+0x1331/0x21c0 [ 2066.980802] ? strncpy_from_user+0x9e/0x470 [ 2066.981294] ? finish_automount+0xa90/0xa90 [ 2066.981787] ? getname_flags.part.0+0x1dd/0x4f0 [ 2066.982310] ? _copy_from_user+0xfb/0x1b0 [ 2066.982791] __x64_sys_mount+0x282/0x300 [ 2066.983256] ? copy_mnt_ns+0xa00/0xa00 [ 2066.983712] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2066.984315] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2066.984909] do_syscall_64+0x33/0x40 [ 2066.985337] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2066.985932] RIP: 0033:0x7fbd09fc9b19 [ 2066.986358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2066.988470] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2066.989351] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2066.990164] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2066.990984] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2066.991803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2066.992625] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:19:49 executing program 5: keyctl$KEYCTL_MOVE(0x3, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:19:49 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4800) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:19:49 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x500) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:19:49 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x300) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:19:49 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x74) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:19:49 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x300) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:19:49 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a342, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 58) [ 2080.975701] FAULT_INJECTION: forcing a failure. [ 2080.975701] name failslab, interval 1, probability 0, space 0, times 0 [ 2080.978580] CPU: 1 PID: 11166 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2080.980006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2080.981739] Call Trace: [ 2080.982286] dump_stack+0x107/0x167 [ 2080.983052] should_fail.cold+0x5/0xa [ 2080.983839] ? create_object.isra.0+0x3a/0xa20 [ 2080.984784] should_failslab+0x5/0x20 [ 2080.985595] kmem_cache_alloc+0x5b/0x310 [ 2080.986435] ? lock_release+0x680/0x680 [ 2080.987261] create_object.isra.0+0x3a/0xa20 [ 2080.988158] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2080.989280] __kmalloc_track_caller+0x177/0x370 [ 2080.990265] ? kstrdup_const+0x53/0x80 [ 2080.991067] kstrdup+0x36/0x70 [ 2080.991731] kstrdup_const+0x53/0x80 [ 2080.992505] kvasprintf_const+0x10c/0x1a0 [ 2080.993382] kobject_set_name_vargs+0x56/0x150 [ 2080.994316] kobject_init_and_add+0xc9/0x160 [ 2080.995210] ? kobject_create_and_add+0xb0/0xb0 [ 2080.996177] ? wait_for_completion_io+0x270/0x270 [ 2080.997171] ? kernfs_name_hash+0xe7/0x110 [ 2080.998041] ? kernfs_find_ns+0x256/0x380 [ 2080.998898] sysfs_slab_add+0x172/0x200 [ 2080.999713] __kmem_cache_create+0x3db/0x520 [ 2081.000632] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2081.001692] p9_client_create+0xc6a/0x1230 [ 2081.002561] ? p9_client_flush+0x430/0x430 [ 2081.003417] ? trace_hardirqs_on+0x5b/0x180 [ 2081.004308] ? lockdep_init_map_type+0x2c7/0x780 [ 2081.005304] ? __raw_spin_lock_init+0x36/0x110 18:19:49 executing program 5: keyctl$KEYCTL_MOVE(0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0) [ 2081.006275] v9fs_session_init+0x1dd/0x1680 [ 2081.007379] ? lock_release+0x680/0x680 [ 2081.008230] ? kmem_cache_alloc_trace+0x151/0x320 [ 2081.009272] ? v9fs_show_options+0x690/0x690 [ 2081.010208] ? trace_hardirqs_on+0x5b/0x180 [ 2081.011123] ? kasan_unpoison_shadow+0x33/0x50 [ 2081.012094] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2081.013176] v9fs_mount+0x79/0x8f0 [ 2081.013930] ? v9fs_write_inode+0x60/0x60 [ 2081.014804] legacy_get_tree+0x105/0x220 [ 2081.015665] vfs_get_tree+0x8e/0x300 [ 2081.016458] path_mount+0x1331/0x21c0 [ 2081.017281] ? strncpy_from_user+0x9e/0x470 [ 