an_kmalloc.constprop.0+0xc9/0xd0 [ 1369.467377] kmem_cache_alloc_bulk+0x168/0x320 [ 1369.468406] io_submit_sqes+0x6fe6/0x8610 [ 1369.469365] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1369.470471] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1369.471558] ? find_held_lock+0x2c/0x110 [ 1369.472472] ? io_submit_sqes+0x8610/0x8610 [ 1369.473437] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1369.474514] ? wait_for_completion_io+0x270/0x270 [ 1369.475593] ? rcu_read_lock_any_held+0x75/0xa0 [ 1369.476623] ? vfs_write+0x354/0xb10 [ 1369.477451] ? fput_many+0x2f/0x1a0 [ 1369.478260] ? ksys_write+0x1a9/0x260 [ 1369.479112] ? __ia32_sys_read+0xb0/0xb0 [ 1369.480032] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1369.481193] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1369.482339] do_syscall_64+0x33/0x40 [ 1369.483178] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1369.484323] RIP: 0033:0x7fbe68d5ab19 [ 1369.485150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1369.489278] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1369.491061] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1369.492735] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1369.494405] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1369.496080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1369.497742] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 [ 1369.509224] FAULT_INJECTION: forcing a failure. [ 1369.509224] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.511750] CPU: 1 PID: 7730 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1369.513206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1369.514982] Call Trace: [ 1369.515565] dump_stack+0x107/0x167 [ 1369.516351] should_fail.cold+0x5/0xa [ 1369.517164] ? create_object.isra.0+0x3a/0xa20 [ 1369.518139] should_failslab+0x5/0x20 [ 1369.518952] kmem_cache_alloc+0x5b/0x310 [ 1369.519847] ? find_held_lock+0x2c/0x110 [ 1369.520720] create_object.isra.0+0x3a/0xa20 [ 1369.521663] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1369.522751] __kmalloc_node+0x1ae/0x420 [ 1369.523618] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1369.524704] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1369.525774] kmem_cache_alloc_bulk+0x182/0x320 [ 1369.526754] io_submit_sqes+0x6fe6/0x8610 [ 1369.527679] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1369.528739] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1369.529761] ? find_held_lock+0x2c/0x110 [ 1369.530637] ? io_submit_sqes+0x8610/0x8610 [ 1369.531564] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1369.532593] ? wait_for_completion_io+0x270/0x270 [ 1369.533616] ? rcu_read_lock_any_held+0x75/0xa0 [ 1369.534596] ? vfs_write+0x354/0xb10 [ 1369.535397] ? fput_many+0x2f/0x1a0 [ 1369.536174] ? ksys_write+0x1a9/0x260 [ 1369.536976] ? __ia32_sys_read+0xb0/0xb0 [ 1369.537830] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1369.538928] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1369.540020] do_syscall_64+0x33/0x40 [ 1369.540804] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1369.541871] RIP: 0033:0x7f7015fcab19 [ 1369.542650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1369.546518] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1369.548117] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1369.549598] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1369.551092] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1369.552575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1369.554064] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:00:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:01 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:00:01 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', 0x0, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1369.615036] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 07:00:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:01 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', 0x0, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:00:01 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r4 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000000040)=@get={0x1, &(0x7f0000000340)=""/246, 0x200}) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:00:14 executing program 0: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, 0xffffffffffffffff, 0x0) 07:00:14 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 07:00:14 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:00:14 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FILES_UPDATE={0x14, 0x3, 0x0, 0x0, 0x8, &(0x7f00000001c0)=[r3, r0, r5, r0], 0x4, 0x0, 0x1}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x253d, &(0x7f0000000240)={0x0, 0x3696, 0x0, 0x3, 0x1a5}, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) syz_io_uring_submit(r6, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:00:14 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', 0x0, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:00:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:14 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) [ 1382.895436] FAULT_INJECTION: forcing a failure. [ 1382.895436] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.898377] CPU: 0 PID: 7766 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1382.899918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1382.901881] Call Trace: [ 1382.902515] dump_stack+0x107/0x167 [ 1382.903332] should_fail.cold+0x5/0xa [ 1382.904193] ? create_object.isra.0+0x3a/0xa20 [ 1382.905208] should_failslab+0x5/0x20 [ 1382.906056] kmem_cache_alloc+0x5b/0x310 [ 1382.906973] ? mark_held_locks+0x9e/0xe0 [ 1382.907892] create_object.isra.0+0x3a/0xa20 [ 1382.908867] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1382.910038] kmem_cache_alloc_bulk+0x168/0x320 [ 1382.911057] io_submit_sqes+0x6fe6/0x8610 [ 1382.912026] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1382.913131] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1382.914206] ? find_held_lock+0x2c/0x110 [ 1382.915114] ? io_submit_sqes+0x8610/0x8610 [ 1382.916094] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1382.917164] ? wait_for_completion_io+0x270/0x270 [ 1382.918243] ? rcu_read_lock_any_held+0x75/0xa0 [ 1382.919278] ? vfs_write+0x354/0xb10 [ 1382.920123] ? fput_many+0x2f/0x1a0 [ 1382.920939] ? ksys_write+0x1a9/0x260 [ 1382.921784] ? __ia32_sys_read+0xb0/0xb0 [ 1382.922694] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1382.923875] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1382.925025] do_syscall_64+0x33/0x40 [ 1382.925858] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1382.927003] RIP: 0033:0x7fbe68d5ab19 [ 1382.927838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1382.931972] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1382.933682] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1382.935275] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1382.936883] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1382.938476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1382.940068] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:00:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) [ 1382.962020] FAULT_INJECTION: forcing a failure. [ 1382.962020] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.964577] CPU: 0 PID: 7773 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1382.966107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1382.967984] Call Trace: [ 1382.968579] dump_stack+0x107/0x167 [ 1382.969493] should_fail.cold+0x5/0xa [ 1382.970415] ? create_object.isra.0+0x3a/0xa20 [ 1382.971441] should_failslab+0x5/0x20 [ 1382.972332] kmem_cache_alloc+0x5b/0x310 [ 1382.973254] ? mark_held_locks+0x9e/0xe0 [ 1382.974166] create_object.isra.0+0x3a/0xa20 [ 1382.975144] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1382.976300] kmem_cache_alloc_bulk+0x168/0x320 [ 1382.977324] io_submit_sqes+0x6fe6/0x8610 [ 1382.978273] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1382.979387] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1382.980480] ? find_held_lock+0x2c/0x110 [ 1382.981393] ? io_submit_sqes+0x8610/0x8610 [ 1382.982366] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1382.983456] ? wait_for_completion_io+0x270/0x270 [ 1382.984552] ? rcu_read_lock_any_held+0x75/0xa0 [ 1382.985589] ? vfs_write+0x354/0xb10 [ 1382.986421] ? fput_many+0x2f/0x1a0 [ 1382.987235] ? ksys_write+0x1a9/0x260 [ 1382.988094] ? __ia32_sys_read+0xb0/0xb0 [ 1382.989012] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1382.990191] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1382.991351] do_syscall_64+0x33/0x40 [ 1382.992198] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1382.993347] RIP: 0033:0x7f7015fcab19 [ 1382.994179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1382.998302] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1383.000009] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1383.001605] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1383.003197] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1383.004790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1383.006377] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:00:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:14 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1395.985709] FAULT_INJECTION: forcing a failure. [ 1395.985709] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.987104] CPU: 0 PID: 7795 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1395.987942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.988940] Call Trace: [ 1395.989257] dump_stack+0x107/0x167 [ 1395.989686] should_fail.cold+0x5/0xa [ 1395.990151] ? create_object.isra.0+0x3a/0xa20 [ 1395.990700] should_failslab+0x5/0x20 [ 1395.991142] kmem_cache_alloc+0x5b/0x310 [ 1395.991639] create_object.isra.0+0x3a/0xa20 [ 1395.992163] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1395.992755] kmem_cache_alloc_bulk+0x168/0x320 [ 1395.993308] io_submit_sqes+0x6fe6/0x8610 [ 1395.993819] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1395.994417] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1395.994986] ? find_held_lock+0x2c/0x110 [ 1395.995478] ? io_submit_sqes+0x8610/0x8610 [ 1395.996008] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1395.996582] ? wait_for_completion_io+0x270/0x270 [ 1395.997161] ? rcu_read_lock_any_held+0x75/0xa0 [ 1395.997721] ? vfs_write+0x354/0xb10 [ 1395.998167] ? fput_many+0x2f/0x1a0 [ 1395.998608] ? ksys_write+0x1a9/0x260 [ 1395.999053] ? __ia32_sys_read+0xb0/0xb0 [ 1395.999543] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1396.000175] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.000796] do_syscall_64+0x33/0x40 [ 1396.001244] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1396.001855] RIP: 0033:0x7f7015fcab19 [ 1396.002298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1396.004518] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1396.005428] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1396.006258] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1396.007116] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1396.007952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1396.008815] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:00:27 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 07:00:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:27 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:00:27 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:00:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:27 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0x0, 0x53}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) r5 = memfd_create(&(0x7f0000002940)='vfat\x00', 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r5, 0xc010f508, &(0x7f0000002d00)={0x80, 0x1}) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_io_uring_submit(r3, r2, &(0x7f0000002b00)=@IORING_OP_STATX={0x15, 0x4, 0x0, 0xffffffffffffff9c, &(0x7f0000002c00), &(0x7f0000002ac0)='./file0\x00', 0x8, 0x800}, 0x7f7f) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_setup(0x5da4, &(0x7f0000000240)={0x0, 0x398b, 0x10, 0x3fffffe, 0x1a7, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@private=0xa010101, @in=@remote, 0x4e22, 0x0, 0x4e20, 0x0, 0x9, 0x100, 0x80, 0x3b}, {0x1ff, 0x7fffffff, 0x7, 0x800, 0x2, 0x6, 0x6, 0x5}, {0xa6ee, 0x9, 0x6, 0x32}, 0x8, 0x6e6bb3, 0x0, 0x0, 0x1, 0x2}, {{@in6=@private0, 0x4d5}, 0xa, @in=@private=0xa010100, 0x34ff, 0x0, 0x3, 0xff, 0x7, 0x5}}, 0xe8) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x7, 0x9, &(0x7f0000002840)=[{&(0x7f0000000380)="6486d617e88832b39096b17acbcec42a25c79e3d34f39f080c5ed3f585e423edf85191676f8157d7fe876fdb25f11d988e1c656e2b7fc6f0702cce5793179b79e9839dfb46afd50c53816316f24efbf8b6f92bcf136c8606d72fa782a223ab01f7ec415e08fc8a89346b224e9043857668b8fc10930801e92484f5323e5704330e580f0331d94e57c574e48a04828ac1e222541c4f3a7ffe0591a6a1c4e4ec41d60fa8d1ce0db8162da49e91e979f72d722f0cb6631c347258d862576416d6514db1fd99b1849e215f0e09955abd12698a55600c1179e18810e6b6c466c7ead2e3da686747efa723fb7447d6f54790ba5880909c669a", 0xf6, 0xbb18}, {&(0x7f00000029c0)="15dd1dc8960869648fb8cab44bd2bd2c503f2536e99ddca21e43fa071199659407c8a6c699da5bdeee326a29102652913cf35e5d7d5f01e62950ad4c46f858b71b09c5504f52b3cc86223834e5aa142a5ebe76038707453d316a5a41f128d52cef84277176fa869664583f977ad8ff47cf3b797e69753c1ac282214043b5ed4f56191d7680a3ca00fb280464614d14e6ff7e7533363628b5f9370e74ea40f63094fe524e14117f4802e143d099b223898794331d4af9cfe1f9579fe2ff5c843ae1329a4ca9950a9995058eb00750d1ee2d796171412e9321955ab4d1db13d4c89cf74df4b26688bfb6e7af72bf43df1e009e2597f7d24332", 0xf8, 0x2}, {&(0x7f0000000580)="d7fa00905d20b0e928a5c25cc85851402c1425799b21bba8aae44baeea4db0ff297512fc616fe542ef4db1b6445520dcf249bfe4662f473aa231b52f12982913ffc3c31ae75e699b17b44d134a1f07861611de54a3ebe3f34c91eded4c2adc0e9a0076a7fe353a98dbefac3528051b4d9dcb2cb81a117f06e56959de23ba67d150d836aafad64073c38a9ea8125edc4409b5c4459d3d7013f7ce53bb1b00da369783fbc52508438aaa180f2a5c70e3f7f05b6411bed41be9aeef8483667c9baa10cae69c2fa7d32d3b0347e8e26876c43c36f2c5a34e92b9", 0xd8, 0x8001}, {&(0x7f0000000680)="fd31aa3bbf98f408061f5f375c9cf6f71db9478773b16b1a6657ac935e011aefc6d26d33500d00e7d1", 0x29, 0x3}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="166780dac990c851f0eee48d8b37aed5f46ca958ba56645eddbbf74c1de9d5dba81a5eeb08e862f9c24e17e659e523ca393814414356ffc8d3c079a6f2630e8912ae6eb3782667b654d423d52aeee83a86570ec90da7514774cff167d0891a1812690c31fe8ad1d9be87", 0x6a, 0x3}, {&(0x7f0000001740)="c3f9", 0x2}, {&(0x7f0000001780)="92b1ecf22b114b5847e6c953fca0336ece7b69b8197e74b8e8860bfa656affa38af24f181a399c2c66ea800bbedd63901b77a71e6f115b7f0acd50fa24181cf97a5de261b14ed89d39ede95657bde911375418e7e516560ee860decab69c3e608e87484e8f064f4596411045f1a3d155c0bbc0e9a76f387e2832f4babc00aa264f7316a6597a584241771c91256a0d66e58598ca41c0a2b389", 0x99, 0xf71}, {&(0x7f0000001840)="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", 0x1000, 0x4}], 0x1200080, &(0x7f0000002b40)=ANY=[@ANYBLOB='shortname=winnt,nonumtail=0,fowner=', @ANYRESDEC=0x0, @ANYBLOB="2c260988129c5e2926de9735204e5b76e415642ce79b5c178fc1cdf4faa9c5602f7177fe12b36ad3d829fb190a8fa5aeee6f14f670534ba13bc5ee0c143afc56f293687094cbe3175e474a55cd5a842fcf034b24eb325d03637084d9bd7876e17eda3b495fc0ef6dc1b39b88ec607da1d3"]) syz_io_uring_submit(r7, r8, &(0x7f0000002980)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ff1000/0x2000)=nil, 0x2000, 0x2}, 0x10001) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x24b9808}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) syz_io_uring_submit(0x0, r8, &(0x7f0000002e80)=@IORING_OP_STATX={0x15, 0x5, 0x0, r10, &(0x7f0000002d40), &(0x7f0000002e40)='./file0\x00', 0x200}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r10, &(0x7f0000000540)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x20040801}, 0x20040000) syz_io_uring_submit(r6, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:00:27 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 07:00:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x9, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x3, 0x4, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="42a15cdf3900043632f215f6988b97946e6f3dc7418cd3afec9b50ad8e05788b010000", @ANYRESHEX=r2, @ANYBLOB=',cache=mmap,cache=none,\x00']) r3 = accept$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000040)=0x6e) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="410a78d2de1dce01b7d7a9653100000000000077cb63a100000000"]) 07:00:27 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1396.071327] FAULT_INJECTION: forcing a failure. [ 1396.071327] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.074314] CPU: 1 PID: 7806 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1396.076206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1396.078382] Call Trace: [ 1396.079006] dump_stack+0x107/0x167 [ 1396.079882] should_fail.cold+0x5/0xa [ 1396.080784] should_failslab+0x5/0x20 07:00:27 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) [ 1396.081695] kmem_cache_alloc_bulk+0x4b/0x320 [ 1396.082873] io_submit_sqes+0x6fe6/0x8610 [ 1396.083894] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1396.085052] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1396.086203] ? find_held_lock+0x2c/0x110 [ 1396.087154] ? io_submit_sqes+0x8610/0x8610 [ 1396.088195] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1396.089341] ? wait_for_completion_io+0x270/0x270 [ 1396.090470] ? rcu_read_lock_any_held+0x75/0xa0 [ 1396.091551] ? vfs_write+0x354/0xb10 [ 1396.092436] ? fput_many+0x2f/0x1a0 [ 1396.093299] ? ksys_write+0x1a9/0x260 [ 1396.094184] ? __ia32_sys_read+0xb0/0xb0 [ 1396.095151] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1396.096451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.097672] do_syscall_64+0x33/0x40 [ 1396.098567] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1396.099780] RIP: 0033:0x7fbe68d5ab19 [ 1396.100653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1396.104974] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1396.106889] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1396.108642] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1396.110307] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1396.111989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1396.113658] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 [ 1396.116425] loop5: detected capacity change from 0 to 95744 [ 1396.150855] FAT-fs (loop5): Unrecognized mount option "fowner=00000000000000000000" or missing value [ 1396.158362] FAULT_INJECTION: forcing a failure. [ 1396.158362] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.161044] CPU: 1 PID: 7811 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1396.162621] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1396.164534] Call Trace: [ 1396.165145] dump_stack+0x107/0x167 [ 1396.165994] should_fail.cold+0x5/0xa [ 1396.166875] ? create_object.isra.0+0x3a/0xa20 [ 1396.167933] should_failslab+0x5/0x20 [ 1396.168811] kmem_cache_alloc+0x5b/0x310 [ 1396.169750] ? mark_held_locks+0x9e/0xe0 [ 1396.170693] create_object.isra.0+0x3a/0xa20 [ 1396.171714] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1396.172889] kmem_cache_alloc_bulk+0x168/0x320 [ 1396.173953] io_submit_sqes+0x6fe6/0x8610 [ 1396.174947] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1396.176097] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1396.177236] ? find_held_lock+0x2c/0x110 [ 1396.178401] ? io_submit_sqes+0x8610/0x8610 [ 1396.179576] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1396.180764] ? wait_for_completion_io+0x270/0x270 [ 1396.181883] ? rcu_read_lock_any_held+0x75/0xa0 [ 1396.182950] ? vfs_write+0x354/0xb10 [ 1396.183831] ? fput_many+0x2f/0x1a0 [ 1396.184681] ? ksys_write+0x1a9/0x260 [ 1396.185604] ? __ia32_sys_read+0xb0/0xb0 [ 1396.186527] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1396.187714] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.188895] do_syscall_64+0x33/0x40 [ 1396.189740] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1396.190896] RIP: 0033:0x7f7015fcab19 [ 1396.191743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1396.195890] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1396.197619] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1396.199249] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1396.200920] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1396.202555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1396.204232] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:00:40 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) 07:00:40 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) 07:00:40 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1408.809221] FAULT_INJECTION: forcing a failure. [ 1408.809221] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.812047] CPU: 1 PID: 7823 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1408.813713] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1408.815728] Call Trace: [ 1408.816381] dump_stack+0x107/0x167 [ 1408.817268] should_fail.cold+0x5/0xa [ 1408.818191] ? create_object.isra.0+0x3a/0xa20 [ 1408.819283] should_failslab+0x5/0x20 [ 1408.820213] kmem_cache_alloc+0x5b/0x310 [ 1408.821192] ? mark_held_locks+0x9e/0xe0 [ 1408.822175] create_object.isra.0+0x3a/0xa20 [ 1408.823220] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1408.824458] kmem_cache_alloc_bulk+0x168/0x320 [ 1408.825566] io_submit_sqes+0x6fe6/0x8610 [ 1408.826594] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1408.827798] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1408.828960] ? find_held_lock+0x2c/0x110 [ 1408.829929] ? io_submit_sqes+0x8610/0x8610 07:00:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) pipe(0x0) 07:00:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:40 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:00:40 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) syz_io_uring_setup(0x2ba1, &(0x7f0000000240)={0x0, 0xeee5, 0x18, 0x1, 0x280, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r5, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x23456}, 0x31a) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1408.830952] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1408.832407] ? wait_for_completion_io+0x270/0x270 [ 1408.833565] ? rcu_read_lock_any_held+0x75/0xa0 [ 1408.834683] ? vfs_write+0x354/0xb10 [ 1408.835431] FAULT_INJECTION: forcing a failure. [ 1408.835431] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.835577] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1408.835599] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1408.835625] ? ksys_write+0x1a9/0x260 [ 1408.840720] ? __ia32_sys_read+0xb0/0xb0 [ 1408.841691] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1408.842941] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1408.844181] do_syscall_64+0x33/0x40 [ 1408.845073] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1408.846291] RIP: 0033:0x7f7015fcab19 [ 1408.847178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1408.851587] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1408.853313] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1408.854923] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1408.856536] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1408.858138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1408.859761] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1408.861400] CPU: 0 PID: 7821 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1408.862550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1408.863926] Call Trace: [ 1408.864371] dump_stack+0x107/0x167 [ 1408.864970] should_fail.cold+0x5/0xa [ 1408.865602] ? create_object.isra.0+0x3a/0xa20 [ 1408.866347] should_failslab+0x5/0x20 [ 1408.866968] kmem_cache_alloc+0x5b/0x310 [ 1408.867639] create_object.isra.0+0x3a/0xa20 [ 1408.868365] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1408.869202] kmem_cache_alloc_bulk+0x168/0x320 [ 1408.869947] io_submit_sqes+0x6fe6/0x8610 [ 1408.870633] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1408.871456] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1408.872247] ? find_held_lock+0x2c/0x110 [ 1408.872918] ? io_submit_sqes+0x8610/0x8610 [ 1408.873624] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1408.874411] ? wait_for_completion_io+0x270/0x270 [ 1408.875202] ? rcu_read_lock_any_held+0x75/0xa0 [ 1408.875956] ? vfs_write+0x354/0xb10 [ 1408.876567] ? fput_many+0x2f/0x1a0 [ 1408.877155] ? ksys_write+0x1a9/0x260 [ 1408.877778] ? __ia32_sys_read+0xb0/0xb0 [ 1408.878438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1408.879294] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1408.880151] do_syscall_64+0x33/0x40 [ 1408.880752] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1408.881579] RIP: 0033:0x7fbe68d5ab19 [ 1408.882174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1408.885144] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1408.886398] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1408.887564] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1408.888738] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1408.889901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1408.891058] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:00:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x95fd4000) pipe(0x0) 