2081.018194] ? finish_automount+0xa90/0xa90 [ 2081.019109] ? getname_flags.part.0+0x1dd/0x4f0 [ 2081.020099] ? _copy_from_user+0xfb/0x1b0 [ 2081.020986] __x64_sys_mount+0x282/0x300 [ 2081.021848] ? copy_mnt_ns+0xa00/0xa00 [ 2081.022677] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2081.023788] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2081.024885] do_syscall_64+0x33/0x40 [ 2081.025685] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2081.026754] RIP: 0033:0x7fbd09fc9b19 [ 2081.027532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2081.031414] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2081.033010] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2081.034507] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2081.036014] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2081.037522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2081.039032] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:19:49 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a343, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:49 executing program 5: keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:19:49 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x500) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:19:49 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a344, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:19:49 executing program 5: keyctl$KEYCTL_MOVE(0x6, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:19:50 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x300) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:19:50 executing program 5: keyctl$KEYCTL_MOVE(0x7, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:19:50 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x500) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:20:04 executing program 5: keyctl$KEYCTL_MOVE(0x8, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:20:04 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x600) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:20:04 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x600) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:20:04 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a345, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:20:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 59) 18:20:04 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x600) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:20:04 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x500) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:20:04 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x4c00) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2095.621321] FAULT_INJECTION: forcing a failure. [ 2095.621321] name failslab, interval 1, probability 0, space 0, times 0 [ 2095.624055] CPU: 1 PID: 11221 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2095.625529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2095.627301] Call Trace: [ 2095.627872] dump_stack+0x107/0x167 [ 2095.628649] should_fail.cold+0x5/0xa [ 2095.629468] should_failslab+0x5/0x20 [ 2095.630278] __kmalloc_track_caller+0x79/0x370 [ 2095.631239] ? kstrdup_const+0x53/0x80 [ 2095.632070] kstrdup+0x36/0x70 [ 2095.632746] kstrdup_const+0x53/0x80 [ 2095.633541] kvasprintf_const+0x10c/0x1a0 [ 2095.634417] kobject_set_name_vargs+0x56/0x150 [ 2095.635392] kobject_init_and_add+0xc9/0x160 [ 2095.636352] ? kobject_create_and_add+0xb0/0xb0 [ 2095.637346] ? wait_for_completion_io+0x270/0x270 [ 2095.638371] ? kernfs_name_hash+0xe7/0x110 [ 2095.639272] ? kernfs_find_ns+0x256/0x380 [ 2095.640169] sysfs_slab_add+0x172/0x200 [ 2095.641017] __kmem_cache_create+0x3db/0x520 [ 2095.641960] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2095.643027] p9_client_create+0xc6a/0x1230 [ 2095.643924] ? p9_client_flush+0x430/0x430 [ 2095.644821] ? trace_hardirqs_on+0x5b/0x180 [ 2095.645744] ? lockdep_init_map_type+0x2c7/0x780 [ 2095.646740] ? __raw_spin_lock_init+0x36/0x110 [ 2095.647722] v9fs_session_init+0x1dd/0x1680 [ 2095.648632] ? lock_release+0x680/0x680 [ 