07:00:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:40 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:00:40 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:00:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) r2 = openat(r1, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) pipe(0x0) 07:00:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0xa1) r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) syz_io_uring_submit(r1, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0xa, 0xffffffffffffffff, 0x0, 0xffffff81}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:00:40 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) 07:00:40 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 07:00:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:40 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:00:40 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1409.294269] FAULT_INJECTION: forcing a failure. [ 1409.294269] name failslab, interval 1, probability 0, space 0, times 0 [ 1409.297161] CPU: 1 PID: 7861 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1409.298850] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1409.301265] Call Trace: [ 1409.302071] dump_stack+0x107/0x167 [ 1409.303167] should_fail.cold+0x5/0xa [ 1409.304326] ? create_object.isra.0+0x3a/0xa20 [ 1409.305691] should_failslab+0x5/0x20 [ 1409.306827] kmem_cache_alloc+0x5b/0x310 [ 1409.308086] ? mark_held_locks+0x9e/0xe0 [ 1409.309402] create_object.isra.0+0x3a/0xa20 [ 1409.310793] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1409.312327] kmem_cache_alloc_bulk+0x168/0x320 [ 1409.313712] io_submit_sqes+0x6fe6/0x8610 [ 1409.314996] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1409.316504] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1409.317954] ? find_held_lock+0x2c/0x110 [ 1409.319186] ? io_submit_sqes+0x8610/0x8610 [ 1409.320481] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1409.321921] ? wait_for_completion_io+0x270/0x270 [ 1409.323339] ? rcu_read_lock_any_held+0x75/0xa0 [ 1409.324876] ? vfs_write+0x354/0xb10 [ 1409.326025] ? fput_many+0x2f/0x1a0 [ 1409.327152] ? ksys_write+0x1a9/0x260 [ 1409.328216] ? __ia32_sys_read+0xb0/0xb0 [ 1409.328888] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1409.329755] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1409.330626] do_syscall_64+0x33/0x40 [ 1409.331254] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1409.332110] RIP: 0033:0x7f7015fcab19 [ 1409.332722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1409.335790] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1409.337064] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1409.338265] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1409.339460] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1409.340652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1409.341850] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1409.384192] FAULT_INJECTION: forcing a failure. [ 1409.384192] name failslab, interval 1, probability 0, space 0, times 0 [ 1409.387148] CPU: 0 PID: 7867 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1409.388715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1409.390587] Call Trace: [ 1409.391189] dump_stack+0x107/0x167 [ 1409.392028] should_fail.cold+0x5/0xa [ 1409.392889] ? create_object.isra.0+0x3a/0xa20 [ 1409.393924] should_failslab+0x5/0x20 [ 1409.394785] kmem_cache_alloc+0x5b/0x310 [ 1409.395704] ? mark_held_locks+0x9e/0xe0 [ 1409.396633] create_object.isra.0+0x3a/0xa20 [ 1409.397625] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1409.398776] kmem_cache_alloc_bulk+0x168/0x320 [ 1409.399830] io_submit_sqes+0x6fe6/0x8610 [ 1409.400796] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1409.401924] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1409.403021] ? find_held_lock+0x2c/0x110 [ 1409.403984] ? io_submit_sqes+0x8610/0x8610 [ 1409.404963] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1409.406054] ? wait_for_completion_io+0x270/0x270 [ 1409.407147] ? rcu_read_lock_any_held+0x75/0xa0 [ 1409.408211] ? vfs_write+0x354/0xb10 [ 1409.409057] ? fput_many+0x2f/0x1a0 [ 1409.409878] ? ksys_write+0x1a9/0x260 [ 1409.410736] ? __ia32_sys_read+0xb0/0xb0 [ 1409.411654] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1409.412837] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1409.414001] do_syscall_64+0x33/0x40 [ 1409.414842] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1409.416011] RIP: 0033:0x7fbe68d5ab19 [ 1409.416851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1409.421014] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1409.422730] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1409.424364] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1409.425972] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1409.427579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1409.429195] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:00:53 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x12, 0x1, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040), &(0x7f0000000100), 0x2, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) r6 = socket$inet6_icmp(0xa, 0x2, 0x3a) stat(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r7, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r8, 0x0, r7) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x41000, &(0x7f0000000400)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d97de39df4a2cc1e342ccf8eeed1d372ff8df02eb7ed1d0299f01be62709e0525dd2541b1251244d5dd9a44c047d31db1e8a21c4fe0a234b5612673cd68b03605bb52bbb5ab1dff7c035bba69e48fe9a61b45d396234ea7168c063771eb950b45ca501ba9b68e498b6762fb58386745687617fbe0c0e3db887c9c78d926194dbbbacec5d350bc82738f87a8c27f337356813a6541747b9524c0ffc2fa19f0a02f36465cb8fa9cc7556fbc7f783955057e732e223cd5bdfba71c32431e58bc89c08cae6db1d96b1be937", @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',version=9p2000.u,cache=fscache,euid=', @ANYRESDEC=r7, @ANYBLOB=',euid<', @ANYRESDEC=0xee00, @ANYBLOB=',pcr=00000000000000065536,euid>', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) pipe(0x0) open(&(0x7f0000000340)='./file1\x00', 0x120800, 0x194) 07:00:53 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 07:00:53 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) 07:00:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:53 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:00:53 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000), 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:00:53 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000d, 0x12, r0, 0x8000000) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x81030, r0, 0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r5, r6, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) syz_io_uring_submit(r4, r6, &(0x7f0000000480)=@IORING_OP_POLL_REMOVE={0x7, 0x3}, 0x401) r7 = syz_io_uring_setup(0x23ad, &(0x7f0000000240)={0x0, 0x9, 0x0, 0x0, 0x18b, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r8, &(0x7f00000001c0)=@IORING_OP_MADVISE={0x19, 0x3, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x1}, 0x2ee) syz_io_uring_submit(0x0, 0x0, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) r9 = mmap$IORING_OFF_SQES(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x1000002, 0x10, r0, 0x10000000) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f0000000580)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index=0x8, 0x7fffffff, &(0x7f00000004c0)="5b9730bfab8cdc32f332387efc46c98266259b016472f4c7e0b4dc5bfee908e273081fbc84b75bb6cd4ca21a9abb037ac79ef18cb27e12463421eaf322d32543eb1f963f6275e0926f1a86f2b729c2361cbf5359e7d0e97cb733018cd0140438ca5fd8045c813a530cf62e63060cd8f2d87bffc5c4cadc3cbe3c90ed329bcb8c1040590a62f58de4055a6cc6b7606326f4ce1bbb9f7b393d2141c1bf01961c9bee19dcc346ca23841599c3c559eb884d9fe9c9dfbd9c1bf3f33b6d", 0xbb, 0x12, 0x1, {0x0, r10}}, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="00040000000000002e2f6669ff033000"]) syz_io_uring_setup(0x2303, &(0x7f0000000380)={0x0, 0x3225, 0x8, 0x0, 0x61, 0x0, r11}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000400), &(0x7f0000000440)) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r12 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r12, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1422.409603] FAULT_INJECTION: forcing a failure. [ 1422.409603] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.412291] CPU: 1 PID: 7875 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1422.413764] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1422.415544] Call Trace: [ 1422.416137] dump_stack+0x107/0x167 [ 1422.416924] should_fail.cold+0x5/0xa [ 1422.417736] ? create_object.isra.0+0x3a/0xa20 [ 1422.418714] should_failslab+0x5/0x20 [ 1422.419524] kmem_cache_alloc+0x5b/0x310 [ 1422.420394] ? mark_held_locks+0x9e/0xe0 [ 1422.421259] create_object.isra.0+0x3a/0xa20 [ 1422.422187] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1422.423247] kmem_cache_alloc_bulk+0x168/0x320 [ 1422.424223] io_submit_sqes+0x6fe6/0x8610 [ 1422.425109] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1422.426140] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1422.427145] ? find_held_lock+0x2c/0x110 [ 1422.428000] ? io_submit_sqes+0x8610/0x8610 [ 1422.428916] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1422.429921] ? wait_for_completion_io+0x270/0x270 [ 1422.430932] ? rcu_read_lock_any_held+0x75/0xa0 [ 1422.431915] ? vfs_write+0x354/0xb10 [ 1422.432681] ? fput_many+0x2f/0x1a0 [ 1422.433449] ? ksys_write+0x1a9/0x260 [ 1422.434246] ? __ia32_sys_read+0xb0/0xb0 [ 1422.435087] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1422.436184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1422.437256] do_syscall_64+0x33/0x40 [ 1422.438028] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1422.439082] RIP: 0033:0x7fbe68d5ab19 [ 1422.439852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1422.443689] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1422.445316] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1422.446835] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1422.448356] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1422.449893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1422.451401] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 [ 1422.464219] FAULT_INJECTION: forcing a failure. [ 1422.464219] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.466636] CPU: 1 PID: 7882 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1422.468097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1422.469851] Call Trace: [ 1422.470419] dump_stack+0x107/0x167 [ 1422.471196] should_fail.cold+0x5/0xa [ 1422.472008] ? create_object.isra.0+0x3a/0xa20 [ 1422.472989] should_failslab+0x5/0x20 [ 1422.473815] kmem_cache_alloc+0x5b/0x310 [ 1422.474689] ? mark_held_locks+0x9e/0xe0 [ 1422.475552] create_object.isra.0+0x3a/0xa20 [ 1422.476487] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1422.477583] kmem_cache_alloc_bulk+0x168/0x320 [ 1422.478560] io_submit_sqes+0x6fe6/0x8610 [ 1422.479466] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1422.480539] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1422.481567] ? find_held_lock+0x2c/0x110 [ 1422.482438] ? io_submit_sqes+0x8610/0x8610 [ 1422.483363] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1422.484395] ? wait_for_completion_io+0x270/0x270 [ 1422.485423] ? rcu_read_lock_any_held+0x75/0xa0 [ 1422.486419] ? vfs_write+0x354/0xb10 [ 1422.487208] ? fput_many+0x2f/0x1a0 [ 1422.487991] ? ksys_write+0x1a9/0x260 [ 1422.488800] ? __ia32_sys_read+0xb0/0xb0 [ 1422.489660] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1422.490762] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1422.491854] do_syscall_64+0x33/0x40 [ 1422.492662] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1422.493756] RIP: 0033:0x7f7015fcab19 [ 1422.494547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1422.498479] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1422.500100] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1422.501620] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1422.503132] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1422.504659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1422.506161] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:00:53 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000), 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:00:53 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fe", 0x75, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:00:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:00:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:07 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 07:01:07 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) 07:01:07 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000), 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:01:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = timerfd_create(0x8, 0x800) mmap(&(0x7f00000bd000/0x1000)=nil, 0x1000, 0x1000003, 0x13, r1, 0xc5747000) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) 07:01:07 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) syz_io_uring_setup(0x2e3d, &(0x7f0000000240)={0x0, 0x5afd, 0x10, 0x2, 0x1f0, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040), &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r3, &(0x7f00000001c0)=@IORING_OP_NOP={0x0, 0x5}, 0x20) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:01:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:07 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fe", 0x75, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) [ 1436.013993] FAULT_INJECTION: forcing a failure. [ 1436.013993] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.016556] CPU: 1 PID: 7921 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1436.018077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 07:01:07 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fe", 0x75, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1436.019930] Call Trace: [ 1436.020764] dump_stack+0x107/0x167 [ 1436.021576] should_fail.cold+0x5/0xa [ 1436.022429] should_failslab+0x5/0x20 [ 1436.023227] FAULT_INJECTION: forcing a failure. [ 1436.023227] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.023272] kmem_cache_alloc_bulk+0x4b/0x320 [ 1436.023300] io_submit_sqes+0x6fe6/0x8610 [ 1436.026605] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1436.027720] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1436.028798] ? find_held_lock+0x2c/0x110 [ 1436.029697] ? io_submit_sqes+0x8610/0x8610 [ 1436.030655] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1436.031721] ? wait_for_completion_io+0x270/0x270 [ 1436.032801] ? rcu_read_lock_any_held+0x75/0xa0 [ 1436.033824] ? vfs_write+0x354/0xb10 [ 1436.034650] ? fput_many+0x2f/0x1a0 [ 1436.035453] ? ksys_write+0x1a9/0x260 [ 1436.036302] ? __ia32_sys_read+0xb0/0xb0 [ 1436.037198] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1436.038356] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1436.039490] do_syscall_64+0x33/0x40 [ 1436.040318] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1436.041443] RIP: 0033:0x7f7015fcab19 [ 1436.042256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1436.046295] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1436.047954] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1436.049513] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1436.051059] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1436.052615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1436.054164] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1436.055744] CPU: 0 PID: 7919 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1436.056607] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1436.057607] Call Trace: [ 1436.057940] dump_stack+0x107/0x167 [ 1436.058394] should_fail.cold+0x5/0xa [ 1436.058875] ? create_object.isra.0+0x3a/0xa20 [ 1436.059442] should_failslab+0x5/0x20 [ 1436.059924] kmem_cache_alloc+0x5b/0x310 [ 1436.060437] ? mark_held_locks+0x9e/0xe0 [ 1436.060947] create_object.isra.0+0x3a/0xa20 [ 1436.061488] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1436.062118] kmem_cache_alloc_bulk+0x168/0x320 [ 1436.062690] io_submit_sqes+0x6fe6/0x8610 [ 1436.063219] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1436.063837] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1436.064440] ? find_held_lock+0x2c/0x110 [ 1436.064946] ? io_submit_sqes+0x8610/0x8610 [ 1436.065483] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1436.066082] ? wait_for_completion_io+0x270/0x270 [ 1436.066683] ? rcu_read_lock_any_held+0x75/0xa0 [ 1436.067260] ? vfs_write+0x354/0xb10 [ 1436.067706] ? fput_many+0x2f/0x1a0 [ 1436.068159] ? ksys_write+0x1a9/0x260 [ 1436.068615] ? __ia32_sys_read+0xb0/0xb0 [ 1436.069102] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1436.069736] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1436.070360] do_syscall_64+0x33/0x40 [ 1436.070811] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1436.071428] RIP: 0033:0x7fbe68d5ab19 [ 1436.071885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1436.074098] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1436.075013] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1436.075869] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1436.076736] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1436.077588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1436.078447] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:01:07 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1500, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4}, r4, 0x2, 0xffffffffffffffff, 0x8) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:01:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x47d5, &(0x7f00000002c0)={0x0, 0x7744, 0x1, 0x2, 0x2f7}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080)=0x7f, 0x4) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x40086602, &(0x7f0000000000)={0xff}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x40010, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0xc0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) pipe(0x0) 07:01:07 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27", 0xb0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:07 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) 07:01:07 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r2, 0x0) [ 1436.205276] FAULT_INJECTION: forcing a failure. [ 1436.205276] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.206717] CPU: 0 PID: 7936 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1436.207575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1436.208623] Call Trace: [ 1436.208960] dump_stack+0x107/0x167 [ 1436.209415] should_fail.cold+0x5/0xa [ 1436.209895] ? create_object.isra.0+0x3a/0xa20 [ 1436.210466] should_failslab+0x5/0x20 [ 1436.210947] kmem_cache_alloc+0x5b/0x310 [ 1436.211459] create_object.isra.0+0x3a/0xa20 [ 1436.212011] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1436.212650] kmem_cache_alloc_bulk+0x168/0x320 [ 1436.213226] io_submit_sqes+0x6fe6/0x8610 [ 1436.213761] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1436.214384] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1436.214991] ? find_held_lock+0x2c/0x110 [ 1436.215503] ? io_submit_sqes+0x8610/0x8610 [ 1436.216061] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1436.216662] ? wait_for_completion_io+0x270/0x270 [ 1436.217247] ? rcu_read_lock_any_held+0x75/0xa0 [ 1436.217828] ? vfs_write+0x354/0xb10 [ 1436.218276] ? fput_many+0x2f/0x1a0 [ 1436.218733] ? ksys_write+0x1a9/0x260 [ 1436.219208] ? __ia32_sys_read+0xb0/0xb0 [ 1436.219719] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1436.220392] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1436.221039] do_syscall_64+0x33/0x40 [ 1436.221506] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1436.222153] RIP: 0033:0x7f7015fcab19 [ 1436.222620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1436.224928] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1436.225876] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1436.226734] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1436.227634] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1436.228529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1436.229391] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:01:18 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) 07:01:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:18 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000339000/0x1000)=nil, 0x1000, 0x2000003, 0x10, 0xffffffffffffffff, 0xe7d0a000) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) r3 = mmap$IORING_OFF_SQES(&(0x7f0000277000/0x800000)=nil, 0x800000, 0x2000000, 0x10, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f0000000240)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x2007, @fd_index=0xa, 0x8000, 0x0, 0x0, 0x10, 0x0, {0x1}}, 0x84) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) sendmsg$IPSET_CMD_GET_BYNAME(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0xe, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x4000) pipe(0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r6, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x64, 0x0, 0x400, 0x70bd25, 0x25dfdbf9, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xfc}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x1}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x56}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x2}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x40}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008815}, 0x20004000) [ 1447.564001] FAULT_INJECTION: forcing a failure. [ 1447.564001] name failslab, interval 1, probability 0, space 0, times 0 [ 1447.566438] CPU: 1 PID: 7950 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1447.567869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1447.569646] Call Trace: [ 1447.570209] dump_stack+0x107/0x167 [ 1447.570989] should_fail.cold+0x5/0xa [ 1447.571800] ? create_object.isra.0+0x3a/0xa20 [ 1447.572772] should_failslab+0x5/0x20 [ 1447.573574] kmem_cache_alloc+0x5b/0x310 [ 1447.574426] ? mark_held_locks+0x9e/0xe0 [ 1447.575288] create_object.isra.0+0x3a/0xa20 [ 1447.576229] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1447.577351] kmem_cache_alloc_bulk+0x168/0x320 [ 1447.578513] io_submit_sqes+0x6fe6/0x8610 [ 1447.579595] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1447.580874] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1447.582089] ? find_held_lock+0x2c/0x110 [ 1447.583121] ? io_submit_sqes+0x8610/0x8610 [ 1447.584225] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1447.585447] ? wait_for_completion_io+0x270/0x270 [ 1447.586671] ? rcu_read_lock_any_held+0x75/0xa0 [ 1447.587852] ? vfs_write+0x354/0xb10 [ 1447.588801] ? fput_many+0x2f/0x1a0 [ 1447.589729] ? ksys_write+0x1a9/0x260 [ 1447.590697] ? __ia32_sys_read+0xb0/0xb0 [ 1447.591749] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 07:01:18 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 07:01:18 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27", 0xb0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r2, 0x0) 07:01:19 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x4000010, r0, 0x0) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0x6e, 0x80800) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f00000003c0)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r5, &(0x7f00000001c0)=0x80, &(0x7f0000000340)=@llc, 0x0, 0x80000, 0x1, {0x0, r6}}, 0x9) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xc, 0x11, r0, 0x8000000) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r8, r9, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) syz_io_uring_submit(r7, r9, &(0x7f0000000400)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x4004, @fd_index=0x8, 0x8, 0x0, 0x0, 0x1a, 0x0, {0x2, r6}}, 0x5) r10 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x282200, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x50, r10, 0x88a05000) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1447.593101] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1447.594773] do_syscall_64+0x33/0x40 [ 1447.595733] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1447.597103] RIP: 0033:0x7f7015fcab19 [ 1447.598048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1447.602746] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1447.604701] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1447.606521] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1447.608350] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1447.610164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1447.611988] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:01:19 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27", 0xb0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1447.679586] FAULT_INJECTION: forcing a failure. [ 1447.679586] name failslab, interval 1, probability 0, space 0, times 0 [ 1447.682446] CPU: 1 PID: 7959 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1447.683901] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1447.685675] Call Trace: [ 