2095.649497] ? kmem_cache_alloc_trace+0x151/0x320 [ 2095.650513] ? v9fs_show_options+0x690/0x690 [ 2095.651457] ? trace_hardirqs_on+0x5b/0x180 [ 2095.652364] ? kasan_unpoison_shadow+0x33/0x50 [ 2095.653335] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2095.654687] v9fs_mount+0x79/0x8f0 [ 2095.655656] ? v9fs_write_inode+0x60/0x60 [ 2095.656782] legacy_get_tree+0x105/0x220 [ 2095.657901] vfs_get_tree+0x8e/0x300 [ 2095.658914] path_mount+0x1331/0x21c0 [ 2095.659842] ? strncpy_from_user+0x9e/0x470 [ 2095.660838] ? finish_automount+0xa90/0xa90 [ 2095.661873] ? getname_flags.part.0+0x1dd/0x4f0 [ 2095.663077] ? _copy_from_user+0xfb/0x1b0 [ 2095.664058] __x64_sys_mount+0x282/0x300 [ 2095.665013] ? copy_mnt_ns+0xa00/0xa00 [ 2095.665924] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2095.667120] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2095.668292] do_syscall_64+0x33/0x40 [ 2095.669148] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2095.670329] RIP: 0033:0x7fbd09fc9b19 [ 2095.671180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2095.675377] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2095.677099] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2095.678747] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2095.680368] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2095.682001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2095.683614] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 2095.685481] kobject: can not set name properly! [ 2095.686963] kmem_cache_create(9p-fcall-cache-493) failed with error -12 [ 2095.688709] CPU: 1 PID: 11221 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2095.690332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2095.692217] Call Trace: [ 2095.692816] dump_stack+0x107/0x167 [ 2095.693661] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2095.694869] p9_client_create+0xc6a/0x1230 [ 2095.695834] ? p9_client_flush+0x430/0x430 [ 2095.696790] ? trace_hardirqs_on+0x5b/0x180 [ 2095.697826] ? lockdep_init_map_type+0x2c7/0x780 [ 2095.698908] ? __raw_spin_lock_init+0x36/0x110 [ 2095.699960] v9fs_session_init+0x1dd/0x1680 [ 2095.700939] ? lock_release+0x680/0x680 [ 2095.701868] ? kmem_cache_alloc_trace+0x151/0x320 [ 2095.702976] ? v9fs_show_options+0x690/0x690 [ 2095.703967] ? trace_hardirqs_on+0x5b/0x180 [ 2095.704943] ? kasan_unpoison_shadow+0x33/0x50 [ 2095.705986] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2095.707139] v9fs_mount+0x79/0x8f0 [ 2095.707949] ? v9fs_write_inode+0x60/0x60 [ 2095.708888] legacy_get_tree+0x105/0x220 [ 2095.709829] vfs_get_tree+0x8e/0x300 [ 2095.710680] path_mount+0x1331/0x21c0 [ 2095.711548] ? strncpy_from_user+0x9e/0x470 [ 2095.712536] ? finish_automount+0xa90/0xa90 [ 2095.713538] ? getname_flags.part.0+0x1dd/0x4f0 [ 2095.714607] ? _copy_from_user+0xfb/0x1b0 [ 2095.715560] __x64_sys_mount+0x282/0x300 [ 2095.716484] ? copy_mnt_ns+0xa00/0xa00 [ 2095.717385] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2095.718576] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2095.719743] do_syscall_64+0x33/0x40 [ 2095.720590] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2095.721773] RIP: 0033:0x7fbd09fc9b19 [ 2095.722625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2095.726808] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2095.728536] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2095.730160] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2095.731785] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2095.733428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2095.735050] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:20:04 executing program 5: keyctl$KEYCTL_MOVE(0x9, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:20:04 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x700) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:20:04 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a346, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:20:04 executing program 5: keyctl$KEYCTL_MOVE(0xa, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:20:04 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x500) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:20:04 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a347, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:20:04 executing program 5: keyctl$KEYCTL_MOVE(0xb, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:20:20 executing program 5: keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:20:20 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a348, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:20:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 60) 18:20:20 executing program 0: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x700) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:20:20 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x6800) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:20:20 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xa00) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) 18:20:20 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x600) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) 18:20:20 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0x700) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r3}, &(0x7f0000000300)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) fcntl$setown(r4, 0x8, 0x0) 18:20:20 executing program 5: keyctl$KEYCTL_MOVE(0xd, 0x0, 0xfffffffffffffffc, 0x0, 0x0) [ 2111.599224] FAULT_INJECTION: forcing a failure. [ 2111.599224] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.601055] CPU: 1 PID: 11272 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2111.602055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2111.603242] Call Trace: [ 2111.603621] dump_stack+0x107/0x167 [ 2111.604138] should_fail.cold+0x5/0xa [ 2111.604680] ? create_object.isra.0+0x3a/0xa20 [ 2111.605326] should_failslab+0x5/0x20 [ 2111.605881] kmem_cache_alloc+0x5b/0x310 [ 2111.606456] create_object.isra.0+0x3a/0xa20 [ 2111.607069] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2111.607788] __kmalloc_track_caller+0x177/0x370 [ 2111.608434] ? kstrdup_const+0x53/0x80 [ 2111.608979] kstrdup+0x36/0x70 [ 2111.609425] kstrdup_const+0x53/0x80 [ 2111.609952] __kernfs_new_node+0x9d/0x860 [ 2111.610532] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2111.611214] ? lock_acquire+0x197/0x470 [ 2111.611771] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2111.612516] ? lock_release+0x680/0x680 [ 2111.613068] ? find_held_lock+0x2c/0x110 [ 2111.613651] kernfs_new_node+0x18d/0x250 [ 2111.614221] kernfs_create_dir_ns+0x49/0x160 [ 2111.614833] sysfs_create_dir_ns+0x127/0x290 [ 2111.615456] ? sysfs_create_mount_point+0xb0/0xb0 [ 2111.616127] ? rwlock_bug.part.0+0x90/0x90 [ 2111.616725] ? do_raw_spin_unlock+0x4f/0x220 [ 2111.617348] kobject_add_internal+0x25e/0xa30 [ 2111.617994] kobject_init_and_add+0x101/0x160 [ 2111.618624] ? kobject_create_and_add+0xb0/0xb0 [ 2111.619275] ? wait_for_completion_io+0x270/0x270 [ 2111.619943] ? kernfs_name_hash+0xe7/0x110 [ 2111.620533] ? kernfs_find_ns+0x256/0x380 [ 2111.621120] sysfs_slab_add+0x172/0x200 [ 2111.621720] __kmem_cache_create+0x3db/0x520 [ 2111.622372] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2111.623072] p9_client_create+0xc6a/0x1230 [ 2111.623668] ? p9_client_flush+0x430/0x430 [ 2111.624256] ? trace_hardirqs_on+0x5b/0x180 [ 2111.624856] ? lockdep_init_map_type+0x2c7/0x780 [ 2111.625534] ? __raw_spin_lock_init+0x36/0x110 [ 2111.626178] v9fs_session_init+0x1dd/0x1680 [ 2111.626780] ? lock_release+0x680/0x680 [ 2111.627330] ? kmem_cache_alloc_trace+0x151/0x320 [ 2111.627995] ? v9fs_show_options+0x690/0x690 [ 2111.628611] ? trace_hardirqs_on+0x5b/0x180 [ 2111.629210] ? kasan_unpoison_shadow+0x33/0x50 [ 2111.629859] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2111.630564] v9fs_mount+0x79/0x8f0 [ 2111.631054] ? v9fs_write_inode+0x60/0x60 [ 2111.631629] legacy_get_tree+0x105/0x220 [ 2111.632186] vfs_get_tree+0x8e/0x300 [ 2111.632698] path_mount+0x1331/0x21c0 [ 2111.633233] ? strncpy_from_user+0x9e/0x470 [ 2111.633841] ? finish_automount+0xa90/0xa90 [ 