1447.686240] dump_stack+0x107/0x167 [ 1447.687012] should_fail.cold+0x5/0xa [ 1447.687821] ? create_object.isra.0+0x3a/0xa20 [ 1447.688794] should_failslab+0x5/0x20 [ 1447.689603] kmem_cache_alloc+0x5b/0x310 [ 1447.690469] create_object.isra.0+0x3a/0xa20 [ 1447.691400] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1447.692495] kmem_cache_alloc_bulk+0x168/0x320 [ 1447.693475] io_submit_sqes+0x6fe6/0x8610 [ 1447.694380] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1447.695435] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1447.696476] ? find_held_lock+0x2c/0x110 [ 1447.697342] ? io_submit_sqes+0x8610/0x8610 [ 1447.698259] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1447.699287] ? wait_for_completion_io+0x270/0x270 [ 1447.700316] ? rcu_read_lock_any_held+0x75/0xa0 [ 1447.701296] ? vfs_write+0x354/0xb10 [ 1447.702086] ? fput_many+0x2f/0x1a0 [ 1447.702854] ? ksys_write+0x1a9/0x260 [ 1447.703665] ? __ia32_sys_read+0xb0/0xb0 [ 1447.704538] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1447.705653] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1447.706749] do_syscall_64+0x33/0x40 [ 1447.707537] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1447.708638] RIP: 0033:0x7fbe68d5ab19 [ 1447.709435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1447.714103] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1447.716030] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1447.717844] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1447.719644] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1447.721450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1447.723245] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:01:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r2, 0x0) 07:01:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:19 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_FSYNC={0x3, 0x4, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x1, 0x1, {0x0, r4}}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:01:19 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d812", 0xcd, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:19 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 07:01:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) pipe(0x0) [ 1447.853145] FAULT_INJECTION: forcing a failure. [ 1447.853145] name failslab, interval 1, probability 0, space 0, times 0 [ 1447.854604] CPU: 0 PID: 7977 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1447.855438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1447.856465] Call Trace: [ 1447.856794] dump_stack+0x107/0x167 [ 1447.857241] should_fail.cold+0x5/0xa [ 1447.857714] ? create_object.isra.0+0x3a/0xa20 [ 1447.858274] should_failslab+0x5/0x20 [ 1447.858744] kmem_cache_alloc+0x5b/0x310 [ 1447.859240] ? mark_held_locks+0x9e/0xe0 [ 1447.859738] create_object.isra.0+0x3a/0xa20 [ 1447.860281] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1447.860906] kmem_cache_alloc_bulk+0x168/0x320 [ 1447.861473] io_submit_sqes+0x6fe6/0x8610 [ 1447.861994] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1447.862598] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1447.863191] ? find_held_lock+0x2c/0x110 [ 1447.863694] ? io_submit_sqes+0x8610/0x8610 [ 1447.864243] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1447.864832] ? wait_for_completion_io+0x270/0x270 [ 1447.865422] ? rcu_read_lock_any_held+0x75/0xa0 [ 1447.865989] ? vfs_write+0x354/0xb10 [ 1447.866447] ? fput_many+0x2f/0x1a0 [ 1447.866896] ? ksys_write+0x1a9/0x260 [ 1447.867362] ? __ia32_sys_read+0xb0/0xb0 [ 1447.867860] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1447.868516] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1447.869146] do_syscall_64+0x33/0x40 [ 1447.869601] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1447.870229] RIP: 0033:0x7f7015fcab19 [ 1447.870683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1447.872949] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1447.873882] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1447.874755] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1447.875628] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1447.876503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1447.877378] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:01:32 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) [ 1461.118311] FAULT_INJECTION: forcing a failure. [ 1461.118311] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.119730] CPU: 0 PID: 7997 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1461.120895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1461.121895] Call Trace: [ 1461.122224] dump_stack+0x107/0x167 [ 1461.122664] should_fail.cold+0x5/0xa [ 1461.123132] ? create_object.isra.0+0x3a/0xa20 [ 1461.123684] should_failslab+0x5/0x20 [ 1461.124146] kmem_cache_alloc+0x5b/0x310 [ 1461.124653] ? mark_held_locks+0x9e/0xe0 [ 1461.125152] create_object.isra.0+0x3a/0xa20 [ 1461.125684] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1461.126301] kmem_cache_alloc_bulk+0x168/0x320 [ 1461.126872] io_submit_sqes+0x6fe6/0x8610 [ 1461.127393] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1461.128007] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1461.128611] ? find_held_lock+0x2c/0x110 [ 1461.129111] ? io_submit_sqes+0x8610/0x8610 [ 1461.129637] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1461.130229] ? wait_for_completion_io+0x270/0x270 [ 1461.130816] ? rcu_read_lock_any_held+0x75/0xa0 [ 1461.131378] ? vfs_write+0x354/0xb10 [ 1461.131829] ? fput_many+0x2f/0x1a0 [ 1461.132269] ? ksys_write+0x1a9/0x260 [ 1461.132736] ? __ia32_sys_read+0xb0/0xb0 [ 1461.133242] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1461.133879] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1461.134506] do_syscall_64+0x33/0x40 [ 1461.134965] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1461.135596] RIP: 0033:0x7f7015fcab19 [ 1461.136051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1461.136529] FAULT_INJECTION: forcing a failure. 07:01:32 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$nfs(&(0x7f0000000340), &(0x7f0000000380)='\x00', 0x0, 0x6, &(0x7f0000000640)=[{&(0x7f00000003c0)="92302ad3a7c98b2f253754790646c3a753df", 0x12, 0x9}, {&(0x7f0000000400)="0f724656b6a394211477feed8efb97f1facd32f282d0bb67d38800fbe8a965efcb78e13e686ea62dbd", 0x29, 0x7}, {&(0x7f0000000540)="224233cc47f921e98cfa71b08c21b538f6c0", 0x12, 0xd7}, {&(0x7f0000000580)="69e34abdf7061ee233", 0x9, 0x81}, {&(0x7f00000005c0)="5fb48d230f589cd02efc0bfc3bedc00166bd269c350b5c2a23551c", 0x1b, 0x1}, {&(0x7f0000000600)="5fcc28cbe7bbc94ec12763af9f747146cbd89622ec978d73a0d8d0097efe5529b97942adda9feab6558db6027a6f6f5c7c8571cb18d36c9c", 0x38, 0xfffffffffffff6bd}], 0x41084, &(0x7f0000000900)=ANY=[@ANYBLOB="002c65787433002c002c002c657874159e2c657569643d904cbb2d4530bfaf64b6457585ead03b730f6cfb38e57c19b2c762313094fffdfd626f0a2410bc4af28a2050c7972912bfd8d1f3fbaaa4a12b79912d3e0dc315b40ddac128b08472b746ac77b151781b9af309a27b8a0295111c99f4a91e6f43e8e143cf6784ce11d47cd0b51eb896c857de53b5f869408ede16dc9105c93103b70fd8af3d3e34dccbaffc41627ce8da118b37aa45baf8dd91fcba902578599120debdbae454a142d353aca6f9be68cef70048dfa1e0662a4375f25f1b8d826da57a1f4d7744ba79013c440d00bddd228f04bacb456cd0d1703a8b318f5c25f37f70d2dd32ac6c46fe6eb4ae9c13a4548d65b5bcc64a514e9e0ff1eb07fdf829dda32c993157fa7e2d51c2aafeba93a389d34e735863518cead3bad25060f6234866ab6f382403cd38e300898a95e034746f432e48a147fc54d7652af820d1152868e8924a35a984438ce2cf1f328410", @ANYRESDEC=0x0, @ANYBLOB=',dont_hash,uid<', @ANYRESDEC=0xee01, @ANYBLOB="2c66756e633d4d4f44554c455f434845434b2c6673757569643d61303438313030662d393602652d383e63352d38a537642d65623003006630372c6d6561737572652c00"]) unlinkat(r4, &(0x7f00000007c0)='./file1\x00', 0x200) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) stat(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r6, 0x0, r5) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x101, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="25457b149026c54bde5b57e6bb52f31d08ad92516bea10daadc02a13a2b233eef7004cecab602f8394b3d272de3c731164187bb4da200f6e808c363a84cb884a2c19e13452482b495bedc97fde91bf495505bb45e041de10", 0x58, 0x101}], 0x20, &(0x7f0000000440)=ANY=[@ANYBLOB="a341f935d7137a673671f139f90db81ee8671a75ebff17c85055d16b16dd4cd1c8ab4ee44ce2d9d99f3e6b6874291dad8938a69fece553904fe1ebd1ef2280f6faa39d8ff4282fce0dc557637929267d75b23ae1ba0b3edad7cf59e61c9979a6f153c18afb60f55d21a04ecb85db", @ANYRESHEX=r6, @ANYBLOB="2c6f726c6f762c6e6f67727069642c7063723d30303030060000003030303030303030303034342c61756469742c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',dont_appraise,smackfsdef=\x00,pcr=00000000000000000029,\x00']) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:01:32 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:01:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:32 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d812", 0xcd, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, @perf_config_ext={0x40000000000000, 0x400000000006}, 0x10000, 0xfffffffffffffffd, 0x0, 0x1, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) 07:01:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:32 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) [ 1461.136529] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.138309] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1461.138321] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1461.138326] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1461.138332] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.138338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1461.138343] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1461.154386] CPU: 1 PID: 7998 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1461.156235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1461.158287] Call Trace: [ 1461.158919] dump_stack+0x107/0x167 [ 1461.159786] should_fail.cold+0x5/0xa [ 1461.160707] ? create_object.isra.0+0x3a/0xa20 [ 1461.161802] should_failslab+0x5/0x20 [ 1461.162708] kmem_cache_alloc+0x5b/0x310 [ 1461.163676] ? mark_held_locks+0x9e/0xe0 [ 1461.164576] create_object.isra.0+0x3a/0xa20 [ 1461.165610] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1461.166844] kmem_cache_alloc_bulk+0x168/0x320 [ 1461.167944] io_submit_sqes+0x6fe6/0x8610 [ 1461.168973] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1461.170127] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1461.171206] ? find_held_lock+0x2c/0x110 [ 1461.172189] ? io_submit_sqes+0x8610/0x8610 [ 1461.173248] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1461.174405] ? wait_for_completion_io+0x270/0x270 [ 1461.175542] ? rcu_read_lock_any_held+0x75/0xa0 [ 1461.176669] ? vfs_write+0x354/0xb10 [ 1461.177819] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1461.179230] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1461.180906] ? ksys_write+0x1a9/0x260 [ 1461.182069] ? __ia32_sys_read+0xb0/0xb0 [ 1461.183338] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1461.184967] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1461.186566] do_syscall_64+0x33/0x40 [ 1461.187612] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1461.188769] RIP: 0033:0x7fbe68d5ab19 [ 1461.189584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1461.193802] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1461.195425] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1461.196956] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1461.198456] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.199997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1461.201511] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 [ 1461.232726] loop5: detected capacity change from 0 to 8383488 07:01:32 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c636163881f70ea1f050e4fc54d954e686500006d61702c63616368653d6e6f6e652c00"]) perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x80, 0x62, 0x0, 0x40, 0x7, 0x0, 0xb9b, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0xe6}, 0x10, 0x98a, 0x9, 0x6, 0x100, 0x401, 0x7f, 0x0, 0x0, 0x0, 0xc49}, r1, 0x3, r0, 0x9) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r3, 0x0) pipe(0x0) 07:01:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = fsmount(r0, 0x1, 0x80) renameat2(r0, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000100)='./file1\x00', 0x1) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) 07:01:32 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 07:01:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0x0) [ 1461.277465] FAULT_INJECTION: forcing a failure. [ 1461.277465] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.278882] CPU: 0 PID: 8014 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1461.279715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1461.280726] Call Trace: [ 1461.281050] dump_stack+0x107/0x167 [ 1461.281494] should_fail.cold+0x5/0xa [ 1461.281962] ? create_object.isra.0+0x3a/0xa20 [ 1461.282520] should_failslab+0x5/0x20 [ 1461.282984] kmem_cache_alloc+0x5b/0x310 [ 1461.283481] create_object.isra.0+0x3a/0xa20 [ 1461.284013] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1461.284649] __kmalloc_node+0x1ae/0x420 [ 1461.285138] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1461.285762] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1461.286376] kmem_cache_alloc_bulk+0x182/0x320 [ 1461.286953] io_submit_sqes+0x6fe6/0x8610 [ 1461.287480] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1461.288095] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1461.288698] ? lock_downgrade+0x6d0/0x6d0 [ 1461.289209] ? io_submit_sqes+0x8610/0x8610 [ 1461.289758] ? do_raw_spin_unlock+0x4f/0x220 [ 1461.290302] ? sched_ttwu_pending+0x20b/0x360 [ 1461.290858] ? sched_set_stop_task+0x2a0/0x2a0 [ 1461.291421] ? fput_many+0x2f/0x1a0 [ 1461.291871] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1461.292531] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1461.293192] do_syscall_64+0x33/0x40 [ 1461.293687] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1461.294498] RIP: 0033:0x7f7015fcab19 [ 1461.294956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1461.297253] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1461.298187] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1461.299065] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1461.299935] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.300805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1461.301678] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1461.330756] loop5: detected capacity change from 0 to 512 07:01:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0x0) 07:01:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000040)) 07:01:32 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d812", 0xcd, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:32 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:01:32 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) [ 1461.480934] FAULT_INJECTION: forcing a failure. [ 1461.480934] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.483801] CPU: 1 PID: 8031 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1461.485853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1461.488336] Call Trace: [ 1461.489132] dump_stack+0x107/0x167 [ 1461.490230] should_fail.cold+0x5/0xa [ 1461.491381] ? create_object.isra.0+0x3a/0xa20 [ 1461.492762] should_failslab+0x5/0x20 [ 1461.493899] kmem_cache_alloc+0x5b/0x310 [ 1461.495099] ? mark_held_locks+0x9e/0xe0 [ 1461.496124] create_object.isra.0+0x3a/0xa20 [ 1461.497287] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1461.498653] kmem_cache_alloc_bulk+0x168/0x320 [ 1461.499779] io_submit_sqes+0x6fe6/0x8610 [ 1461.500799] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1461.501969] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1461.503095] ? find_held_lock+0x2c/0x110 [ 1461.504047] ? io_submit_sqes+0x8610/0x8610 [ 1461.505066] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1461.506194] ? wait_for_completion_io+0x270/0x270 [ 1461.507315] ? rcu_read_lock_any_held+0x75/0xa0 [ 1461.508400] ? vfs_write+0x354/0xb10 [ 1461.509269] ? fput_many+0x2f/0x1a0 [ 1461.510114] ? ksys_write+0x1a9/0x260 [ 1461.511005] ? __ia32_sys_read+0xb0/0xb0 [ 1461.511962] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1461.513196] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1461.514397] do_syscall_64+0x33/0x40 [ 1461.515258] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1461.516439] RIP: 0033:0x7fbe68d5ab19 [ 1461.517297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1461.521558] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1461.523300] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1461.524943] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1461.526578] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.528205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1461.529847] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:01:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0x0) 07:01:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) dup(r1) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) 07:01:46 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) 07:01:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:46 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:01:46 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf73", 0xdc, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:46 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) 07:01:46 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0)={0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_SET_OP_GET_FNAME(r5, 0x1, 0x53, &(0x7f0000000180)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000280)=0x2c) connect$inet(r4, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/locks\x00', 0x0, 0x0) sendfile(r4, r6, 0x0, 0x6) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r7, r8, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) syz_io_uring_submit(r7, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000040)='./file0\x00', 0xa9, 0x622400, 0x12345}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1475.534233] FAULT_INJECTION: forcing a failure. [ 1475.534233] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.538546] CPU: 1 PID: 8043 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1475.540741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1475.542933] Call Trace: [ 1475.543643] dump_stack+0x107/0x167 [ 1475.544716] should_fail.cold+0x5/0xa [ 1475.545714] ? create_object.isra.0+0x3a/0xa20 [ 1475.546900] should_failslab+0x5/0x20 [ 1475.547907] kmem_cache_alloc+0x5b/0x310 [ 1475.549146] ? mark_held_locks+0x9e/0xe0 [ 1475.550215] create_object.isra.0+0x3a/0xa20 [ 1475.551241] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1475.552353] kmem_cache_alloc_bulk+0x168/0x320 [ 1475.553361] io_submit_sqes+0x6fe6/0x8610 [ 1475.554280] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1475.555352] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1475.556405] ? find_held_lock+0x2c/0x110 [ 1475.557304] ? io_submit_sqes+0x8610/0x8610 [ 1475.558239] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1475.559275] ? wait_for_completion_io+0x270/0x270 [ 1475.560321] ? rcu_read_lock_any_held+0x75/0xa0 [ 1475.561330] ? vfs_write+0x354/0xb10 [ 1475.562132] ? fput_many+0x2f/0x1a0 [ 1475.562897] ? ksys_write+0x1a9/0x260 [ 1475.563718] ? __ia32_sys_read+0xb0/0xb0 [ 1475.564626] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1475.565751] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1475.566861] do_syscall_64+0x33/0x40 [ 1475.567666] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1475.568775] RIP: 0033:0x7fbe68d5ab19 [ 1475.569595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1475.573541] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1475.575171] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1475.576702] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1475.578251] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.579770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1475.581316] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:01:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:47 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf73", 0xdc, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1475.597274] FAULT_INJECTION: forcing a failure. [ 1475.597274] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.599743] CPU: 1 PID: 8052 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1475.601229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1475.602995] Call Trace: [ 1475.603559] dump_stack+0x107/0x167 [ 1475.604364] should_fail.cold+0x5/0xa [ 1475.605224] ? create_object.isra.0+0x3a/0xa20 [ 1475.606201] should_failslab+0x5/0x20 [ 1475.607015] kmem_cache_alloc+0x5b/0x310 [ 1475.607868] ? mark_held_locks+0x9e/0xe0 [ 1475.608757] create_object.isra.0+0x3a/0xa20 [ 1475.609709] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1475.610803] kmem_cache_alloc_bulk+0x168/0x320 [ 1475.611987] io_submit_sqes+0x6fe6/0x8610 [ 1475.612936] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1475.614023] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1475.615064] ? find_held_lock+0x2c/0x110 [ 1475.615985] ? io_submit_sqes+0x8610/0x8610 [ 1475.617158] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1475.618436] ? wait_for_completion_io+0x270/0x270 [ 1475.619712] ? rcu_read_lock_any_held+0x75/0xa0 [ 1475.620795] ? vfs_write+0x354/0xb10 [ 1475.621600] ? fput_many+0x2f/0x1a0 [ 1475.622387] ? ksys_write+0x1a9/0x260 [ 1475.623200] ? __ia32_sys_read+0xb0/0xb0 [ 1475.624089] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1475.625222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1475.626329] do_syscall_64+0x33/0x40 [ 1475.627133] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1475.628219] RIP: 0033:0x7f7015fcab19 [ 1475.629045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1475.633018] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1475.634652] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1475.636164] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1475.637684] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.639222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1475.640748] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:01:47 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf73", 0xdc, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:47 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:01:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:47 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a", 0xe3, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:47 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) [ 1475.825222] FAULT_INJECTION: forcing a failure. [ 1475.825222] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.826759] CPU: 0 PID: 8074 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1475.827586] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1475.828600] Call Trace: [ 1475.828927] dump_stack+0x107/0x167 [ 1475.829373] should_fail.cold+0x5/0xa [ 1475.829861] ? create_object.isra.0+0x3a/0xa20 [ 1475.830422] should_failslab+0x5/0x20 [ 1475.830889] kmem_cache_alloc+0x5b/0x310 [ 1475.831387] ? mark_held_locks+0x9e/0xe0 [ 1475.831888] create_object.isra.0+0x3a/0xa20 [ 1475.832429] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1475.833063] kmem_cache_alloc_bulk+0x168/0x320 [ 1475.833625] io_submit_sqes+0x6fe6/0x8610 [ 1475.834148] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1475.834753] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1475.835344] ? find_held_lock+0x2c/0x110 [ 1475.835841] ? io_submit_sqes+0x8610/0x8610 [ 1475.836370] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1475.836971] ? wait_for_completion_io+0x270/0x270 [ 1475.837559] ? rcu_read_lock_any_held+0x75/0xa0 [ 1475.838135] ? vfs_write+0x354/0xb10 [ 1475.838591] ? fput_many+0x2f/0x1a0 [ 1475.839037] ? ksys_write+0x1a9/0x260 [ 1475.839504] ? __ia32_sys_read+0xb0/0xb0 [ 1475.840002] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1475.840658] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1475.841289] do_syscall_64+0x33/0x40 [ 1475.841739] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1475.842360] RIP: 0033:0x7fbe68d5ab19 [ 1475.842812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1475.845056] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1475.845982] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1475.846852] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1475.847720] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.848596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1475.849464] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:01:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:59 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a", 0xe3, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:59 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:01:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) [ 1487.814314] FAULT_INJECTION: forcing a failure. [ 1487.814314] name failslab, interval 1, probability 0, space 0, times 0 [ 1487.816171] CPU: 0 PID: 8090 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1487.817218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1487.818494] Call Trace: [ 