2111.634433] ? getname_flags.part.0+0x1dd/0x4f0 [ 2111.635085] ? _copy_from_user+0xfb/0x1b0 [ 2111.635670] __x64_sys_mount+0x282/0x300 [ 2111.636229] ? copy_mnt_ns+0xa00/0xa00 [ 2111.636769] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2111.637501] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2111.638211] do_syscall_64+0x33/0x40 [ 2111.638724] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2111.639433] RIP: 0033:0x7fbd09fc9b19 [ 2111.639959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2111.642510] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2111.643576] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2111.644570] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2111.645561] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2111.646553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2111.647521] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 18:20:20 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a349, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:20:20 executing program 5: keyctl$KEYCTL_MOVE(0xe, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:20:20 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a34a, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:20:20 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a34b, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:20:20 executing program 5: keyctl$KEYCTL_MOVE(0xf, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 18:20:20 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a34c, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 18:20:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(&(0x7f0000000100)='wfdno', 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460104000100000000000000c0030003008c01000009010000000000004000000000000000a70300000000000003800000040038000200070001010500000000700000000008000000000000000900000000000000010000000000000001000000000000003d00000000000000090000000000000051e57464010000000400000000000000000000000000000001000000000000000300000000000000ffffffffffffffffff000000000000004f96338ba86e5cdfe44ee0f43ab046f63282228a899c796de403b7cdc51e00bd5222da942c52349e338c9f38cf00864cec4c272653ef65cfc48b4a049be7f0e33406e7c056004c104e6bd0d9b03d1734627bcf5e67a9bbda831e1dd7d8ae93c8038162605cd2ad2e5d9e7bc449c8b941d8f05aa7544be2f4c333ce52065cc196dffa62f6265d5d8cda213114f428de04e2404de639d40ea3a405b71b4aaf5f52c8152fb492d4f94fd9027300d931185efd044aee2b9937b6cf911e1fd0a2b3f1761c2274e0899b33cde9a27706f7a33304ac5188604c684acdc763a8795c537bef3a5ee28d49bd280b000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c747a44c623c149c3305e5e9f384e0aca588adb7b91bb848b4e3e30be7eaff7dfe57d475e2d"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (fail_nth: 61) 18:20:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = mq_open(0x0, 0x801, 0x83, &(0x7f0000000200)={0x6, 0x4, 0xb0, 0x7}) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x299) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0xc0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup2(r5, r5) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x3a344, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) [ 2111.988689] FAULT_INJECTION: forcing a failure. [ 2111.988689] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.990226] CPU: 1 PID: 11311 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2111.991032] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2111.992001] Call Trace: [ 2111.992315] dump_stack+0x107/0x167 [ 2111.992740] should_fail.cold+0x5/0xa [ 2111.993185] ? __kernfs_new_node+0xd4/0x860 [ 2111.993700] should_failslab+0x5/0x20 [ 2111.994145] kmem_cache_alloc+0x5b/0x310 [ 2111.994617] __kernfs_new_node+0xd4/0x860 [ 2111.995099] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2111.995653] ? lock_acquire+0x197/0x470 [ 2111.996124] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2111.996736] ? lock_release+0x680/0x680 [ 2111.997201] ? find_held_lock+0x2c/0x110 [ 2111.997685] kernfs_new_node+0x18d/0x250 [ 2111.998164] kernfs_create_dir_ns+0x49/0x160 [ 2111.998680] sysfs_create_dir_ns+0x127/0x290 18:20:20 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r0, 0xf00) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "3f8d7c0f00279394d7e7e32e0fa27d6fa8416e26825bb548bd7d7e01d94bc954d7272e14001b90801f38411179e98bca860fef20619539cb6c95d77d697ab399"}, 0x48, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r2, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x98a67672c7276aa8, @unused=[0x8001, 0x0, 0x1, 0x3], @devid}) unshare(0x48020200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r3, 0x8, 0x0) [ 2111.999204] ? sysfs_create_mount_point+0xb0/0xb0 18:20:20 executing program 5: keyctl$KEYCTL_MOVE(0x10, 0x0, 0xfffffffffffffffc, 0x0, 0x0) [ 2111.999947] ? rwlock_bug.part.0+0x90/0x90 [ 2112.000558] ? do_raw_spin_unlock+0x4f/0x220 [ 2112.001075] kobject_add_internal+0x25e/0xa30 [ 2112.001611] kobject_init_and_add+0x101/0x160 [ 2112.002132] ? kobject_create_and_add+0xb0/0xb0 [ 2112.002673] ? wait_for_completion_io+0x270/0x270 [ 2112.003231] ? kernfs_name_hash+0xe7/0x110 [ 2112.003719] ? kernfs_find_ns+0x256/0x380 [ 2112.004204] sysfs_slab_add+0x172/0x200 [ 2112.004661] __kmem_cache_create+0x3db/0x520 [ 2112.005174] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2112.005761] p9_client_create+0xc6a/0x1230 [ 2112.006261] ? p9_client_flush+0x430/0x430 [ 2112.006749] ? trace_hardirqs_on+0x5b/0x180 [ 2112.007261] ? lockdep_init_map_type+0x2c7/0x780 [ 2112.007816] ? __raw_spin_lock_init+0x36/0x110 [ 2112.008348] v9fs_session_init+0x1dd/0x1680 [ 2112.008848] ? lock_release+0x680/0x680 [ 2112.009322] ? kmem_cache_alloc_trace+0x151/0x320 [ 2112.009882] ? v9fs_show_options+0x690/0x690 [ 2112.010393] ? trace_hardirqs_on+0x5b/0x180 [ 2112.010898] ? kasan_unpoison_shadow+0x33/0x50 [ 2112.011424] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2112.012016] v9fs_mount+0x79/0x8f0 [ 2112.012430] ? v9fs_write_inode+0x60/0x60 [ 2112.012913] legacy_get_tree+0x105/0x220 [ 2112.013390] vfs_get_tree+0x8e/0x300 [ 2112.013834] path_mount+0x1331/0x21c0 [ 2112.014284] ? strncpy_from_user+0x9e/0x470 [ 2112.014800] ? finish_automount+0xa90/0xa90 [ 2112.015303] ? getname_flags.part.0+0x1dd/0x4f0 [ 2112.015837] ? _copy_from_user+0xfb/0x1b0 [ 2112.016316] __x64_sys_mount+0x282/0x300 [ 2112.016778] ? copy_mnt_ns+0xa00/0xa00 [ 2112.017228] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2112.017837] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2112.018426] do_syscall_64+0x33/0x40 [ 2112.018851] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2112.019437] RIP: 0033:0x7fbd09fc9b19 [ 2112.019861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2112.021975] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2112.022855] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2112.023677] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2112.024499] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2112.025316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2112.026143] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 2112.027232] kobject_add_internal failed for 9p-fcall-cache-495 (error: -12 parent: slab) [ 2112.028338] kmem_cache_create(9p-fcall-cache-495) failed with error -12 [ 2112.029125] CPU: 1 PID: 11311 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 2112.029923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2112.030864] Call Trace: [ 2112.031163] dump_stack+0x107/0x167 [ 2112.031578] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2112.032177] p9_client_create+0xc6a/0x1230 [ 2112.032659] ? p9_client_flush+0x430/0x430 [ 2112.033141] ? trace_hardirqs_on+0x5b/0x180 [ 2112.033640] ? lockdep_init_map_type+0x2c7/0x780 [ 2112.034181] ? __raw_spin_lock_init+0x36/0x110 [ 2112.034701] v9fs_session_init+0x1dd/0x1680 [ 2112.035191] ? lock_release+0x680/0x680 [ 2112.035645] ? kmem_cache_alloc_trace+0x151/0x320 [ 2112.036194] ? v9fs_show_options+0x690/0x690 [ 2112.036698] ? trace_hardirqs_on+0x5b/0x180 [ 2112.037193] ? kasan_unpoison_shadow+0x33/0x50 [ 2112.037719] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2112.038293] v9fs_mount+0x79/0x8f0 [ 2112.038695] ? v9fs_write_inode+0x60/0x60 [ 