1487.818900] dump_stack+0x107/0x167 [ 1487.819459] should_fail.cold+0x5/0xa [ 1487.820037] ? create_object.isra.0+0x3a/0xa20 [ 1487.820743] should_failslab+0x5/0x20 [ 1487.821322] kmem_cache_alloc+0x5b/0x310 [ 1487.822164] create_object.isra.0+0x3a/0xa20 [ 1487.822835] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1487.823614] kmem_cache_alloc_bulk+0x168/0x320 [ 1487.824316] io_submit_sqes+0x6fe6/0x8610 [ 1487.824972] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1487.825730] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1487.826469] ? find_held_lock+0x2c/0x110 [ 1487.827089] ? io_submit_sqes+0x8610/0x8610 [ 1487.827750] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1487.828486] ? wait_for_completion_io+0x270/0x270 [ 1487.829229] ? rcu_read_lock_any_held+0x75/0xa0 [ 1487.829936] ? vfs_write+0x354/0xb10 [ 1487.830502] ? fput_many+0x2f/0x1a0 [ 1487.831054] ? ksys_write+0x1a9/0x260 [ 1487.831633] ? __ia32_sys_read+0xb0/0xb0 [ 1487.832258] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1487.833058] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1487.833675] FAULT_INJECTION: forcing a failure. [ 1487.833675] name failslab, interval 1, probability 0, space 0, times 0 [ 1487.833852] do_syscall_64+0x33/0x40 [ 1487.836809] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1487.837590] RIP: 0033:0x7fbe68d5ab19 [ 1487.838156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1487.840982] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1487.842142] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1487.843224] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1487.844315] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.845406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.846490] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:01:59 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_setup(0x7bc0, &(0x7f0000000240)={0x0, 0xedad, 0x8, 0x0, 0xe, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) syz_io_uring_submit(r3, 0x0, &(0x7f0000000380)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000340)={r4, r5+10000000}, 0x1, 0x1, 0x1}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:01:59 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) 07:01:59 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) 07:01:59 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a", 0xe3, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1487.847613] CPU: 1 PID: 8093 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1487.849494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1487.851301] Call Trace: [ 1487.851883] dump_stack+0x107/0x167 [ 1487.852692] should_fail.cold+0x5/0xa [ 1487.853527] ? create_object.isra.0+0x3a/0xa20 [ 1487.854515] should_failslab+0x5/0x20 [ 1487.855341] kmem_cache_alloc+0x5b/0x310 [ 1487.856223] ? mark_held_locks+0x9e/0xe0 [ 1487.857116] create_object.isra.0+0x3a/0xa20 [ 1487.858063] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1487.859161] kmem_cache_alloc_bulk+0x168/0x320 [ 1487.860149] io_submit_sqes+0x6fe6/0x8610 [ 1487.861077] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1487.862150] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1487.863188] ? find_held_lock+0x2c/0x110 [ 1487.864065] ? io_submit_sqes+0x8610/0x8610 [ 1487.865008] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1487.866045] ? wait_for_completion_io+0x270/0x270 [ 1487.867083] ? rcu_read_lock_any_held+0x75/0xa0 [ 1487.868080] ? vfs_write+0x354/0xb10 [ 1487.868887] ? fput_many+0x2f/0x1a0 [ 1487.869669] ? ksys_write+0x1a9/0x260 [ 1487.870486] ? __ia32_sys_read+0xb0/0xb0 [ 1487.871362] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1487.872487] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1487.873606] do_syscall_64+0x33/0x40 [ 1487.874406] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1487.875508] RIP: 0033:0x7f7015fcab19 [ 1487.876311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1487.880287] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1487.881931] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1487.883477] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1487.885036] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.886569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.888116] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:01:59 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:01:59 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:01:59 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0xa) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:01:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:01:59 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a", 0xe3, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:01:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file1\x00', 0x525802, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3b, 0x56, 0xd8, 0x1, 0x0, 0x187, 0xac026, 0x9, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x8, 0x66d5}, 0x272ae80d5220aa66, 0xfffffffffffffffa, 0x9, 0x7, 0x180000000000, 0x1, 0xc6a, 0x0, 0x0, 0x0, 0x1}, r0, 0x8, r1, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x20, 0x40, 0x9, 0x20, 0x0, 0x2, 0x80, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x100000000, 0x5c0b}, 0x800, 0x1, 0xb6, 0x8, 0x6, 0x4, 0x1, 0x0, 0x8, 0x0, 0xe25}, 0xffffffffffffffff, 0xe, r1, 0x4) pipe(0x0) 07:01:59 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 07:01:59 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:01:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) [ 1488.092357] FAULT_INJECTION: forcing a failure. [ 1488.092357] name failslab, interval 1, probability 0, space 0, times 0 [ 1488.094155] CPU: 0 PID: 8117 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1488.095076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1488.096204] Call Trace: [ 1488.096562] dump_stack+0x107/0x167 [ 1488.097061] should_fail.cold+0x5/0xa [ 1488.097574] ? create_object.isra.0+0x3a/0xa20 [ 1488.098181] should_failslab+0x5/0x20 [ 1488.098697] kmem_cache_alloc+0x5b/0x310 07:01:59 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) [ 1488.099243] ? mark_held_locks+0x9e/0xe0 [ 1488.099916] create_object.isra.0+0x3a/0xa20 [ 1488.100505] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1488.101201] kmem_cache_alloc_bulk+0x168/0x320 [ 1488.101799] io_submit_sqes+0x6fe6/0x8610 [ 1488.102371] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1488.103037] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1488.103690] ? find_held_lock+0x2c/0x110 [ 1488.104241] ? io_submit_sqes+0x8610/0x8610 [ 1488.104830] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1488.105474] ? wait_for_completion_io+0x270/0x270 [ 1488.106100] ? rcu_read_lock_any_held+0x75/0xa0 [ 1488.106729] ? vfs_write+0x354/0xb10 [ 1488.107233] ? fput_many+0x2f/0x1a0 [ 1488.107718] ? ksys_write+0x1a9/0x260 [ 1488.108231] ? __ia32_sys_read+0xb0/0xb0 [ 1488.108792] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1488.109500] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1488.110193] do_syscall_64+0x33/0x40 [ 1488.110692] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1488.111374] RIP: 0033:0x7fbe68d5ab19 [ 1488.111872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1488.114326] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1488.115334] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1488.116251] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1488.117209] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.118139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.119088] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 [ 1488.193491] FAULT_INJECTION: forcing a failure. [ 1488.193491] name failslab, interval 1, probability 0, space 0, times 0 [ 1488.195005] CPU: 0 PID: 8123 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1488.195880] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1488.196916] Call Trace: [ 1488.197256] dump_stack+0x107/0x167 [ 1488.197728] should_fail.cold+0x5/0xa [ 1488.198202] ? create_object.isra.0+0x3a/0xa20 [ 1488.198791] should_failslab+0x5/0x20 [ 1488.199264] kmem_cache_alloc+0x5b/0x310 [ 1488.199789] create_object.isra.0+0x3a/0xa20 [ 1488.200331] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1488.201069] kmem_cache_alloc_bulk+0x168/0x320 [ 1488.201770] io_submit_sqes+0x6fe6/0x8610 [ 1488.202367] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1488.203004] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1488.203606] ? find_held_lock+0x2c/0x110 [ 1488.204125] ? io_submit_sqes+0x8610/0x8610 [ 1488.204688] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1488.205301] ? wait_for_completion_io+0x270/0x270 [ 1488.205920] ? rcu_read_lock_any_held+0x75/0xa0 [ 1488.206515] ? vfs_write+0x354/0xb10 [ 1488.206980] ? fput_many+0x2f/0x1a0 [ 1488.207444] ? ksys_write+0x1a9/0x260 [ 1488.207928] ? __ia32_sys_read+0xb0/0xb0 [ 1488.208447] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1488.209143] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1488.209798] do_syscall_64+0x33/0x40 [ 1488.210261] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1488.210916] RIP: 0033:0x7f7015fcab19 [ 1488.211389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1488.213727] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1488.214700] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1488.215621] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1488.216520] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.217430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.218335] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:02:14 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) 07:02:14 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a0", 0xe7, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:02:14 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 07:02:14 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:14 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:14 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x155) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:02:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) [ 1502.956215] FAULT_INJECTION: forcing a failure. [ 1502.956215] name failslab, interval 1, probability 0, space 0, times 0 [ 1502.958898] CPU: 0 PID: 8139 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1502.960428] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1502.962304] Call Trace: [ 1502.962896] dump_stack+0x107/0x167 [ 1502.963712] should_fail.cold+0x5/0xa [ 1502.964570] should_failslab+0x5/0x20 [ 1502.965431] kmem_cache_alloc_bulk+0x4b/0x320 [ 1502.966436] io_submit_sqes+0x6fe6/0x8610 [ 1502.967391] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1502.968506] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1502.969594] ? find_held_lock+0x2c/0x110 [ 1502.970505] ? io_submit_sqes+0x8610/0x8610 [ 1502.971474] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1502.972558] ? wait_for_completion_io+0x270/0x270 [ 1502.973646] ? rcu_read_lock_any_held+0x75/0xa0 [ 1502.974680] ? vfs_write+0x354/0xb10 [ 1502.975511] ? fput_many+0x2f/0x1a0 [ 1502.976328] ? ksys_write+0x1a9/0x260 [ 1502.977202] ? __ia32_sys_read+0xb0/0xb0 [ 1502.978132] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1502.979318] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1502.980477] do_syscall_64+0x33/0x40 [ 1502.981333] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1502.982482] RIP: 0033:0x7f7015fcab19 [ 1502.983320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1502.987484] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1502.989208] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1502.990812] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1502.992419] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1502.994032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1502.995640] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1503.012382] FAULT_INJECTION: forcing a failure. [ 1503.012382] name failslab, interval 1, probability 0, space 0, times 0 [ 1503.015187] CPU: 0 PID: 8136 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1503.016739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1503.018613] Call Trace: [ 1503.019209] dump_stack+0x107/0x167 [ 1503.020030] should_fail.cold+0x5/0xa [ 1503.020905] should_failslab+0x5/0x20 [ 1503.021766] kmem_cache_alloc_bulk+0x4b/0x320 [ 1503.022783] io_submit_sqes+0x6fe6/0x8610 [ 1503.023748] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1503.024879] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1503.025979] ? find_held_lock+0x2c/0x110 [ 1503.026914] ? io_submit_sqes+0x8610/0x8610 [ 1503.027912] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1503.029016] ? wait_for_completion_io+0x270/0x270 [ 1503.030098] ? rcu_read_lock_any_held+0x75/0xa0 [ 1503.031149] ? vfs_write+0x354/0xb10 [ 1503.031990] ? fput_many+0x2f/0x1a0 [ 1503.032809] ? ksys_write+0x1a9/0x260 [ 1503.033669] ? __ia32_sys_read+0xb0/0xb0 [ 1503.034588] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1503.035773] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1503.036956] do_syscall_64+0x33/0x40 [ 1503.037798] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1503.038954] RIP: 0033:0x7fbe68d5ab19 [ 1503.039792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1503.043951] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1503.045670] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1503.047274] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1503.048887] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1503.050495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1503.052103] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:02:14 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:14 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a", 0xe3, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:02:14 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a0", 0xe7, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:14 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) pipe(0x0) dup3(r0, r0, 0x80000) 07:02:14 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:02:14 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:14 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) 07:02:14 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a0", 0xe7, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1503.390700] FAULT_INJECTION: forcing a failure. [ 1503.390700] name failslab, interval 1, probability 0, space 0, times 0 [ 1503.393165] CPU: 1 PID: 8162 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1503.394589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1503.396323] Call Trace: [ 1503.396899] dump_stack+0x107/0x167 [ 1503.397679] should_fail.cold+0x5/0xa [ 1503.398486] ? create_object.isra.0+0x3a/0xa20 [ 1503.399449] should_failslab+0x5/0x20 [ 1503.400255] kmem_cache_alloc+0x5b/0x310 [ 1503.401120] ? mark_held_locks+0x9e/0xe0 [ 1503.401983] create_object.isra.0+0x3a/0xa20 [ 1503.402907] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1503.403971] kmem_cache_alloc_bulk+0x168/0x320 [ 1503.404949] io_submit_sqes+0x6fe6/0x8610 [ 1503.405848] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1503.406908] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1503.407933] ? find_held_lock+0x2c/0x110 [ 1503.408800] ? io_submit_sqes+0x8610/0x8610 [ 1503.409715] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1503.410724] ? wait_for_completion_io+0x270/0x270 [ 1503.411737] ? rcu_read_lock_any_held+0x75/0xa0 [ 1503.412720] ? vfs_write+0x354/0xb10 [ 1503.413516] ? fput_many+0x2f/0x1a0 [ 1503.414287] ? ksys_write+0x1a9/0x260 [ 1503.415091] ? __ia32_sys_read+0xb0/0xb0 [ 1503.415958] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1503.417073] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1503.418170] do_syscall_64+0x33/0x40 [ 1503.418971] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1503.420062] RIP: 0033:0x7f7015fcab19 [ 1503.420869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1503.424753] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1503.426366] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1503.427872] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1503.429401] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1503.430898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1503.432403] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:02:26 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 07:02:26 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountstats\x00') r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r1, &(0x7f0000000040)=@other={'decodes', ' ', 'none'}, 0xd) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) dup2(r0, r0) r3 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r3}, &(0x7f0000000040)) dup2(r0, r0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000001c0)=0x0) process_vm_writev(r4, &(0x7f0000000200)=[{&(0x7f0000000280)=""/90, 0x5a}, {&(0x7f0000000300)=""/221, 0xdd}, {&(0x7f0000000400)=""/134, 0x86}], 0x3, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/208, 0xd0}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x94, 0x9, 0x0, 0x0, 0x0, 0x7d, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9f7, 0x2, @perf_config_ext={0xa87, 0x10000}, 0x12b19, 0x7e, 0xffffffff, 0x4, 0x1000, 0x47, 0x4, 0x0, 0x7ff, 0x0, 0xfffd}, r3, 0xe, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r5, 0x0) pipe(0x0) 07:02:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:02:26 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) 07:02:26 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:26 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38", 0xe9, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:26 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x2000, @fd=r6, 0x9, 0x8, 0x4, 0x1, 0x1, {0x0, r7}}, 0x3) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1515.461943] FAULT_INJECTION: forcing a failure. [ 1515.461943] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.464999] CPU: 1 PID: 8172 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1515.466813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.469032] Call Trace: [ 1515.469729] dump_stack+0x107/0x167 [ 1515.470710] should_fail.cold+0x5/0xa [ 1515.471722] ? create_object.isra.0+0x3a/0xa20 [ 1515.472932] should_failslab+0x5/0x20 [ 1515.473916] kmem_cache_alloc+0x5b/0x310 [ 1515.474966] ? mark_held_locks+0x9e/0xe0 [ 1515.476022] create_object.isra.0+0x3a/0xa20 [ 1515.477181] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1515.478543] kmem_cache_alloc_bulk+0x168/0x320 [ 1515.479778] io_submit_sqes+0x6fe6/0x8610 [ 1515.480911] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1515.482236] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1515.483519] ? find_held_lock+0x2c/0x110 [ 1515.484566] ? io_submit_sqes+0x8610/0x8610 [ 1515.485635] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1515.486716] ? wait_for_completion_io+0x270/0x270 [ 1515.487814] ? rcu_read_lock_any_held+0x75/0xa0 [ 1515.488858] ? vfs_write+0x354/0xb10 [ 1515.489699] ? fput_many+0x2f/0x1a0 [ 1515.490528] ? ksys_write+0x1a9/0x260 [ 1515.491390] ? __ia32_sys_read+0xb0/0xb0 [ 1515.492311] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.492700] pci 0000:00:02.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem [ 1515.493506] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.495800] do_syscall_64+0x33/0x40 [ 1515.496631] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.497780] RIP: 0033:0x7f7015fcab19 [ 1515.498605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.502781] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1515.504469] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1515.506079] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1515.507673] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.509260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 07:02:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1515.510828] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:02:26 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x141000, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) execveat(r4, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='\x00', &(0x7f0000000240)='/$-]\"],+}\x00', &(0x7f0000000280)='$]@&^\x00', &(0x7f0000000340)=']/\x00'], &(0x7f00000003c0), 0x400) 07:02:26 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38", 0xe9, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1515.575954] FAULT_INJECTION: forcing a failure. [ 1515.575954] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1515.577564] CPU: 0 PID: 8191 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1515.578385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.579387] Call Trace: [ 1515.579710] dump_stack+0x107/0x167 [ 1515.580148] should_fail.cold+0x5/0xa [ 1515.580608] __alloc_pages_nodemask+0x182/0x600 [ 1515.581174] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1515.581904] alloc_pages_current+0x187/0x280 [ 1515.582433] allocate_slab+0x26f/0x380 [ 1515.582903] ___slab_alloc+0x470/0x700 [ 1515.583372] ? io_submit_sqes+0x6fe6/0x8610 [ 1515.583899] ? kmem_cache_alloc_bulk+0x1ec/0x320 [ 1515.584468] kmem_cache_alloc_bulk+0x1ec/0x320 [ 1515.585024] io_submit_sqes+0x6fe6/0x8610 [ 1515.585537] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1515.586136] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1515.586715] ? find_held_lock+0x2c/0x110 [ 1515.587207] ? io_submit_sqes+0x8610/0x8610 [ 1515.587730] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1515.588309] ? wait_for_completion_io+0x270/0x270 [ 1515.588901] ? rcu_read_lock_any_held+0x75/0xa0 [ 1515.589459] ? vfs_write+0x354/0xb10 [ 1515.589909] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1515.590457] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1515.591105] ? ksys_write+0x1a9/0x260 [ 1515.591561] ? __ia32_sys_read+0xb0/0xb0 [ 1515.592051] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.592678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.593306] do_syscall_64+0x33/0x40 [ 1515.593751] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.594367] RIP: 0033:0x7fbe68d5ab19 [ 1515.594812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.597025] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1515.597941] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1515.598802] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1515.599668] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.600528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1515.601400] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:02:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:02:27 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) 07:02:27 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38", 0xe9, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:27 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38", 0xe9, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:02:39 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000004, 0x30, r0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:02:39 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x1, 0x7, 0x8}) 07:02:39 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) 07:02:39 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:39 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:39 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) [ 1528.549808] FAULT_INJECTION: forcing a failure. [ 1528.549808] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.552706] CPU: 1 PID: 8225 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1528.554461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.556587] Call Trace: [ 1528.557428] dump_stack+0x107/0x167 [ 1528.558373] should_fail.cold+0x5/0xa [ 1528.559345] ? create_object.isra.0+0x3a/0xa20 [ 1528.560509] should_failslab+0x5/0x20 [ 1528.561500] kmem_cache_alloc+0x5b/0x310 [ 1528.562448] ? mark_held_locks+0x9e/0xe0 [ 1528.563374] create_object.isra.0+0x3a/0xa20 [ 1528.564365] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1528.565532] kmem_cache_alloc_bulk+0x168/0x320 [ 1528.566576] io_submit_sqes+0x6fe6/0x8610 [ 1528.567561] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1528.568691] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1528.569803] ? find_held_lock+0x2c/0x110 [ 1528.570728] ? io_submit_sqes+0x8610/0x8610 [ 1528.571711] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1528.572805] ? wait_for_completion_io+0x270/0x270 [ 1528.573909] ? rcu_read_lock_any_held+0x75/0xa0 [ 1528.574967] ? vfs_write+0x354/0xb10 [ 1528.575811] ? fput_many+0x2f/0x1a0 [ 1528.576639] ? ksys_write+0x1a9/0x260 [ 1528.577559] ? __ia32_sys_read+0xb0/0xb0 [ 1528.578486] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1528.579675] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.580851] do_syscall_64+0x33/0x40 [ 1528.581703] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.582871] RIP: 0033:0x7f7015fcab19 [ 1528.583716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.587885] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1528.589624] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1528.591232] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1528.592838] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.594458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.596070] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:02:40 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) [ 1528.678396] FAULT_INJECTION: forcing a failure. [ 1528.678396] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.681376] CPU: 0 PID: 8230 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1528.682915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.684761] Call Trace: [ 1528.685362] dump_stack+0x107/0x167 [ 1528.686185] should_fail.cold+0x5/0xa [ 1528.687043] ? create_object.isra.0+0x3a/0xa20 [ 1528.688084] should_failslab+0x5/0x20 [ 1528.688937] kmem_cache_alloc+0x5b/0x310 [ 1528.689874] ? mark_held_locks+0x9e/0xe0 [ 1528.690791] create_object.isra.0+0x3a/0xa20 [ 1528.691769] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1528.692922] kmem_cache_alloc_bulk+0x168/0x320 [ 1528.693956] io_submit_sqes+0x6fe6/0x8610 [ 1528.694906] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1528.696021] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1528.697123] ? find_held_lock+0x2c/0x110 [ 1528.698042] ? io_submit_sqes+0x8610/0x8610 [ 1528.699010] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1528.700098] ? wait_for_completion_io+0x270/0x270 [ 1528.701185] ? rcu_read_lock_any_held+0x75/0xa0 [ 1528.702226] ? vfs_write+0x354/0xb10 [ 1528.703062] ? fput_many+0x2f/0x1a0 [ 1528.703882] ? ksys_write+0x1a9/0x260 [ 1528.704745] ? __ia32_sys_read+0xb0/0xb0 [ 1528.705672] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1528.706861] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.708015] do_syscall_64+0x33/0x40 [ 1528.708849] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.710000] RIP: 0033:0x7fbe68d5ab19 [ 1528.710828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.714954] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1528.716650] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1528.718260] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1528.719859] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.721462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.723054] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:02:40 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:40 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:40 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:02:40 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) pipe(0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) syz_io_uring_submit(r2, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x4000, @fd=r0, 0x1, 0x7ff, 0x3, 0x1, 0x1}, 0x1ff) 07:02:40 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) [ 1528.871290] FAULT_INJECTION: forcing a failure. [ 1528.871290] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.873927] CPU: 0 PID: 8245 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1528.875464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.877345] Call Trace: [ 1528.877953] dump_stack+0x107/0x167 [ 1528.878777] should_fail.cold+0x5/0xa [ 1528.879642] ? create_object.isra.0+0x3a/0xa20 [ 1528.880675] should_failslab+0x5/0x20 [ 1528.881545] kmem_cache_alloc+0x5b/0x310 [ 1528.882463] ? mark_held_locks+0x9e/0xe0 [ 1528.883387] create_object.isra.0+0x3a/0xa20 [ 1528.884380] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1528.885545] kmem_cache_alloc_bulk+0x168/0x320 [ 1528.886590] io_submit_sqes+0x6fe6/0x8610 [ 1528.887560] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1528.888683] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1528.889784] ? find_held_lock+0x2c/0x110 [ 1528.890709] ? io_submit_sqes+0x8610/0x8610 [ 1528.891696] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1528.892785] ? wait_for_completion_io+0x270/0x270 [ 1528.893880] ? rcu_read_lock_any_held+0x75/0xa0 [ 1528.894930] ? vfs_write+0x354/0xb10 [ 1528.895778] ? fput_many+0x2f/0x1a0 [ 1528.896602] ? ksys_write+0x1a9/0x260 [ 1528.897472] ? __ia32_sys_read+0xb0/0xb0 [ 1528.898394] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1528.899579] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.900750] do_syscall_64+0x33/0x40 [ 1528.901598] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.902752] RIP: 0033:0x7f7015fcab19 [ 1528.903591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.907763] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1528.909488] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1528.911103] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1528.912711] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.914335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.915947] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:02:56 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) 07:02:56 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) r5 = accept4(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f0000000040)=0x80, 0x80800) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000140)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r5, 0x80, &(0x7f0000000340)=@rc={0x1f, @any, 0x1}, 0x0, 0x0, 0x0, {0x0, r6}}, 0xfffffff8) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r7, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:02:56 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:56 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:02:56 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', 0x0, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:56 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4, 0x9, 0x7, 0x40, 0x0, 0x1a58, 0x4221, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x4}, 0x12000, 0xd5c3, 0x19f07245, 0x5, 0x80000000, 0xf884, 0x9, 0x0, 0xf331, 0x0, 0x8}, r1, 0xe, 0xffffffffffffffff, 0x11) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0x1, 0x5, 0x28, 0xe21, 0x2, 0x3e, 0x80000001, 0x2e1, 0x40, 0x1a4, 0x9, 0x25, 0x38, 0x1, 0x81, 0x5, 0xff}, [{0x70000000, 0x2, 0x9, 0x101, 0xffffffff, 0x1, 0x1, 0xffffffff00000000}, {0x5, 0x5, 0x9030, 0x3f, 0x10000, 0x6, 0x4686, 0x9}], "34c1a4376098a5c58ae767c92e500fe2c0d363d7a252a660821c64f8f1f735bdea55308ea1227f74a370badf69af80c20c1b1f54be9679fdd034ee3a9991e460be", ['\x00', '\x00', '\x00', '\x00']}, 0x4f1) pipe(0x0) 07:02:56 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 87) 07:02:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) [ 1544.838034] FAULT_INJECTION: forcing a failure. [ 1544.838034] name failslab, interval 1, probability 0, space 0, times 0 [ 1544.840918] CPU: 0 PID: 8263 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1544.842532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1544.844492] Call Trace: [ 1544.845111] dump_stack+0x107/0x167 [ 1544.846004] should_fail.cold+0x5/0xa [ 1544.846900] ? create_object.isra.0+0x3a/0xa20 [ 1544.847966] should_failslab+0x5/0x20 [ 1544.848860] kmem_cache_alloc+0x5b/0x310 [ 1544.849826] ? mark_held_locks+0x9e/0xe0 [ 1544.850784] create_object.isra.0+0x3a/0xa20 [ 1544.851825] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1544.853037] kmem_cache_alloc_bulk+0x168/0x320 [ 1544.854145] io_submit_sqes+0x6fe6/0x8610 [ 1544.855171] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1544.856357] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1544.857512] ? find_held_lock+0x2c/0x110 [ 1544.858485] ? io_submit_sqes+0x8610/0x8610 [ 1544.859710] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1544.860862] ? wait_for_completion_io+0x270/0x270 [ 1544.862035] ? rcu_read_lock_any_held+0x75/0xa0 [ 1544.863137] ? vfs_write+0x354/0xb10 [ 1544.864029] ? fput_many+0x2f/0x1a0 [ 1544.864901] ? ksys_write+0x1a9/0x260 [ 1544.865831] ? __ia32_sys_read+0xb0/0xb0 [ 1544.866777] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1544.868034] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1544.869282] do_syscall_64+0x33/0x40 [ 1544.870168] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1544.871388] RIP: 0033:0x7f7015fcab19 [ 1544.872283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1544.876688] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1544.878521] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1544.880209] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1544.881936] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.883639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1544.885353] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1544.904990] FAULT_INJECTION: forcing a failure. [ 1544.904990] name failslab, interval 1, probability 0, space 0, times 0 [ 1544.907777] CPU: 0 PID: 8266 Comm: syz-executor.4 Not tainted 5.10.240 #1 07:02:56 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', 0x0, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1544.909416] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1544.911578] Call Trace: [ 1544.912215] dump_stack+0x107/0x167 [ 1544.913104] should_fail.cold+0x5/0xa [ 1544.914029] ? create_object.isra.0+0x3a/0xa20 [ 1544.915126] should_failslab+0x5/0x20 [ 1544.916033] kmem_cache_alloc+0x5b/0x310 [ 1544.917011] ? mark_held_locks+0x9e/0xe0 [ 1544.917981] create_object.isra.0+0x3a/0xa20 [ 1544.919036] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1544.920255] kmem_cache_alloc_bulk+0x168/0x320 [ 1544.921366] io_submit_sqes+0x6fe6/0x8610 [ 1544.922400] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1544.923584] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1544.924741] ? find_held_lock+0x2c/0x110 [ 1544.925724] ? io_submit_sqes+0x8610/0x8610 [ 1544.926760] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1544.927914] ? wait_for_completion_io+0x270/0x270 [ 1544.929047] ? rcu_read_lock_any_held+0x75/0xa0 [ 1544.930156] ? vfs_write+0x354/0xb10 [ 1544.931054] ? fput_many+0x2f/0x1a0 07:02:56 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r4, 0x0, 0x0) 07:02:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) [ 1544.931935] ? ksys_write+0x1a9/0x260 [ 1544.932937] ? __ia32_sys_read+0xb0/0xb0 [ 1544.933921] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1544.935171] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1544.936401] do_syscall_64+0x33/0x40 [ 1544.937285] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1544.938493] RIP: 0033:0x7fbe68d5ab19 [ 1544.939384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1544.943739] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1544.945575] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1544.947274] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1544.948975] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.950693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1544.952387] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:02:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x1f, 0x0, 0x1, 0x0, 0xfffffffffffffb91, 0x20000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x97, 0x4}, 0x200, 0x6, 0x1, 0x5, 0xfff, 0x10001, 0x20, 0x0, 0x9, 0x0, 0x200}, 0xffffffffffffffff, 0x0, r1, 0x1) 07:02:56 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), 0x0, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:02:56 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r4, 0x0, 0x0) 07:03:12 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r4, 0x0, 0x0) 07:03:12 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) 07:03:12 executing program 5: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x76}}, '\x00'}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) r1 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r5, r6, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r7, r8, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="0000000000000000073db5252d499bb8"]) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) syz_io_uring_submit(r5, r8, &(0x7f0000000280)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x3, 0x0, r9, &(0x7f0000000240)={0xa0000004}, r10, 0x1, 0x0, 0x1}, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:03:12 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', 0x0, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:12 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 88) [ 1561.535338] FAULT_INJECTION: forcing a failure. [ 1561.535338] name failslab, interval 1, probability 0, space 0, times 0 [ 1561.538528] CPU: 0 PID: 8291 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1561.540376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1561.542634] Call Trace: [ 1561.543351] dump_stack+0x107/0x167 [ 1561.544345] should_fail.cold+0x5/0xa [ 1561.545379] ? create_object.isra.0+0x3a/0xa20 [ 1561.546625] should_failslab+0x5/0x20 [ 1561.547661] kmem_cache_alloc+0x5b/0x310 [ 1561.548762] ? mark_held_locks+0x9e/0xe0 [ 1561.550082] create_object.isra.0+0x3a/0xa20 [ 1561.551274] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1561.552653] kmem_cache_alloc_bulk+0x168/0x320 [ 1561.553916] io_submit_sqes+0x6fe6/0x8610 [ 1561.555076] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1561.556430] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1561.557748] ? find_held_lock+0x2c/0x110 [ 1561.558862] ? io_submit_sqes+0x8610/0x8610 [ 1561.560049] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1561.561365] ? wait_for_completion_io+0x270/0x270 [ 1561.562700] ? rcu_read_lock_any_held+0x75/0xa0 [ 1561.563963] ? vfs_write+0x354/0xb10 [ 1561.564975] ? fput_many+0x2f/0x1a0 [ 1561.565976] ? ksys_write+0x1a9/0x260 [ 1561.567005] ? __ia32_sys_read+0xb0/0xb0 [ 1561.568117] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1561.569542] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1561.570948] do_syscall_64+0x33/0x40 [ 1561.571954] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1561.573346] RIP: 0033:0x7fbe68d5ab19 [ 1561.574305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1561.578449] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1561.580157] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1561.581758] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1561.583359] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1561.584945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1561.586544] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:03:12 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:03:12 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xee}, 0x0, 0x0, 0x2, 0x0, 0x1, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) pipe(0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000001740)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x208100, 0x20) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x2, 0x4, 0x4c, 0x6c3, 0xffffffffffffffff}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f00000016c0)) openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) write$binfmt_elf64(r2, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x9, 0x9, 0x1, 0x26e3, 0x0, 0x3, 0x1, 0x186, 0x40, 0x2b3, 0x0, 0x1, 0x38, 0x2, 0x1a, 0x5, 0x7}, [{0x0, 0xe0f, 0x3f, 0x8000, 0x101, 0x0, 0x0, 0xfffffffffffffff8}, {0x60000003, 0x1, 0x2, 0xff, 0x9, 0x2, 0x100, 0xb7ef}], "3929d9e0bec931893ced5d19404b2a1718509683564ab06d70208a98d2c7dc316d1e4058cb5cb1e0e4d5bc0085f110ad7cce04e5098a79be87f52bf8b3b022b6dc0a7229f47e85c5f76a1deca56c6139392920efc0cf367f75c3370184ca9ba19b9a765c2f8bf1ac229698e81bf11c8b6741e9e262093972490df300df7f80842aa8a157e186d28be37997ee3cd0380d989394bdba8902afee035e7ffc86ca4d9bdc0b2cc791c0a5b031e1cd1e4e98e801de2833e0dcd4270036dca336561db90a41bfece6474112ad4e59c019cd0ee7b4ce9abf2a4f5bcfab43e0c9a031f277d8a4456d0936aae87ebb13e85ad6d73b55b329e5daf69ff220a4dd410aacd7fc4f83291b098fbe6dc104fa75b03d6ff5dbf1de7c72168c0f72a64b688f4eaf08ee6128140d1789aa1f0220a098f621828a28a8e183107936e2b99808459b9dbe97266474c6dc020fb4e0048194a495c80500c24fd428035c1f01420fad453d044ce2c8ebeccd7bffebc0e666238877ada666004d4a9f257ae0246c649886f99b5870381c7eed97aa1e892a8e55b61773b78eb29c5ad99c45b36dc461ee46ceb7cd14ca94d5fc92d97f0e85e92ef8eccb6a5cae35e93acfd3f31a0760b328a88f9e6adace45276b0438f67253c5954eff3e0ad7894160b942a5d030ca7a8138a1804c9f060344b26075c18c622f7fe9630bc614f983a2e7caf747f1586b902b22f75f53eb699460adbed9f19038490558abe10a4e29772ea5bf051f37bec8bcb481cae865a1dd6197e719da8d41825c5b7ffed7248cbd37e522d7aa0a142d495910181d7c836ff7a0d9618c4930c069b3d259624aca43128a10c43605742192cff1dee1811906b1404a7c1b825ad75d5554e2661f369d3aec207558b92e00bae5cbe6becbaafc7f09509d24f255a933756a5c5642a7f8ac1fa04a81dd3f776df37e29b7a71be09e94afd05969ce4f8007e0ee038b630b7b089cb70f0ab3c99a8865e1b8ddc1dae7f2698b022351cfb310d0884c3dd87f9ab4112bf651d2451979a8df61b91013eb9cbb3cbf6c9bb38ed13515095a8f05f3a164d34088e9f9cc853f17f2db8b434898fbd91510a704792c00209333c73ebb61e39a7c28e75503109a6acef0956b8adbf419c53805cdb071821b8a12b5fcac0ddac8e37abf34f935ffc56ce05a37a6b6a036bf04e1ec689f0d39fef77222611845b7a396f607bcb836fc756cd989b1d38f0b3ae743e3176dc1cf5b5397a61524e795e5aad109e04bb67cf77336bf475aee4115f0b04f82440d74c842dc233262c3e9a66a8df268cb9bcfd11c1faa0761ffa4cb1681d54073f440788ccf1e3dbd95f2e007af0b54cceaa9d9f058df0b67c8831e33932b7741ee662e037ce655c816d5ef9ba94a6a0c8109a4cb2b6f2ab83e3cb94b08e9b9d1075b7bbc93ac599f0a809eadb3696a5be500a9df5622df72b0eabd6e80d5c537e1ee4ddb165b163cb20239c83850931797dbeed95a3342f45756ed42bd3555411b72f40f504fad30ac25e440ba3e6f31bd21218e56675d21ce662b12f9a89705fb14beef8342019dfd918e2b950c0e60fe6025678cd3cf20f13747dbdffc60689a414a9ee3082f71d9ae43f9b0ff979838a935fc30f93dfd3dc123262c2d65604a8ea183306ea56a31994b2a1efaa9935c2bf04bb1d4c40cc34f32d62af7a53a25fe1a9b603134182536aa403714a53251d5c19192805f873ab1743bde0c60a8af50c90f8d93cb2bdd203d4c344d104327ad31d900fcefa5663bc84445ddc0d569d74b4cc4d78eca02c019f9c376dd38fabf02969d3141096f64e96cfd33714b4ae98b0dead22a7c2abff470381a5e2b189acc0eb6fe4d80c7b5268b97ec60639fe418c658f5e8541f4ea7c087d7affe217d2b05233ceb686c6b917ff3480fa546c77bb1934a09c2f50fee140cc62ed61cedf04a32ccdafd7712a2362f0e390f819294eca54834b3ba6e5f2e31e20cfad36931e00a6ee3248b9fe748c660701ab3c3bbeaf8dd0717c5203ce25a26636425b66efbbbd72445a0f19e2d178799b7cc5b23636d13ec09c366e529dee6afdc369a6af3251205c4235f1ded234e826602ac295938a8a5471d1f5c4545bf581725a6c300cfd5edba6df211ed9cb6921eb7efef0efc325eb28f0ca55537ada85ca53af46bf6cc388e6fced69bcf04e9d178734bd2b5daefd6fb506b997751005bf423d9e4ecf63af2ff48f3889caf5b4d91469e48f40bc66456b750cfd602f8e26c44af433682ad2690d99ab0aa41a8b7599d39bfb27ddbf6e90b1944e95da4f5a5f0a6d2d372bcb9acb27d6eead1fd0fc569c907a549088d00b0dbda86c226d0ea6f6bef1fe83c8c09a8b01d648724286cc878822fb79e90496fdfa18736912e3bd551125256fed57df033368bf12b5e79e4a5f23ebc7422d72f1d333925e89717f2c2b0363d33de400b42c5253e4f4a1d81394efc5483de726658ceecbbe6ba0f37a85a5275a6e20940468973aa1fa2a5c62af46e74401e54b81d30e7464aef49a83ba1e2c13f2202c2e3cf4cdce7cd5abfd6559c2be45ec5190e0eb074363aa63a05de5315622988708b4aa6d8faafacbe336777b82217133d9527d5acf283fac2209e45e4b12ca01efc95ac97d862b9b891741bc44db0e6aad25e268779a3765c34d6f1f3864b5ad27717785ba9eede31fd91a5fdeee779a123b58948fd16aa91778005f3c9d042263c72c6e726c6b50336c3e4073c5bdab16938f5138546a598cd9cbe1b200bfcdbefd2ea96dbd8f5b786e45c5b19f4e46c0440fdb9c8474c692ed8be18baeb3579654c4273356929abde68f96bf1ee4ca03a73a8323922b34f6243bcdf790e7d5aaf1f2e5dd59a7dcb22a137598c6b034523a0afd70f455914c2e5cb93bae010f2e634b780fd174a6d0ba9b4ceca0288e8ebc2b6fcb91e68c5b3fb67a2ef07bde206315d32db38e7d0933d87f85c8049e4b6d109fef01f556fbe033d64728f0a252a32de67caa973ead11dd1a39741394573334355f37d9dae2387405353bd7ebd45a2620f59f216c22feab1e0ca829cc56cef6978b79e12b815e987e0f0ee2f6d29bf64e4958e5c49da6c8bcb581f8893f61375bfc9930b65476c46922ecc34746113799ecadfe3df577f199a110916161fd9308e8c80c89b8a5a571915c6a662daee12fbc98eb11670d422c6a6ba9c1053ec0f694320d9959afe5035f8fa96fcbe9efacd5aa5ea2cd191fb5b70c27e5dfb3655c08b1070cede74f8362f0a5c367cae92da358829ff0600a240b691102d261f5aa01815090c1d42e6e8ad0b0dcbae11000546d7a0a114af50ea80626e16b1f3ec44edea708f2ae6b22ddb65c08f6d2a7b29a195e67f642c787d83c7482755127828571451ae8cb3de11c699031c15c0102b234e3c7303c0b224b118d68ccbf616984a002c1ba18200130a52f2280f12c76427635c461f8ca2a9f7042bc595ff6c566890517de71f503df8f83e8529a2aa4d21834c9dd962319442147707d2879bf341413c18b54872a0e66bdc8d2d9834da7d6ab2c62c305846018f67ca1864360f11741f299675c8ec97e8e1d9831ad33630f9230f587f068c91d2abff35b4b28013ff3eb7c890ad1c666c9d6e30e6cd319980c8f7b33bd0112a1476607779685b2282f258d8c4195c2beb0b767a69938f0942c1e77516aed7d6f9ac483e56433a28fa2602e5d08fc9f9febd1d36e051c1de6ab6923161403e98deabe4301c018a6efaaaa9642fc0325e93b92e5c0c927640a1815d584082a9134e81efdeccbcca498b14f06f6a62a22c6ffbddbe2828f1d131d0c058287a5c935336a9f91910b7847dd31a495cf01439022956f773673700db7b229ab9c3e77e313eb1b96cf89ecabe31702419b68451c1d1bda93597f5e557046b0367293c228230487d9710ec789022c7b0b311493430fc91897d49cc9d6dbdf9952241200c1f7cd7edf8d99dca3c5e6b7c9f113459c6470d13af527d5ff7de9636e12bbe257c82bd47607459b2621b53510a54e6d7d177514f897431e9d398622dfa8bc017c8fc5f628ad3d6b0e2d75ce6c54ca6d26df66be639239ee01226f894e12bff8c785bb8548ca0dcd24e39940729976f48f5152792c2f7361298fab0aa076f76c46ec1df4eb6acab8c49ae9e9f3e292fb421192f00dfd103a1ea2d289fbf55e3059b86acd0ab6c16dc42c1faa60a5555c254e3a4d37442b24d6afc3746c2da74dc812a7e68709cbe4b528a07d578ca8980824d5371ca971bec07323430d73e689d284e9db3c0cee2f51273a5ed037b338e15ab405b44fb3850d4d64253525d094d60f69191f6d4b15ceeeaa518e56039194aa4a57a9745fb2016d937cdad345349d0ce1a94afa293bf9c1094dea981122a020ab0557c3bf2c364284884a95155753f9b8fb5869885a508fd2fd8f6e723a8f8a27f7936c003cfd3f230dbed52de787d6c2c1f99ba379e1ecaef8842fd926c29e68b9e21bd3a5d9b46edcfd83ac184bf568ca0fb1e1ab905f1d275c4639b62cfe43b49e146b6ed4d3123b54d16ff29616958864419f9fdc8ed13f82e894fe1c2b9bd8c226d4b8193d5f25ce749ee346e3913c1d4ffb1acf714616707f4380895af868bfbe7dc5fcdafe2485721ded802712c1f2e94e1a600f7a19f937a6ad898050cc6dcb2a013c5d2cbce68600f87c5bea45a6bfc7fb523ee209f4467960b77b6ed05f82dd48dd710855edccdde6a57fc5d12723610ba5186fe50843285141b8e784f2ca487ebc30713fc08e5a4955b4b88486669b382e62bd9fb95f3868672d0250cfe5335f3620292521a16f34225d08f7853d38a402e3f6ed0ec21aca4c08b80db71171a2e7db401d1b401220feee72eec137a709c79ef97f824bf1292fb10a515142c07ee52671ecd01847b645e2e47c61cb8f699c5aa17e801f4e96c20cc5092aae2fa0c24c082f4242e15c73d7b0d492dfe409aba27dd1cf35692e44a95ccd6b80b124aa6a8be68d67eb9a6c975fd3c38a673260d6c4e217187d600f232720bf13136ccd4299761f5767f055e45d6b833f28ee2d5c079d623be22636a6992199c1e4aeab15b35e279b9431735f61f5ea2b6792617dfe6fd29654e61b8ab6d28a98d2318ec86b7d68eeccfae62b941381e0e99995e69f516773c74ba409ba6cd439eb98758297f2c589e41e67d04611be0afaf23de081b78b253303ee7ca4a27bd4ef3a119650c1c04406b7d73db202f7d05d7b63f1193aa52c62b251a9f3daa27063ed4c5c17341497a34512e8ac52cae9ad210eb814014b4242c7406dea87d861f87ca8bf585043bdf6d67d94cebea4ce18018d61349c4f1b69a3faec81a2e07675cdce0a8f7b557b5da513ad635c7f4d3c4173b791e82cc72e0888b05bede83ef94c15730219c3870b0376a4bb9b625eb2ffeb9e722c6ea445842be1bd1f8267e7321b8c81c602012f2909d7e2a66194eca41fe12c23dd7b1c1d9c7bb821a457f1646d5fa273e1f083e51d2e4ca9bbc8b3424108e264b50f9c568b36f7f1deabe225f6c29375d7686c43978e4f612c9c353dd7679c8c493efa9b89d6b095a48b53d87346366f74591be873a45dcbd5dce09452718b6914e8955860beb2b4cd304f09abe520e9b90f75b8670a2e7a313da8825ff9fbc0934cf01a7215397c47fe38d34137dd45a2ba86752449656fb511160b509fac57226e7842df25a275c026710fdcdd8e5fec514c68926dcb52ea97704d5cb78a01c746948d662e0ec4af3fcc1177f5a461f0647d63fb7d3cbda967988596b", ['\x00', '\x00', '\x00', '\x00']}, 0x14b0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000001700)={0x7fffffff, 0x0, 0x1}) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000000140)) 07:03:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) [ 1561.608412] FAULT_INJECTION: forcing a failure. [ 1561.608412] name failslab, interval 1, probability 0, space 0, times 0 [ 1561.611105] CPU: 0 PID: 8300 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1561.612649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1561.614527] Call Trace: [ 1561.615123] dump_stack+0x107/0x167 [ 1561.615941] should_fail.cold+0x5/0xa [ 1561.616799] ? create_object.isra.0+0x3a/0xa20 [ 1561.617838] should_failslab+0x5/0x20 [ 1561.618697] kmem_cache_alloc+0x5b/0x310 [ 1561.619611] ? mark_held_locks+0x9e/0xe0 [ 1561.620527] create_object.isra.0+0x3a/0xa20 [ 1561.621523] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1561.622670] kmem_cache_alloc_bulk+0x168/0x320 [ 1561.623707] io_submit_sqes+0x6fe6/0x8610 [ 1561.624663] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1561.625787] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1561.626874] ? find_held_lock+0x2c/0x110 [ 1561.627791] ? io_submit_sqes+0x8610/0x8610 [ 1561.628768] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1561.629867] ? wait_for_completion_io+0x270/0x270 [ 1561.630960] ? rcu_read_lock_any_held+0x75/0xa0 [ 1561.631999] ? vfs_write+0x354/0xb10 [ 1561.632841] ? fput_many+0x2f/0x1a0 [ 1561.633664] ? ksys_write+0x1a9/0x260 [ 1561.634525] ? __ia32_sys_read+0xb0/0xb0 [ 1561.635438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1561.636624] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1561.637800] do_syscall_64+0x33/0x40 [ 1561.638641] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1561.639797] RIP: 0033:0x7f7015fcab19 [ 1561.640634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1561.644781] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1561.646487] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1561.648090] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1561.649686] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1561.651295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1561.652902] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:03:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:03:13 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(0x0, &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:13 