2112.039166] legacy_get_tree+0x105/0x220 [ 2112.039629] vfs_get_tree+0x8e/0x300 [ 2112.040050] path_mount+0x1331/0x21c0 [ 2112.040488] ? strncpy_from_user+0x9e/0x470 [ 2112.040979] ? finish_automount+0xa90/0xa90 [ 2112.041475] ? getname_flags.part.0+0x1dd/0x4f0 [ 2112.042003] ? _copy_from_user+0xfb/0x1b0 [ 2112.042478] __x64_sys_mount+0x282/0x300 [ 2112.042941] ? copy_mnt_ns+0xa00/0xa00 [ 2112.043388] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2112.043986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2112.044573] do_syscall_64+0x33/0x40 [ 2112.044996] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2112.045589] RIP: 0033:0x7fbd09fc9b19 [ 2112.046013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2112.048113] RSP: 002b:00007fbd0753f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2112.048986] RAX: ffffffffffffffda RBX: 00007fbd0a0dcf60 RCX: 00007fbd09fc9b19 [ 2112.049803] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2112.050615] RBP: 00007fbd0753f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2112.051434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2112.052257] R13: 00007ffdbaba22df R14: 00007fbd0753f300 R15: 0000000000022000 [ 2126.473660] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88800e22f780 (size 32): comm "syz-executor.3", pid 11311, jiffies 4296778899 (age 24.016s) hex dump (first 32 bytes): 39 70 2d 66 63 61 6c 6c 2d 63 61 63 68 65 2d 34 9p-fcall-cache-4 39 35 00 0e 80 88 ff ff 00 00 00 00 00 00 00 00 95.............. backtrace: [<00000000fb308508>] kstrdup+0x36/0x70 [<0000000048057d41>] kstrdup_const+0x53/0x80 [<0000000077e08ac3>] kvasprintf_const+0x10c/0x1a0 [<0000000070c1de17>] kobject_set_name_vargs+0x56/0x150 [<000000007a81c8aa>] kobject_init_and_add+0xc9/0x160 [<0000000089fdb435>] sysfs_slab_add+0x172/0x200 [<000000007e2b71bd>] __kmem_cache_create+0x3db/0x520 [<000000008c0e709c>] kmem_cache_create_usercopy+0x1db/0x2f0 [<0000000021949c1e>] p9_client_create+0xc6a/0x1230 [<00000000513e1770>] v9fs_session_init+0x1dd/0x1680 [<000000008d274ab0>] v9fs_mount+0x79/0x8f0 [<00000000c4940d1d>] legacy_get_tree+0x105/0x220 [<0000000050c0cbaf>] vfs_get_tree+0x8e/0x300 [<00000000a9e50cc6>] path_mount+0x1331/0x21c0 [<00000000a0006d9b>] __x64_sys_mount+0x282/0x300 [<000000000ec12731>] do_syscall_64+0x33/0x40 BUG: leak checking failed VM DIAGNOSIS: 18:20:45 Registers: info registers vcpu 0 RAX=ffffffff86293a48 RBX=0000000000004755 RCX=ffffffff81270207 RDX=1ffffffff0d08c15 RSI=0000000000000008 RDI=ffffffff8686e6a8 RBP=ffffffff868460a8 RSP=ffffffff84e07ab0 R8 =0000000000000000 R9 =ffffffff8686e6af R10=fffffbfff0d0dcd5 R11=0000000000000001 R12=ffffffff84e32340 R13=ffffffff84e32cb0 R14=0000000000000001 R15=0000000000000000 RIP=ffffffff81270259 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fff0e54fa20 CR3=000000000fcd8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=3a29323320657a697328203038376632 XMM03=313120646970202c22332e726f747563 XMM04=6c6c6163662d70392020343320643220 XMM05=32206336206336203136203336203636 XMM06=73657479622032332074737269662820 XMM07=2e343220656761282039393838373736 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e953c0 RBX=0000000000000001 RCX=ffffffff83e7d02c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e95b88 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85679448 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e953ce RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f5499503c40 CR3=000000000eaae000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000006000000030000000200000000 XMM02=7a7a75662063657865090a0100010101 XMM03=6574616469646e616320636578650e00 XMM04=650a0065676169727420636578650b00 XMM05=20636578650a0073746e696820636578 XMM06=61746f7420636578650a007364656573 XMM07=7473657220726f74756365786511006c XMM08=646e616320636578650e007a7a756620 XMM09=6169727420636578650b006574616469 XMM10=0a0073746e696820636578650a006567 XMM11=636578650a0073646565732063657865 XMM12=726f74756365786511006c61746f7420 XMM13=20636578650800737472617473657220 XMM14=696d696e696d20636578650d006e6567 XMM15=00006873616d7320636578650a00657a