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, 0x0, 0x0) 07:03:13 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x99af, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000340)="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", 0x1000, 0x3}], 0x100000, &(0x7f0000000240)={[{@sbsector={'sbsector', 0x3d, 0x9}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}]}) 07:03:13 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x204080, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x1, 0x9, 0x81, 0x1, 0x0, 0x6fe9ed21, 0x20440, 0xb, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x94a, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x10000, 0x6, 0xaf2f, 0x0, 0x9, 0xc308, 0x0, 0x0, 0x101}, r1, 0xf, r2, 0xa) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) [ 1561.901753] loop5: detected capacity change from 0 to 38912 07:03:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:03:13 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, 0x0, 0x0) 07:03:13 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) 07:03:13 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 89) 07:03:13 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1562.021431] loop5: detected capacity change from 0 to 38912 [ 1562.025125] FAULT_INJECTION: forcing a failure. [ 1562.025125] name failslab, interval 1, probability 0, space 0, times 0 [ 1562.027943] CPU: 1 PID: 8328 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1562.029300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1562.030954] Call Trace: [ 1562.031479] dump_stack+0x107/0x167 [ 1562.032205] should_fail.cold+0x5/0xa [ 1562.032960] ? create_object.isra.0+0x3a/0xa20 [ 1562.033061] FAULT_INJECTION: forcing a failure. [ 1562.033061] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1562.033876] should_failslab+0x5/0x20 [ 1562.033895] kmem_cache_alloc+0x5b/0x310 [ 1562.033922] ? mark_held_locks+0x9e/0xe0 [ 1562.038907] create_object.isra.0+0x3a/0xa20 [ 1562.039776] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1562.040788] kmem_cache_alloc_bulk+0x168/0x320 [ 1562.041707] io_submit_sqes+0x6fe6/0x8610 [ 1562.042549] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1562.043525] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1562.044473] ? find_held_lock+0x2c/0x110 [ 1562.045274] ? io_submit_sqes+0x8610/0x8610 [ 1562.046143] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1562.047102] ? wait_for_completion_io+0x270/0x270 [ 1562.048059] ? rcu_read_lock_any_held+0x75/0xa0 [ 1562.048982] ? vfs_write+0x354/0xb10 [ 1562.049727] ? fput_many+0x2f/0x1a0 [ 1562.050441] ? ksys_write+0x1a9/0x260 [ 1562.051183] ? __ia32_sys_read+0xb0/0xb0 [ 1562.051980] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1562.052993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1562.054005] do_syscall_64+0x33/0x40 [ 1562.054733] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1562.055738] RIP: 0033:0x7fbe68d5ab19 [ 1562.056472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1562.060107] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1562.061602] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1562.063000] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1562.064392] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1562.065790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1562.067176] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 [ 1562.068615] CPU: 0 PID: 8335 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1562.070218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1562.072131] Call Trace: [ 1562.072744] dump_stack+0x107/0x167 [ 1562.073592] should_fail.cold+0x5/0xa [ 1562.074475] __alloc_pages_nodemask+0x182/0x600 [ 1562.075548] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1562.076959] alloc_pages_current+0x187/0x280 [ 1562.077990] allocate_slab+0x26f/0x380 [ 1562.078891] ___slab_alloc+0x470/0x700 [ 1562.079797] ? io_submit_sqes+0x6fe6/0x8610 [ 1562.080808] ? kmem_cache_alloc_bulk+0x1ec/0x320 [ 1562.081903] kmem_cache_alloc_bulk+0x1ec/0x320 [ 1562.082957] io_submit_sqes+0x6fe6/0x8610 [ 1562.083936] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1562.085088] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1562.086221] ? find_held_lock+0x2c/0x110 [ 1562.087165] ? io_submit_sqes+0x8610/0x8610 [ 1562.088162] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1562.089270] ? wait_for_completion_io+0x270/0x270 [ 1562.090392] ? rcu_read_lock_any_held+0x75/0xa0 [ 1562.091461] ? vfs_write+0x354/0xb10 [ 1562.092320] ? fput_many+0x2f/0x1a0 [ 1562.093161] ? ksys_write+0x1a9/0x260 [ 1562.094047] ? __ia32_sys_read+0xb0/0xb0 [ 1562.094987] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1562.096193] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1562.097400] do_syscall_64+0x33/0x40 [ 1562.098260] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1562.099448] RIP: 0033:0x7f7015fcab19 [ 1562.100305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1562.104569] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1562.106348] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1562.107998] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1562.109655] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1562.111307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1562.112953] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:03:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7, 0x8, 0xb1, 0x9, 0x0, 0x2, 0x8000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xcae9, 0x4, @perf_config_ext={0x3, 0x68}, 0x1, 0x45, 0x7fffffff, 0x7, 0xfffffffffffffff7, 0xa8ae, 0x1000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x7, 0xffffffffffffffff, 0x5) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000100)=0x1c) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x100000c, 0x1f012, r1, 0x0) pipe(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) timerfd_settime(r3, 0x0, &(0x7f00000001c0)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000200)) 07:03:26 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, 0x0, 0x0) 07:03:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) io_uring_enter(0xffffffffffffffff, 0xc95, 0x3b26, 0x0, &(0x7f0000000040)={[0x200]}, 0x8) pipe(0x0) 07:03:26 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) 07:03:26 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 90) 07:03:26 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:03:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:03:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) r1 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r0, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r0) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r2, 0x0) [ 1575.581486] FAULT_INJECTION: forcing a failure. [ 1575.581486] name failslab, interval 1, probability 0, space 0, times 0 [ 1575.583525] FAULT_INJECTION: forcing a failure. [ 1575.583525] name failslab, interval 1, probability 0, space 0, times 0 [ 1575.584438] CPU: 0 PID: 8354 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1575.587902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1575.589773] Call Trace: [ 1575.590370] dump_stack+0x107/0x167 [ 1575.591189] should_fail.cold+0x5/0xa [ 1575.592046] should_failslab+0x5/0x20 [ 1575.592901] kmem_cache_alloc_bulk+0x4b/0x320 [ 1575.593923] io_submit_sqes+0x6fe6/0x8610 [ 1575.594885] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1575.596000] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1575.597084] ? find_held_lock+0x2c/0x110 [ 1575.598009] ? io_submit_sqes+0x8610/0x8610 [ 1575.598982] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1575.600062] ? wait_for_completion_io+0x270/0x270 [ 1575.601145] ? rcu_read_lock_any_held+0x75/0xa0 [ 1575.602190] ? vfs_write+0x354/0xb10 [ 1575.603029] ? fput_many+0x2f/0x1a0 [ 1575.603849] ? ksys_write+0x1a9/0x260 [ 1575.604705] ? __ia32_sys_read+0xb0/0xb0 [ 1575.605629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1575.606813] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1575.607973] do_syscall_64+0x33/0x40 [ 1575.608810] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1575.609967] RIP: 0033:0x7fbe68d5ab19 [ 1575.610803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1575.614949] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1575.616671] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1575.618281] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1575.619882] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1575.621481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1575.623085] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 [ 1575.624714] CPU: 1 PID: 8364 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1575.626178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1575.627925] Call Trace: [ 1575.628490] dump_stack+0x107/0x167 [ 1575.629266] should_fail.cold+0x5/0xa [ 1575.630080] ? create_object.isra.0+0x3a/0xa20 [ 1575.631055] should_failslab+0x5/0x20 [ 1575.631866] kmem_cache_alloc+0x5b/0x310 [ 1575.632729] ? mark_held_locks+0x9e/0xe0 [ 1575.633609] create_object.isra.0+0x3a/0xa20 [ 1575.634536] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1575.635618] kmem_cache_alloc_bulk+0x168/0x320 [ 1575.636603] io_submit_sqes+0x6fe6/0x8610 [ 1575.637512] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1575.638575] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1575.639607] ? find_held_lock+0x2c/0x110 [ 1575.640480] ? io_submit_sqes+0x8610/0x8610 [ 1575.641402] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1575.642443] ? wait_for_completion_io+0x270/0x270 [ 1575.643472] ? rcu_read_lock_any_held+0x75/0xa0 [ 1575.644463] ? vfs_write+0x354/0xb10 [ 1575.645254] ? fput_many+0x2f/0x1a0 [ 1575.646040] ? ksys_write+0x1a9/0x260 [ 1575.646856] ? __ia32_sys_read+0xb0/0xb0 [ 1575.647725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1575.648840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1575.649946] do_syscall_64+0x33/0x40 [ 1575.650750] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1575.651829] RIP: 0033:0x7f7015fcab19 [ 1575.652629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1575.656523] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1575.658138] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1575.659662] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1575.661188] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1575.662705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1575.664226] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:03:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x2}}, './file1\x00'}) creat(&(0x7f0000000140)='./file1\x00', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) 07:03:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:03:27 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) r1 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r0, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r0) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r2, 0x0) 07:03:27 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) r3 = syz_io_uring_setup(0x7600, &(0x7f0000000040)={0x0, 0x7af4, 0x10, 0x3, 0x2f, 0x0, r0}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000005, 0x10, r4, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) rt_sigaction(0x26, &(0x7f0000000340)={&(0x7f0000000240)="65f30fa6c8c441fde6df660fd7d68f2828ccce41f2430f7d30c403b17d19306441c1429f0967640f154ca200c4c101f26e0e6566450f38087166", 0x2, &(0x7f0000000280)="66410f2b3d52a85a7a640f0f278a45a10600000000000000403500000080f342adff07c482a54588feefffff660fe1b01a7a69696466f0810c61a1e041aa", {[0x3f]}}, &(0x7f0000000400)={&(0x7f0000000380)="460ff6eec4a11d643636f3420f7fc644c08809000000acf66d1e0f8800607fa3660f510ec462a597d23e66420ff8a800000000f30f1ecd", 0x0, &(0x7f00000003c0)="c4e2859633420fb56c529ec4e1f9692fe1ba67f345af0ff5bcd8c3b90edcc4a21d3b4cfb020f01d6ff2a2e46ac"}, 0x8, &(0x7f0000000440)) 07:03:40 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) 07:03:40 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:40 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), 0x0, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:03:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:03:40 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 91) 07:03:40 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, 0x0) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:40 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) r3 = syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x80, 0x4, 0x7f, 0x40, 0x0, 0xa6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x4, @perf_config_ext={0x80, 0x3}, 0x400, 0x7, 0x6, 0x3, 0x80, 0x7, 0x2e, 0x0, 0x2, 0x0, 0x80000001}, 0x0, 0x4, 0xffffffffffffffff, 0x8) r6 = socket$inet6(0xa, 0x4, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x1, &(0x7f0000000040)=[r6], 0x1}, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r7, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f00000003c0)="e5511b3fd15e9fccb1412388428f59c6e19c904cd0fa62f3fc3e78471c674ab527ca4e3434ba9cfc5aca35ed893d35ce9589254481e5f0bea3cdc968d18aba219a272e621cdd12263fe72a0a532a0a73d90ee24ec82adf7dda2651b75585f332a390171fc0678568a397ed98eae11605c211f2d253f7a4a60ae6a995e6", 0x7d) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000001c0)={r3, 0xffffffff, 0x80000001, 0x6}) getsockopt$inet6_int(r8, 0x29, 0x4c, &(0x7f0000000340), &(0x7f0000000380)=0x4) 07:03:40 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1589.496609] FAULT_INJECTION: forcing a failure. [ 1589.496609] name failslab, interval 1, probability 0, space 0, times 0 [ 1589.500047] CPU: 0 PID: 8392 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1589.501837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1589.502520] FAULT_INJECTION: forcing a failure. [ 1589.502520] name failslab, interval 1, probability 0, space 0, times 0 [ 1589.504002] Call Trace: [ 1589.504030] dump_stack+0x107/0x167 [ 1589.504054] should_fail.cold+0x5/0xa [ 1589.504085] ? create_object.isra.0+0x3a/0xa20 [ 1589.510351] should_failslab+0x5/0x20 [ 1589.511352] kmem_cache_alloc+0x5b/0x310 [ 1589.512426] create_object.isra.0+0x3a/0xa20 [ 1589.513575] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1589.514930] kmem_cache_alloc_bulk+0x168/0x320 [ 1589.516137] io_submit_sqes+0x6fe6/0x8610 [ 1589.517261] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1589.518576] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1589.519870] ? find_held_lock+0x2c/0x110 [ 1589.520915] ? io_submit_sqes+0x8610/0x8610 [ 1589.521943] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1589.523225] ? wait_for_completion_io+0x270/0x270 [ 1589.524396] ? rcu_read_lock_any_held+0x75/0xa0 [ 1589.525581] ? vfs_write+0x354/0xb10 [ 1589.526574] ? fput_many+0x2f/0x1a0 [ 1589.527558] ? ksys_write+0x1a9/0x260 [ 1589.528447] ? __ia32_sys_read+0xb0/0xb0 [ 1589.529488] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1589.530914] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1589.532307] do_syscall_64+0x33/0x40 [ 1589.533312] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1589.534707] RIP: 0033:0x7fbe68d5ab19 [ 1589.535710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1589.539875] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1589.541584] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1589.543203] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1589.544807] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1589.546442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1589.548064] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 [ 1589.549725] CPU: 1 PID: 8402 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1589.551336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1589.553227] Call Trace: [ 1589.553848] dump_stack+0x107/0x167 [ 1589.554689] should_fail.cold+0x5/0xa [ 1589.555562] should_failslab+0x5/0x20 [ 1589.556439] kmem_cache_alloc_bulk+0x4b/0x320 [ 1589.557472] io_submit_sqes+0x6fe6/0x8610 [ 1589.558455] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1589.559594] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1589.560701] ? find_held_lock+0x2c/0x110 [ 1589.561620] ? io_submit_sqes+0x8610/0x8610 [ 1589.562620] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1589.563713] ? wait_for_completion_io+0x270/0x270 [ 1589.564806] ? rcu_read_lock_any_held+0x75/0xa0 [ 1589.565867] ? vfs_write+0x354/0xb10 [ 1589.566720] ? fput_many+0x2f/0x1a0 [ 1589.567538] ? ksys_write+0x1a9/0x260 [ 1589.568397] ? __ia32_sys_read+0xb0/0xb0 [ 1589.569314] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1589.570505] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1589.571675] do_syscall_64+0x33/0x40 [ 1589.572513] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1589.573664] RIP: 0033:0x7f7015fcab19 [ 1589.574514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1589.578675] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1589.580396] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1589.582034] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1589.583643] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1589.585250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1589.586867] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:03:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0x0) 07:03:41 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:41 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), 0x0, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:41 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), 0x0, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:03:41 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 92) 07:03:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0x0) [ 1589.893578] FAULT_INJECTION: forcing a failure. [ 1589.893578] name failslab, interval 1, probability 0, space 0, times 0 [ 1589.897667] CPU: 1 PID: 8423 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1589.899115] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1589.900851] Call Trace: [ 1589.901410] dump_stack+0x107/0x167 [ 1589.902185] should_fail.cold+0x5/0xa [ 1589.902992] ? create_object.isra.0+0x3a/0xa20 [ 1589.903950] should_failslab+0x5/0x20 [ 1589.904776] kmem_cache_alloc+0x5b/0x310 [ 1589.905634] ? mark_held_locks+0x9e/0xe0 [ 1589.906503] create_object.isra.0+0x3a/0xa20 [ 1589.907423] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1589.908500] kmem_cache_alloc_bulk+0x168/0x320 [ 1589.909470] io_submit_sqes+0x6fe6/0x8610 [ 1589.910376] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1589.911428] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1589.912441] ? find_held_lock+0x2c/0x110 [ 1589.913300] ? io_submit_sqes+0x8610/0x8610 [ 1589.914220] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1589.915235] ? wait_for_completion_io+0x270/0x270 [ 1589.916258] ? rcu_read_lock_any_held+0x75/0xa0 [ 1589.917236] ? vfs_write+0x354/0xb10 [ 1589.918024] ? fput_many+0x2f/0x1a0 [ 1589.918792] ? ksys_write+0x1a9/0x260 [ 1589.919599] ? __ia32_sys_read+0xb0/0xb0 [ 1589.920451] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1589.921556] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1589.922652] do_syscall_64+0x33/0x40 [ 1589.923440] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1589.924511] RIP: 0033:0x7f7015fcab19 [ 1589.925290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1589.929181] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1589.930785] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1589.932281] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1589.933790] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1589.935288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1589.936792] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:03:41 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1603.125086] FAULT_INJECTION: forcing a failure. [ 1603.125086] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.126531] CPU: 0 PID: 8437 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1603.127366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1603.128367] Call Trace: [ 1603.128692] dump_stack+0x107/0x167 [ 1603.129135] should_fail.cold+0x5/0xa [ 1603.129598] ? create_object.isra.0+0x3a/0xa20 [ 1603.130160] should_failslab+0x5/0x20 [ 1603.130633] kmem_cache_alloc+0x5b/0x310 [ 1603.131125] ? mark_held_locks+0x9e/0xe0 [ 1603.131621] create_object.isra.0+0x3a/0xa20 [ 1603.132154] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1603.132777] kmem_cache_alloc_bulk+0x168/0x320 [ 1603.133332] io_submit_sqes+0x6fe6/0x8610 [ 1603.133857] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1603.134462] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1603.135048] ? find_held_lock+0x2c/0x110 [ 1603.135547] ? io_submit_sqes+0x8610/0x8610 [ 1603.136071] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1603.136656] ? wait_for_completion_io+0x270/0x270 [ 1603.137240] ? rcu_read_lock_any_held+0x75/0xa0 [ 1603.137803] ? vfs_write+0x354/0xb10 [ 1603.138264] ? fput_many+0x2f/0x1a0 [ 1603.138704] ? ksys_write+0x1a9/0x260 [ 1603.139164] ? __ia32_sys_read+0xb0/0xb0 [ 1603.139656] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1603.140289] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1603.140923] do_syscall_64+0x33/0x40 [ 1603.141376] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1603.142004] RIP: 0033:0x7f7015fcab19 [ 1603.142457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1603.144685] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1603.145611] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1603.146497] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1603.147362] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1603.148222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1603.149086] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:03:54 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, 0x0) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:03:54 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fe", 0x75, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:54 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 93) 07:03:54 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x4, 0x0, @fd=r0, 0x6, 0x0, 0x2, 0x5}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1, 0x0, 0x1}, 0x7990) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_WRITE={0x17, 0x3, 0x4000, @fd_index=0x9, 0x7, &(0x7f0000000340)="bf08d087bd976edcc48f8165248ee72f8ef541c31006ef7daf25119748ed458b181b617fe710eb5ae02427a700e83d9e54071c7c869f0a2b0147df0ed015048b6aa71fff12bd76cc25756650ff58fad637f52e3f7f967f41a16d5cb3c4cbd629807b64970197ada9033a690b9c6319dc9b3430aad2e75c1c7d392f6f1c1f40ff81c447f4668faeb0b4706e34b83c0497b1992892dea26f71ab280444908c72b59e3af9e24b868823b20b35bd759b5e0de7f99bc6dd99f0b28f3b165cd05bd731c084071b337b56487665f7ff4dc4752dd7f3209a838cc7b8081a5ea58ff5", 0xde, 0x4}, 0x86c2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r6 = signalfd(r0, &(0x7f0000000040), 0x8) io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:03:54 executing program 0: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xeaffffff, 0x0, 0x0, 0x0) 07:03:54 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 07:03:54 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0x0) [ 1603.214095] FAULT_INJECTION: forcing a failure. [ 1603.214095] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.216893] CPU: 1 PID: 8447 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1603.218354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1603.220121] Call Trace: [ 1603.220683] dump_stack+0x107/0x167 [ 1603.221458] should_fail.cold+0x5/0xa [ 1603.222272] ? create_object.isra.0+0x3a/0xa20 [ 1603.223241] should_failslab+0x5/0x20 [ 1603.224047] kmem_cache_alloc+0x5b/0x310 [ 1603.224904] ? mark_held_locks+0x9e/0xe0 [ 1603.225770] create_object.isra.0+0x3a/0xa20 [ 1603.226707] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1603.227781] kmem_cache_alloc_bulk+0x168/0x320 [ 1603.228751] io_submit_sqes+0x6fe6/0x8610 [ 1603.229647] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1603.230702] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1603.231712] ? find_held_lock+0x2c/0x110 [ 1603.232570] ? io_submit_sqes+0x8610/0x8610 [ 1603.233474] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1603.234497] ? wait_for_completion_io+0x270/0x270 [ 1603.235512] ? rcu_read_lock_any_held+0x75/0xa0 [ 1603.236488] ? vfs_write+0x354/0xb10 [ 1603.237265] ? fput_many+0x2f/0x1a0 [ 1603.238044] ? ksys_write+0x1a9/0x260 [ 1603.238845] ? __ia32_sys_read+0xb0/0xb0 [ 1603.239720] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1603.240986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1603.242244] do_syscall_64+0x33/0x40 [ 1603.243146] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1603.244382] RIP: 0033:0x7fbe68d5ab19 [ 1603.245286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1603.249758] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1603.251610] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1603.253325] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1603.255055] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1603.256768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1603.258481] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:03:54 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:03:54 executing program 5: r0 = open_tree(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x8800) r1 = syz_io_uring_setup(0x4f40, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x341, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000180)=0x0) io_uring_enter(r1, 0x4b3f, 0x2925, 0x1, &(0x7f0000000040)={[0x100]}, 0x8) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:03:54 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 94) [ 1603.333900] FAULT_INJECTION: forcing a failure. [ 1603.333900] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.335349] CPU: 0 PID: 8460 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1603.336185] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1603.337187] Call Trace: [ 1603.337512] dump_stack+0x107/0x167 [ 1603.337961] should_fail.cold+0x5/0xa [ 1603.338422] ? create_object.isra.0+0x3a/0xa20 [ 1603.338972] should_failslab+0x5/0x20 [ 1603.339431] kmem_cache_alloc+0x5b/0x310 [ 1603.339925] ? mark_held_locks+0x9e/0xe0 [ 1603.340416] create_object.isra.0+0x3a/0xa20 [ 1603.340945] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1603.341559] kmem_cache_alloc_bulk+0x168/0x320 [ 1603.342123] io_submit_sqes+0x6fe6/0x8610 [ 1603.342640] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1603.343243] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1603.343827] ? find_held_lock+0x2c/0x110 [ 1603.344326] ? io_submit_sqes+0x8610/0x8610 [ 1603.344859] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1603.345443] ? wait_for_completion_io+0x270/0x270 [ 1603.346033] ? rcu_read_lock_any_held+0x75/0xa0 [ 1603.346593] ? vfs_write+0x354/0xb10 [ 1603.347043] ? fput_many+0x2f/0x1a0 [ 1603.347482] ? ksys_write+0x1a9/0x260 [ 1603.347943] ? __ia32_sys_read+0xb0/0xb0 [ 1603.348434] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1603.349067] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1603.349692] do_syscall_64+0x33/0x40 [ 1603.350151] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1603.350772] RIP: 0033:0x7f7015fcab19 [ 1603.351219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1603.353443] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1603.354376] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1603.355239] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1603.356099] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1603.356962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1603.357823] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:03:54 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:03:54 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000008, 0x40010, r0, 0x10000000) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=@l2={0x1f, 0xf6fe, @any, 0xac67, 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000340)="590956a0926e89d9dd9ddb7f8e8e910e5d2cc190af4db369b902017a590f50883aa81ee52d8dab4054dd4118be503753f88681d1d68b7d0fa84e1b747c927844037c1ff4fe4790ecc01f3a124977", 0x4e}, {&(0x7f00000003c0)="f7e64e70a384386916f59baedf8fb27c0030863842fa83c45520435e62cea3f915c8b304ce21d6158a98a0bf6bb732e5b83f0df5367d1253592a63a071600bab401916140b00b8d17da6d853ef4e20b90150b4898509230243b0ff273741c2629b2e4bc8ec31b3633e0fa84209f48ec02e571e61209ad6c94c16b674c40f82862eff1599f98edfff1097520750cc", 0x8e}, {&(0x7f0000000040)='g', 0x1}, {&(0x7f0000000140)="a523b4cca6beeea503c0fad70a736b849a8d6a9c91e0db8306134027e209d2534b87f75880c44d285b078a4dee4813c45c41d2", 0x33}, {&(0x7f0000000480)="8b0eabe2eccd95c8b954c47d5b986b8f65414767fa77cd15b923fbdb3a7aa1c7fe28d4f38795e33f7e1c714fb5e4fddc79696c9a89b8b4ad59b07c2ddf020e759b3b58ca48137b32bafa4eb525de", 0x4e}, {&(0x7f0000000500)="171a2513ec6198bc1246d86de23d3885841bd58d4caab3c3b7c4ab27b2ddaa9d9fd833ba2c0d826278ebffea4cc506519654850b9d9440611c06fa8f2b2c05a3bf77e8c1", 0x44}], 0x6, &(0x7f0000000600)=[{0xb8, 0x109, 0x3e98, "2e52449bbc2cbf9148dd267b0d61474401db903fb67e65cee0a01de5aa7203ac8f7cd93b6e3b2a0031c51c20ee9af0574175553c369b0f3dc7070c906c1b617ee7ed8ac04249a7d869ca80d26d10ccc266bbb344ae8ce9473a9e2e8405223d8685df4dab4c58114557c1c52c6ac9b6dc3322b6b1e8961aec00b3dc59fa063b0322cfd01c99ce2ec38995dbd9d31cc0c121bcad5074ef69486637b59ab8c6a4df58461ce289"}, {0x108, 0x10f, 0x4, "09a42b806d6408b827583ea994a055ce32d28f2568529ab5aefafb88bdd7135b0f1e803f40c76df942275a3d16e3dcafd9210bcaf364ac1f255e0e7d74bce27cf1eb05e4e555701085c7dae43271f3e8f116c2213a22d9fd278569c40345988cb15832216671d2b657310749deaef3198652f7110e5209d78f3281117df155b21dc3a488daf43fb8d1d885b46b41a79c410ccbfb5e5f39debf3def3f4d52ceb690c9b0d9bc73a588b681acd375612d3f23e0c8dc4d1a78d900feaf623e078b503d9c1ed9db8a4c68a8975e12924764cb1d8d43555cd59c63c0abee58df19f5dd45768e536aa9046ac0a36419e2ed1444a3caf310f8d7"}, {0x38, 0x112, 0x400, "6b0b78235bc50a090dabae0f35838cd25d7f45eabfa124b6be7ff0fb9acc9c488bb220438c1556"}], 0x1f8}, 0x0, 0x20044800, 0x1, {0x0, r5}}, 0x2ff) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:03:54 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), 0x0, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:03:54 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fe", 0x75, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:03:54 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000140)=@ieee802154, &(0x7f00000001c0)=0x80) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x1a441, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24, 0xdd5, @mcast2, 0x2}, 0x1c) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) 07:03:54 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:07 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:04:07 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000140)=@ieee802154, &(0x7f00000001c0)=0x80) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x1a441, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24, 0xdd5, @mcast2, 0x2}, 0x1c) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pipe(0x0) 07:04:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, 0x0) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:04:07 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fe", 0x75, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:07 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 95) 07:04:07 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x353}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) creat(&(0x7f0000000040)='./file0\x00', 0x89) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) io_uring_enter(r4, 0x85016, 0x0, 0x3, 0x0, 0x0) 07:04:07 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:07 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) [ 1616.400391] FAULT_INJECTION: forcing a failure. [ 1616.400391] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.402790] CPU: 1 PID: 8492 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1616.404215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1616.405968] Call Trace: [ 1616.406528] dump_stack+0x107/0x167 [ 1616.407286] should_fail.cold+0x5/0xa [ 1616.408076] ? create_object.isra.0+0x3a/0xa20 [ 1616.409035] should_failslab+0x5/0x20 [ 1616.409817] kmem_cache_alloc+0x5b/0x310 [ 1616.410673] ? mark_held_locks+0x9e/0xe0 [ 1616.411546] create_object.isra.0+0x3a/0xa20 [ 1616.412462] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1616.413529] kmem_cache_alloc_bulk+0x168/0x320 [ 1616.414512] io_submit_sqes+0x6fe6/0x8610 [ 1616.415398] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1616.416447] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1616.417445] ? find_held_lock+0x2c/0x110 [ 1616.418301] ? io_submit_sqes+0x8610/0x8610 [ 1616.419206] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1616.420219] ? wait_for_completion_io+0x270/0x270 [ 1616.421223] ? rcu_read_lock_any_held+0x75/0xa0 [ 1616.422191] ? vfs_write+0x354/0xb10 [ 1616.422961] ? fput_many+0x2f/0x1a0 [ 1616.423712] ? ksys_write+0x1a9/0x260 [ 1616.424500] ? __ia32_sys_read+0xb0/0xb0 [ 1616.425340] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1616.426681] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1616.427763] do_syscall_64+0x33/0x40 [ 1616.428567] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1616.429614] RIP: 0033:0x7f7015fcab19 [ 1616.430391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1616.434193] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1616.435799] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1616.437312] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1616.438829] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1616.440342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1616.441854] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1616.455151] FAULT_INJECTION: forcing a failure. [ 1616.455151] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.457734] CPU: 1 PID: 8489 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 1616.459204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1616.460946] Call Trace: [ 1616.461502] dump_stack+0x107/0x167 [ 1616.462282] should_fail.cold+0x5/0xa [ 1616.463090] ? create_object.isra.0+0x3a/0xa20 [ 1616.464056] should_failslab+0x5/0x20 [ 1616.464862] kmem_cache_alloc+0x5b/0x310 [ 1616.465732] ? mark_held_locks+0x9e/0xe0 [ 1616.466605] create_object.isra.0+0x3a/0xa20 [ 1616.467530] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1616.468611] kmem_cache_alloc_bulk+0x168/0x320 [ 1616.469594] io_submit_sqes+0x6fe6/0x8610 [ 1616.470503] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1616.471559] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1616.472591] ? find_held_lock+0x2c/0x110 [ 1616.473465] ? io_submit_sqes+0x8610/0x8610 [ 1616.474386] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1616.475402] ? wait_for_completion_io+0x270/0x270 [ 1616.476432] ? rcu_read_lock_any_held+0x75/0xa0 [ 1616.477412] ? vfs_write+0x354/0xb10 [ 1616.478206] ? fput_many+0x2f/0x1a0 [ 1616.478976] ? ksys_write+0x1a9/0x260 [ 1616.479785] ? __ia32_sys_read+0xb0/0xb0 [ 1616.480644] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1616.481760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1616.482866] do_syscall_64+0x33/0x40 [ 1616.483648] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1616.484740] RIP: 0033:0x7fbe68d5ab19 [ 1616.485514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1616.489368] RSP: 002b:00007fbe662d0188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1616.490930] RAX: ffffffffffffffda RBX: 00007fbe68e6df60 RCX: 00007fbe68d5ab19 [ 1616.492395] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1616.493864] RBP: 00007fbe662d01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1616.495345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1616.496816] R13: 00007ffd1abc830f R14: 00007fbe662d0300 R15: 0000000000022000 07:04:07 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:04:07 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27", 0xb0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:07 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:08 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, 0x0, 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:08 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:08 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_setup(0x77db, &(0x7f0000000240)={0x0, 0x1122, 0x20, 0x2, 0x81, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r5, r6, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) r7 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x280082, 0x25) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101300, 0x0) r9 = syz_io_uring_setup(0x21, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r8}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r9, 0x9, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x300000c, 0x2010, r0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r9, 0x12, 0x0, r10) syz_io_uring_submit(r4, r6, &(0x7f0000000480)=@IORING_OP_STATX={0x15, 0x5, 0x0, r7, &(0x7f0000000340), &(0x7f0000000440)='./file0\x00', 0x200, 0x800, 0x0, {0x0, r10}}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:04:08 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:04:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 07:04:08 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27", 0xb0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 1) [ 1616.901267] FAULT_INJECTION: forcing a failure. [ 1616.901267] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.904937] CPU: 0 PID: 8518 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1616.906647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1616.908699] Call Trace: [ 1616.909353] dump_stack+0x107/0x167 [ 1616.910264] should_fail.cold+0x5/0xa [ 1616.911204] ? mb_cache_entry_create+0xbf/0x910 [ 1616.912345] should_failslab+0x5/0x20 [ 1616.913291] kmem_cache_alloc+0x5b/0x310 [ 1616.914314] mb_cache_entry_create+0xbf/0x910 [ 1616.915436] ext4_xattr_get+0x563/0xa00 [ 1616.916426] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1616.917575] ? lock_chain_count+0x20/0x20 [ 1616.918609] ? xattr_resolve_name+0x26e/0x3e0 [ 1616.919723] ? ext4_xattr_security_set+0x40/0x40 [ 1616.920882] __vfs_getxattr+0xe3/0x150 [ 1616.921845] ? __vfs_setxattr+0x180/0x180 [ 1616.922880] ? lock_acquire+0x197/0x470 [ 1616.923854] ? ext4_file_write_iter+0x365/0x1530 [ 1616.925019] cap_inode_need_killpriv+0x3c/0x60 [ 1616.926145] security_inode_need_killpriv+0x46/0xa0 [ 1616.927372] file_remove_privs+0x2ea/0x520 [ 1616.928415] ? inode_set_ctime_current+0xa0/0xa0 [ 1616.929581] ? generic_write_checks+0x2ad/0x390 [ 1616.930740] ? generic_write_check_limits+0x2a0/0x2a0 [ 1616.932006] ? down_write+0xe0/0x160 [ 1616.932919] ? down_write_killable+0x180/0x180 [ 1616.934055] file_modified+0x14/0xa0 [ 1616.934975] ext4_file_write_iter+0x8f8/0x1530 [ 1616.936117] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1616.937250] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1616.938572] new_sync_write+0x42c/0x660 [ 1616.939546] ? new_sync_read+0x6f0/0x6f0 [ 1616.940549] ? ksys_write+0x12d/0x260 [ 1616.941486] ? lock_release+0x680/0x680 [ 1616.942476] ? avc_policy_seqno+0x9/0x70 [ 1616.943468] ? selinux_file_permission+0x92/0x520 [ 1616.944672] vfs_write+0x7c0/0xb10 [ 1616.945558] ksys_write+0x12d/0x260 [ 1616.946463] ? __ia32_sys_read+0xb0/0xb0 [ 1616.947459] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1616.948746] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1616.950031] do_syscall_64+0x33/0x40 [ 1616.950946] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1616.952205] RIP: 0033:0x7fcaf76dab19 [ 1616.953119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1616.957657] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1616.959526] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1616.961276] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1616.963039] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1616.964797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1616.966565] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 07:04:22 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x10000000000}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="19000020000000000000000000000000c271682e6f1a6ac9ee9b88885c1da24790ef4bcea01afee530e6a4b1b8d344dbcdfb29271a79ae9bda1e24283b1afcb3b15e017ff64e308f746c06c46937a2ab87898c60ea2f7ee6c7d6215e64130dcae5d45af4b3370456b8dd2e4478ad995086c7b11c9698b33a1fd66314e7bc5524104b12c2"]}) syncfs(0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1539], 0x603) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @private0, 0x8}}, 0x0, 0x0, 0x2f, 0x0, "aa3262f5718a75c5e4c107b36be5b731cc4ae77e17704e82b2f5a9337ad14b50884654f3309f0ef8bd0753b6aa533ec31376d261e48a66f039d98a9ac4d5d3ad5ba22181cac531a7c335b46ce3d875ce"}, 0xd8) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000240)=ANY=[]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4ea0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'veth0_to_bond\x00'}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8000}, 0x4) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="00000000000000002e2f668608617c6387be696c653000"]) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 07:04:22 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 96) 07:04:22 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) 07:04:22 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27", 0xb0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:22 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101300, 0x0) r6 = syz_io_uring_setup(0x21, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r5}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0x12, 0x0, r7) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) r8 = open_tree(r4, &(0x7f00000001c0)='./file1\x00', 0x88001) ioctl$INCFS_IOC_CREATE_FILE(r8, 0xc058671e, &(0x7f00000006c0)={{'\x00', 0x2}, {0x8}, 0xd, 0x0, 0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='./file1\x00', &(0x7f0000000340)="dfb1032880b80cd5d2e90ffd8188786457688bf4addfe8c4ac246c96cf6b22b122ff4117e81ed20e31cd8dd3bb1556f481944667553d9833d696ee5fe092a4598a0b333b27ce2c51d10702a83635899599b382154181b56a97fb9f046177435e2642bb4db5e4422b9bf90a9769e48cbbcb6d3878c6d4b55a8ababc5187b920", 0x7f, 0x0, &(0x7f0000000400)={0x2, 0x1d6, {0x0, 0xc, 0xd7, "4e97e83e802e5cedf84b71b8081df21a6f1fdc961ec90c86ccc960e24348d6ec8a349ead8c4d14d75060379d44b0ecde992f96c15974242a282579d88c77ab9fdd11758788f664e7562039911323f5c29c866dd0f2e03ed18db3eb23c4513f952fcee705f33ccb10aa92ffb8acf2cbdf61427a12a0f6e5cd19967e07022c62391f6ab5cccd00acd10beeda5bdf0afa54d5d594e3897685add63d4407227598279ec7a8061e49f372d14bab2575181095490d1311473feb78244c5563781d9e694c0e6bdfa6d26f88c64d4cc68e5509e2f2ed50f9dca4d5", 0xf2, "bd4b6928556a0285df6631d74c30b25ca271c11aafdc4b01437775d74cf48e63f5efbe12d2c7606091ec9b7c7b61d4b0529f12803ab5539d85a40f7eacea7bfa2823e0039a8d328c99107814f10c3ccdeff7e7f2cab8ddf0707e29f526e965437557e05a01315007da24562606b967ebcebdd888e7aabf87973b7fa71c977bfd8cb3555dd54249c90f92da3001071105d9d2106362740e967ecf3aa048f3365d7d8efba53aa35df829333ba21995aad23d461d9425e8c4f830320c07209f7832a106f391cb9dede68440034327c2ffdca084a20e63b84607fd5020f5e4e5078cb54a3ac28f195b35d6a873ce010c0b61bb4d"}, 0xca, "eca38360afeb7b8617e88b28a6ff50ee0f0e15b8c4d65ff65e2d4e4b4926d75dd63553c73104d3c7a7b853637ea2b3d902ceaf5a3211044993614b83e5893525681060943628dafa5d0e062e3a5dd34da709e2a46e8da6b7b5e2731193dba6f6441b439c2494b07c7569509af331b234a8affb098c6988c15e0b75200fe2905820d5e6ab9195e0a8adc0d9edefacec9602bef8576fd6bcae030990c76f44bc724ff0b168a5a6b1a43c88d4db65bb1659394efe42342c5b88b51f4397951bd2ab91183d8c8eeb8dafc643"}, 0x2ac}) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r9, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:04:22 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:04:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 1) 07:04:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 2) [ 1631.400584] FAULT_INJECTION: forcing a failure. [ 1631.400584] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.403092] CPU: 1 PID: 8524 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1631.404579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.406381] Call Trace: [ 1631.406952] dump_stack+0x107/0x167 [ 1631.407742] should_fail.cold+0x5/0xa [ 1631.408580] ? create_object.isra.0+0x3a/0xa20 [ 1631.409575] should_failslab+0x5/0x20 [ 1631.410401] kmem_cache_alloc+0x5b/0x310 [ 1631.411276] ? mark_held_locks+0x9e/0xe0 [ 1631.412163] create_object.isra.0+0x3a/0xa20 [ 1631.413115] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1631.414242] kmem_cache_alloc_bulk+0x168/0x320 [ 1631.415252] io_submit_sqes+0x6fe6/0x8610 [ 1631.416187] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1631.417264] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1631.418317] ? find_held_lock+0x2c/0x110 [ 1631.419205] ? io_submit_sqes+0x8610/0x8610 [ 1631.420154] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1631.421198] ? wait_for_completion_io+0x270/0x270 [ 1631.422251] ? rcu_read_lock_any_held+0x75/0xa0 [ 1631.423248] ? vfs_write+0x354/0xb10 [ 1631.424047] ? fput_many+0x2f/0x1a0 [ 1631.424826] ? ksys_write+0x1a9/0x260 [ 1631.425638] ? __ia32_sys_read+0xb0/0xb0 [ 1631.426526] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1631.427647] ? syscall_enter_from_user_mode+0x1d/0x50 07:04:22 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d812", 0xcd, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1631.428758] do_syscall_64+0x33/0x40 [ 1631.429712] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1631.430820] RIP: 0033:0x7f7015fcab19 [ 1631.431611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1631.435548] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 07:04:22 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0xecf, &(0x7f0000000240)={0x0, 0x607b, 0x0, 0x3, 0x3d6, 0x0, r0}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)=0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/zoneinfo\x00', 0x0, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101300, 0x0) r7 = syz_io_uring_setup(0x21, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r6}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r7, 0x12, 0x0, r8) getsockopt$IP_VS_SO_GET_SERVICE(r6, 0x0, 0x483, &(0x7f00000003c0), &(0x7f0000000440)=0x68) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x4, 0x0, r5, 0x0, &(0x7f0000000340)="1cbb19899e0fa417cce99717bc6e445843350c8697d8490253c3d15c6e0016ceac69", 0x22, 0x2060, 0x0, {0x0, r8}}, 0x1000) [ 1631.437165] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1631.438837] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1631.440390] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1631.441935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1631.443461] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1631.476099] FAULT_INJECTION: forcing a failure. [ 1631.476099] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.478777] CPU: 1 PID: 8543 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1631.480233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.481978] Call Trace: [ 1631.482542] dump_stack+0x107/0x167 [ 1631.483309] should_fail.cold+0x5/0xa [ 1631.484106] ? getname_flags.part.0+0x50/0x4f0 [ 1631.485059] should_failslab+0x5/0x20 [ 1631.485856] kmem_cache_alloc+0x5b/0x310 [ 1631.486717] getname_flags.part.0+0x50/0x4f0 [ 1631.487638] getname_flags+0x9a/0xe0 [ 1631.488419] __x64_sys_rename+0x56/0xa0 [ 1631.489269] do_syscall_64+0x33/0x40 [ 1631.490049] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1631.491127] RIP: 0033:0x7ff571175b19 [ 1631.491911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1631.495754] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1631.497348] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1631.498857] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1631.500583] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1631.502298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1631.504006] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 [ 1631.509310] FAULT_INJECTION: forcing a failure. [ 1631.509310] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.512231] CPU: 1 PID: 8541 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1631.513860] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.515843] Call Trace: [ 1631.516473] dump_stack+0x107/0x167 [ 1631.517346] should_fail.cold+0x5/0xa [ 1631.518265] ? mb_cache_entry_create+0xbf/0x910 [ 1631.519383] should_failslab+0x5/0x20 [ 1631.520289] kmem_cache_alloc+0x5b/0x310 [ 1631.521267] mb_cache_entry_create+0xbf/0x910 [ 1631.522359] ext4_xattr_get+0x563/0xa00 [ 1631.523321] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1631.524429] ? lock_chain_count+0x20/0x20 [ 1631.525413] ? xattr_resolve_name+0x26e/0x3e0 [ 1631.526485] ? ext4_xattr_security_set+0x40/0x40 [ 1631.527603] __vfs_getxattr+0xe3/0x150 [ 1631.528526] ? __vfs_setxattr+0x180/0x180 [ 1631.529516] ? lock_acquire+0x197/0x470 [ 1631.530464] ? ext4_file_write_iter+0x365/0x1530 [ 1631.531590] cap_inode_need_killpriv+0x3c/0x60 [ 1631.532662] security_inode_need_killpriv+0x46/0xa0 [ 1631.533848] file_remove_privs+0x2ea/0x520 [ 1631.534854] ? inode_set_ctime_current+0xa0/0xa0 [ 1631.535967] ? generic_write_checks+0x2ad/0x390 [ 1631.537059] ? generic_write_check_limits+0x2a0/0x2a0 [ 1631.538275] ? down_write+0xe0/0x160 [ 1631.539145] ? down_write_killable+0x180/0x180 [ 1631.540225] file_modified+0x14/0xa0 [ 1631.541098] ext4_file_write_iter+0x8f8/0x1530 [ 1631.542198] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1631.543285] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1631.544526] new_sync_write+0x42c/0x660 [ 1631.545468] ? new_sync_read+0x6f0/0x6f0 [ 1631.546432] ? ksys_write+0x12d/0x260 [ 1631.547582] ? lock_release+0x680/0x680 [ 1631.548614] ? avc_policy_seqno+0x9/0x70 [ 1631.549638] ? selinux_file_permission+0x92/0x520 [ 1631.550795] vfs_write+0x7c0/0xb10 [ 1631.551649] ksys_write+0x12d/0x260 [ 1631.552501] ? __ia32_sys_read+0xb0/0xb0 [ 1631.553447] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1631.554666] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1631.555867] do_syscall_64+0x33/0x40 [ 1631.556743] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1631.557927] RIP: 0033:0x7f692f402b19 [ 1631.558794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1631.563072] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1631.564833] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1631.566498] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1631.568151] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1631.569795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1631.571445] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 [ 1631.594172] FAULT_INJECTION: forcing a failure. [ 1631.594172] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.596883] CPU: 1 PID: 8544 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1631.598473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.600366] Call Trace: [ 1631.600965] dump_stack+0x107/0x167 [ 1631.601790] should_fail.cold+0x5/0xa [ 1631.602661] ? create_object.isra.0+0x3a/0xa20 [ 1631.603688] should_failslab+0x5/0x20 [ 1631.604552] kmem_cache_alloc+0x5b/0x310 [ 1631.605477] create_object.isra.0+0x3a/0xa20 [ 1631.606477] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1631.607633] kmem_cache_alloc+0x159/0x310 [ 1631.608578] mb_cache_entry_create+0xbf/0x910 [ 1631.609604] ext4_xattr_get+0x563/0xa00 [ 1631.610523] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1631.611572] ? lock_chain_count+0x20/0x20 [ 1631.612515] ? xattr_resolve_name+0x26e/0x3e0 [ 1631.613531] ? ext4_xattr_security_set+0x40/0x40 [ 1631.614606] __vfs_getxattr+0xe3/0x150 [ 1631.615490] ? __vfs_setxattr+0x180/0x180 [ 1631.616431] ? lock_acquire+0x197/0x470 [ 1631.617321] ? ext4_file_write_iter+0x365/0x1530 [ 1631.618400] cap_inode_need_killpriv+0x3c/0x60 [ 1631.619427] security_inode_need_killpriv+0x46/0xa0 [ 1631.620545] file_remove_privs+0x2ea/0x520 [ 1631.621495] ? inode_set_ctime_current+0xa0/0xa0 [ 1631.622569] ? generic_write_checks+0x2ad/0x390 [ 1631.623616] ? generic_write_check_limits+0x2a0/0x2a0 [ 1631.624779] ? down_write+0xe0/0x160 [ 1631.625612] ? down_write_killable+0x180/0x180 [ 1631.626657] file_modified+0x14/0xa0 [ 1631.627496] ext4_file_write_iter+0x8f8/0x1530 [ 1631.628539] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1631.629571] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1631.630777] new_sync_write+0x42c/0x660 [ 1631.631674] ? new_sync_read+0x6f0/0x6f0 [ 1631.632591] ? ksys_write+0x12d/0x260 [ 1631.633454] ? lock_release+0x680/0x680 [ 1631.634357] ? avc_policy_seqno+0x9/0x70 [ 1631.635268] ? selinux_file_permission+0x92/0x520 [ 1631.636370] vfs_write+0x7c0/0xb10 [ 1631.637178] ksys_write+0x12d/0x260 [ 1631.637995] ? __ia32_sys_read+0xb0/0xb0 [ 1631.638923] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1631.640097] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1631.641254] do_syscall_64+0x33/0x40 [ 1631.642089] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1631.643248] RIP: 0033:0x7fcaf76dab19 [ 1631.644084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1631.648232] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1631.649946] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1631.651560] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1631.653164] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1631.654771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1631.656367] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 07:04:35 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:04:35 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d812", 0xcd, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 2) 07:04:35 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 97) 07:04:35 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) getpeername(0xffffffffffffffff, &(0x7f00000025c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000002640)=0x80) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) r10 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000002680), 0x2, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r11, 0x7, 0x0, 0x0, 0x0) [ 1644.045278] FAULT_INJECTION: forcing a failure. [ 1644.045278] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.046992] CPU: 1 PID: 8558 Comm: syz-executor.2 Not tainted 5.10.240 #1 sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002740)={&(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x10}, 0xc, &(0x7f0000000240)=[{&(0x7f0000000340)={0x11d8, 0x3b, 0x100, 0x70bd2b, 0x25dfdbfe, "", [@nested={0x18, 0x49, 0x0, 0x1, [@typed={0x8, 0x35, 0x0, 0x0, @fd}, @typed={0xc, 0x72, 0x0, 0x0, @u64}]}, @typed={0x8, 0x8d, 0x0, 0x0, @fd}, @typed={0xba, 0x50, 0x0, 0x0, @binary="e6e88f5c4021b8a1217680b9b9ed002daacaba46ba4427c7566d79046023ca39cada1492ddc7682f692619a527d86eefb75e37e91d3a70d9c7f4b9fb9679d49145f5fbe0d0cead8e611b63daed43b466785ce87fede0a024647aeb84a8412cd5153551c35b57163a518632f7bbdd0b55368f7b68d88071dc79f363a4fe511f985eb1148771d818217a6b11f54ebdc7721af9613386e34333edbf01219a66d0e1dfdd6b4a72013c487a35392101dea74490d6ef29c5ed"}, @nested={0x10ea, 0x2c, 0x0, 0x1, [@generic="ca97e10c17970cd8a2106ac25f1840bd6ffe5203b390f1c233df1bf2d4cbcebc95a62c03ffae20a5eb5caddd9e6dcfaeccfb82e6a056cd6d43dec225f10a8122b42ab8d76a2155ba", @generic="5f7bfa7519a7c383955a56ff6678dbff5effcc44bb833cbdb2885dfdcadb302525de4de3180ce2d552b130c80b0907269841a76c7d448fd7", @generic="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", @generic="6f4cb622fb3ce775b775d911905b05dd8bde950c98d264c76cab9e419398518ceb212fc9496693770080e159355dfeb10504c7925a10cd5288731f1ad5315a18ba78627103e492fabc3f938348952629900536e0f4cc660b9f29098de911ab39fed430a8b9c2"]}]}, 0x11d8}, {&(0x7f0000001540)={0x1048, 0x28, 0x8, 0x70bd29, 0x25dfdbfc, "", [@generic="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", @nested={0x36, 0x5d, 0x0, 0x1, [@generic="bc3b41b41544dd82e540eba9ab737cf75fee6d020276b498938db8f84c1eef6e05cd60befbfce48f1067095ed2b00abf7825"]}]}, 0x1048}], 0x2, &(0x7f00000026c0)=[@rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, r4, r0, r0]}}, @rights={{0x38, 0x1, 0x1, [r5, r6, r9, r0, r0, r0, r0, r0, r0, r10]}}, @rights={{0x1c, 0x1, 0x1, [r0, r11, r0]}}], 0x80, 0x4}, 0x5) r12 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r13, r14, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r13, r2, &(0x7f0000000140)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0xcd160a5be097e676, 0x0, 0x8, 0x1, &(0x7f0000000040)="818c555671465d7ad03feda950536b27ebf0ad2afe207e997e482d18b9c156685cc57f8b66", 0x3, 0x0, 0x0, {0x3}}, 0x3) syz_io_uring_submit(r12, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:04:35 executing program 7: openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_notify(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) creat(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) fallocate(r2, 0x18, 0xba0, 0x2) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x20, 0x6, 0x9, 0xff, 0x0, 0x6, 0x20, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7ff, 0xfff2836046e1407a, @perf_bp={&(0x7f0000000080), 0x8}, 0x2000, 0x2, 0x1, 0x4, 0x9, 0x3, 0x3f, 0x0, 0xfffffffa, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x4) timerfd_gettime(0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x10004, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) 07:04:35 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:04:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 3) [ 1644.047994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1644.049068] Call Trace: [ 1644.049399] dump_stack+0x107/0x167 [ 1644.049847] should_fail.cold+0x5/0xa [ 1644.050329] should_failslab+0x5/0x20 [ 1644.050796] kmem_cache_alloc_bulk+0x4b/0x320 [ 1644.051349] io_submit_sqes+0x6fe6/0x8610 [ 1644.051870] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1644.052480] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1644.053070] ? find_held_lock+0x2c/0x110 [ 1644.053569] ? io_submit_sqes+0x8610/0x8610 [ 1644.054102] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1644.054704] ? wait_for_completion_io+0x270/0x270 [ 1644.055298] ? rcu_read_lock_any_held+0x75/0xa0 [ 1644.055874] ? vfs_write+0x354/0xb10 [ 1644.056332] ? fput_many+0x2f/0x1a0 [ 1644.056785] ? ksys_write+0x1a9/0x260 [ 1644.057253] ? __ia32_sys_read+0xb0/0xb0 [ 1644.057757] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1644.058413] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1644.059045] do_syscall_64+0x33/0x40 [ 1644.059504] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1644.060169] RIP: 0033:0x7f7015fcab19 [ 1644.060640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1644.062909] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1644.063844] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1644.064711] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1644.065574] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1644.066447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1644.067311] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1644.108293] FAULT_INJECTION: forcing a failure. [ 1644.108293] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1644.111308] CPU: 0 PID: 8563 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1644.112850] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1644.114726] Call Trace: [ 1644.115325] dump_stack+0x107/0x167 [ 1644.116146] should_fail.cold+0x5/0xa [ 1644.117006] __alloc_pages_nodemask+0x182/0x600 [ 1644.118051] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1644.119413] ? kmem_cache_alloc+0x301/0x310 [ 1644.120390] alloc_pages_current+0x187/0x280 [ 1644.121380] allocate_slab+0x26f/0x380 [ 1644.122257] ___slab_alloc+0x470/0x700 [ 1644.123225] ? getname_flags.part.0+0x50/0x4f0 [ 1644.124406] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1644.125634] ? getname_flags.part.0+0x50/0x4f0 [ 1644.126823] ? kmem_cache_alloc+0x301/0x310 [ 1644.127920] ? getname_flags.part.0+0x50/0x4f0 [ 1644.129088] kmem_cache_alloc+0x301/0x310 [ 1644.130159] getname_flags.part.0+0x50/0x4f0 [ 1644.131298] getname_flags+0x9a/0xe0 [ 1644.132258] __x64_sys_rename+0x56/0xa0 [ 1644.133280] do_syscall_64+0x33/0x40 [ 1644.134231] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1644.135566] RIP: 0033:0x7ff571175b19 [ 1644.136527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1644.141277] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1644.143222] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1644.145040] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1644.146856] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1644.148667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1644.150488] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 [ 1644.176503] FAULT_INJECTION: forcing a failure. [ 1644.176503] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.177926] CPU: 1 PID: 8568 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1644.178731] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1644.179700] Call Trace: [ 1644.180019] dump_stack+0x107/0x167 [ 1644.180447] should_fail.cold+0x5/0xa [ 1644.180896] ? mb_cache_entry_create+0xbf/0x910 [ 1644.180948] FAULT_INJECTION: forcing a failure. [ 1644.180948] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.181438] should_failslab+0x5/0x20 [ 1644.181449] kmem_cache_alloc+0x5b/0x310 [ 1644.181470] mb_cache_entry_create+0xbf/0x910 [ 1644.185661] ext4_xattr_get+0x563/0xa00 [ 1644.186129] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1644.186682] ? xattr_resolve_name+0x26e/0x3e0 [ 1644.187211] ? ext4_xattr_security_set+0x40/0x40 [ 1644.187766] __vfs_getxattr+0xe3/0x150 [ 1644.188222] ? __vfs_setxattr+0x180/0x180 [ 1644.188712] ? igrab+0xc0/0xc0 [ 1644.189086] ? ext4_xattr_security_set+0x40/0x40 [ 1644.189649] cap_inode_need_killpriv+0x3c/0x60 [ 1644.190183] security_inode_need_killpriv+0x46/0xa0 [ 1644.190777] notify_change+0x886/0x1160 [ 1644.191246] file_remove_privs+0x364/0x520 [ 1644.191740] ? inode_set_ctime_current+0xa0/0xa0 [ 1644.192292] ? generic_write_checks+0x2ad/0x390 [ 1644.192842] ? down_write+0xe0/0x160 [ 1644.193275] ? down_write_killable+0x180/0x180 [ 1644.193823] file_modified+0x14/0xa0 [ 1644.194260] ext4_file_write_iter+0x8f8/0x1530 [ 1644.194807] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1644.195343] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1644.195968] new_sync_write+0x42c/0x660 [ 1644.196432] ? new_sync_read+0x6f0/0x6f0 [ 1644.196910] ? ksys_write+0x12d/0x260 [ 1644.197355] ? lock_release+0x680/0x680 [ 1644.197818] ? avc_policy_seqno+0x9/0x70 [ 1644.198296] ? selinux_file_permission+0x92/0x520 [ 1644.198874] vfs_write+0x7c0/0xb10 [ 1644.199292] ksys_write+0x12d/0x260 [ 1644.199718] ? __ia32_sys_read+0xb0/0xb0 [ 1644.200192] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1644.200806] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1644.201406] do_syscall_64+0x33/0x40 [ 1644.201843] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1644.202454] RIP: 0033:0x7fcaf76dab19 [ 1644.202889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1644.205022] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1644.205910] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1644.206745] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1644.207579] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1644.208405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1644.209235] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 [ 1644.210092] CPU: 0 PID: 8569 Comm: syz-executor.1 Not tainted 5.10.240 #1 07:04:35 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1644.211796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1644.214021] Call Trace: [ 1644.214686] dump_stack+0x107/0x167 [ 1644.215592] should_fail.cold+0x5/0xa [ 1644.216533] ? create_object.isra.0+0x3a/0xa20 [ 1644.217659] should_failslab+0x5/0x20 [ 1644.218616] kmem_cache_alloc+0x5b/0x310 [ 1644.219628] ? mb_cache_entry_create+0xbf/0x910 [ 1644.220778] create_object.isra.0+0x3a/0xa20 [ 1644.221862] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1644.223135] kmem_cache_alloc+0x159/0x310 [ 1644.224166] mb_cache_entry_create+0xbf/0x910 [ 1644.225293] ext4_xattr_get+0x563/0xa00 [ 1644.226300] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1644.227448] ? xattr_resolve_name+0x26e/0x3e0 [ 1644.228566] ? ext4_xattr_security_set+0x40/0x40 [ 1644.229720] __vfs_getxattr+0xe3/0x150 [ 1644.230687] ? __vfs_setxattr+0x180/0x180 07:04:35 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 98) [ 1644.231706] ? lock_acquire+0x197/0x470 [ 1644.232758] ? ext4_file_write_iter+0x365/0x1530 [ 1644.233923] cap_inode_need_killpriv+0x3c/0x60 [ 1644.235041] security_inode_need_killpriv+0x46/0xa0 [ 1644.236258] file_remove_privs+0x2ea/0x520 [ 1644.237311] ? inode_set_ctime_current+0xa0/0xa0 [ 1644.238476] ? generic_write_checks+0x2ad/0x390 [ 1644.239613] ? generic_write_check_limits+0x2a0/0x2a0 [ 1644.240871] ? down_write+0xe0/0x160 [ 1644.241787] ? down_write_killable+0x180/0x180 [ 1644.242915] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1644.244242] file_modified+0x14/0xa0 [ 1644.245144] ext4_file_write_iter+0x8f8/0x1530 [ 1644.246261] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1644.247371] ? __schedule+0x82c/0x1ea0 [ 1644.248311] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1644.249592] new_sync_write+0x42c/0x660 [ 1644.250582] ? new_sync_read+0x6f0/0x6f0 [ 1644.251562] ? ksys_write+0x12d/0x260 [ 1644.252479] ? lock_release+0x680/0x680 [ 1644.253446] ? avc_policy_seqno+0x9/0x70 [ 1644.253457] FAULT_INJECTION: forcing a failure. [ 1644.253457] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.257137] ? selinux_file_permission+0x92/0x520 [ 1644.258345] vfs_write+0x7c0/0xb10 [ 1644.259218] ksys_write+0x12d/0x260 [ 1644.260123] ? __ia32_sys_read+0xb0/0xb0 [ 1644.261128] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1644.262409] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1644.263670] do_syscall_64+0x33/0x40 [ 1644.264564] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1644.265809] RIP: 0033:0x7f692f402b19 [ 1644.266713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1644.271214] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1644.273070] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1644.274825] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1644.276580] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1644.278284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1644.280002] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 [ 1644.281758] CPU: 1 PID: 8578 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1644.282587] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1644.283579] Call Trace: [ 1644.283882] dump_stack+0x107/0x167 [ 1644.284295] should_fail.cold+0x5/0xa [ 1644.284727] ? create_object.isra.0+0x3a/0xa20 [ 1644.285242] should_failslab+0x5/0x20 [ 1644.285695] kmem_cache_alloc+0x5b/0x310 [ 1644.286152] ? mark_held_locks+0x9e/0xe0 [ 1644.286655] create_object.isra.0+0x3a/0xa20 [ 1644.287169] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1644.287767] kmem_cache_alloc_bulk+0x168/0x320 [ 1644.288313] io_submit_sqes+0x6fe6/0x8610 [ 1644.288818] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1644.289412] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1644.289980] ? find_held_lock+0x2c/0x110 [ 1644.290467] ? io_submit_sqes+0x8610/0x8610 [ 1644.290978] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1644.291544] ? wait_for_completion_io+0x270/0x270 [ 1644.292107] ? rcu_read_lock_any_held+0x75/0xa0 [ 1644.292648] ? vfs_write+0x354/0xb10 [ 1644.293097] ? fput_many+0x2f/0x1a0 [ 1644.293525] ? ksys_write+0x1a9/0x260 [ 1644.293973] ? __ia32_sys_read+0xb0/0xb0 [ 1644.294455] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1644.295046] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1644.295632] do_syscall_64+0x33/0x40 [ 1644.296052] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1644.296634] RIP: 0033:0x7f7015fcab19 [ 1644.297057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1644.299138] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1644.299997] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1644.300807] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1644.301615] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1644.302426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1644.303232] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:04:35 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d812", 0xcd, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:35 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:04:35 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xea, 0x0, 0x0, 0x0) 07:04:35 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 99) 07:04:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 4) [ 1644.604609] FAULT_INJECTION: forcing a failure. [ 1644.604609] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1644.607818] CPU: 0 PID: 8590 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1644.609363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1644.611238] Call Trace: [ 1644.611840] dump_stack+0x107/0x167 [ 1644.612658] should_fail.cold+0x5/0xa [ 1644.613523] strncpy_from_user+0x34/0x470 [ 1644.614467] getname_flags.part.0+0x95/0x4f0 [ 1644.615455] getname_flags+0x9a/0xe0 [ 1644.616294] __x64_sys_rename+0x56/0xa0 [ 1644.617190] do_syscall_64+0x33/0x40 [ 1644.618031] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1644.619192] RIP: 0033:0x7ff571175b19 [ 1644.620034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1644.624220] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1644.625933] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1644.627537] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1644.629136] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1644.630583] FAULT_INJECTION: forcing a failure. [ 1644.630583] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.630760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1644.630780] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 [ 1644.636359] CPU: 1 PID: 8592 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1644.637816] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1644.639563] Call Trace: [ 1644.640123] dump_stack+0x107/0x167 [ 1644.640891] should_fail.cold+0x5/0xa [ 1644.641691] ? create_object.isra.0+0x3a/0xa20 [ 1644.642650] should_failslab+0x5/0x20 [ 1644.643451] kmem_cache_alloc+0x5b/0x310 [ 1644.644306] ? mark_held_locks+0x9e/0xe0 [ 1644.645159] create_object.isra.0+0x3a/0xa20 [ 1644.646081] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1644.647162] kmem_cache_alloc_bulk+0x168/0x320 [ 1644.648122] io_submit_sqes+0x6fe6/0x8610 [ 1644.649019] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1644.650068] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1644.651085] ? find_held_lock+0x2c/0x110 [ 1644.651945] ? io_submit_sqes+0x8610/0x8610 [ 1644.652873] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1644.653885] ? wait_for_completion_io+0x270/0x270 [ 1644.654904] ? rcu_read_lock_any_held+0x75/0xa0 [ 1644.655873] ? vfs_write+0x354/0xb10 [ 1644.656651] ? fput_many+0x2f/0x1a0 [ 1644.657411] ? ksys_write+0x1a9/0x260 [ 1644.658209] ? __ia32_sys_read+0xb0/0xb0 [ 1644.659068] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1644.660171] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1644.661251] do_syscall_64+0x33/0x40 [ 1644.662037] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1644.663116] RIP: 0033:0x7f7015fcab19 [ 1644.663897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1644.667768] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1644.669372] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1644.670876] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1644.672370] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1644.673861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1644.675367] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 07:04:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 3) 07:04:36 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf73", 0xdc, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1644.713263] FAULT_INJECTION: forcing a failure. [ 1644.713263] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.716023] CPU: 1 PID: 8594 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1644.717450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1644.719186] Call Trace: [ 1644.719739] dump_stack+0x107/0x167 [ 1644.720504] should_fail.cold+0x5/0xa [ 1644.721302] ? create_object.isra.0+0x3a/0xa20 [ 1644.722268] should_failslab+0x5/0x20 [ 1644.723069] kmem_cache_alloc+0x5b/0x310 [ 1644.723927] create_object.isra.0+0x3a/0xa20 [ 1644.724836] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1644.725931] kmem_cache_alloc+0x159/0x310 [ 1644.726830] mb_cache_entry_create+0xbf/0x910 [ 1644.727789] ext4_xattr_get+0x563/0xa00 [ 1644.728633] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1644.729616] ? xattr_resolve_name+0x26e/0x3e0 [ 1644.730578] ? ext4_xattr_security_set+0x40/0x40 [ 1644.731567] __vfs_getxattr+0xe3/0x150 [ 1644.732388] ? __vfs_setxattr+0x180/0x180 [ 1644.733256] ? igrab+0xc0/0xc0 [ 1644.733930] ? ext4_xattr_security_set+0x40/0x40 [ 1644.734938] cap_inode_need_killpriv+0x3c/0x60 [ 1644.735888] security_inode_need_killpriv+0x46/0xa0 [ 1644.736933] notify_change+0x886/0x1160 [ 1644.737774] file_remove_privs+0x364/0x520 [ 1644.738662] ? inode_set_ctime_current+0xa0/0xa0 [ 1644.739648] ? generic_write_checks+0x2ad/0x390 [ 1644.740629] ? down_write+0xe0/0x160 [ 1644.741411] ? down_write_killable+0x180/0x180 [ 1644.742386] file_modified+0x14/0xa0 [ 1644.743167] ext4_file_write_iter+0x8f8/0x1530 [ 1644.744148] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1644.745116] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1644.746222] new_sync_write+0x42c/0x660 [ 1644.747062] ? new_sync_read+0x6f0/0x6f0 [ 1644.747922] ? ksys_write+0x12d/0x260 [ 1644.748729] ? lock_release+0x680/0x680 [ 1644.749554] ? avc_policy_seqno+0x9/0x70 [ 1644.750423] ? selinux_file_permission+0x92/0x520 [ 1644.751453] vfs_write+0x7c0/0xb10 [ 1644.752219] ksys_write+0x12d/0x260 [ 1644.753005] ? __ia32_sys_read+0xb0/0xb0 [ 1644.753859] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1644.754972] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1644.755052] FAULT_INJECTION: forcing a failure. [ 1644.755052] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.756048] do_syscall_64+0x33/0x40 [ 1644.756068] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1644.756080] RIP: 0033:0x7fcaf76dab19 [ 1644.756099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1644.756109] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1644.756130] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1644.756141] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1644.756152] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1644.756163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1644.756174] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 [ 1644.777890] CPU: 0 PID: 8598 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1644.779428] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1644.781289] Call Trace: [ 1644.781888] dump_stack+0x107/0x167 [ 1644.782715] should_fail.cold+0x5/0xa [ 1644.783574] ? mb_cache_entry_create+0xbf/0x910 [ 1644.784618] should_failslab+0x5/0x20 [ 1644.785473] kmem_cache_alloc+0x5b/0x310 [ 1644.786399] mb_cache_entry_create+0xbf/0x910 [ 1644.787415] ext4_xattr_get+0x563/0xa00 [ 1644.788316] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1644.789619] ? xattr_resolve_name+0x26e/0x3e0 [ 1644.790640] ? ext4_xattr_security_set+0x40/0x40 [ 1644.791695] __vfs_getxattr+0xe3/0x150 [ 1644.792566] ? __vfs_setxattr+0x180/0x180 [ 1644.793494] ? igrab+0xc0/0xc0 [ 1644.794212] ? ext4_xattr_security_set+0x40/0x40 [ 1644.795285] cap_inode_need_killpriv+0x3c/0x60 [ 1644.796311] security_inode_need_killpriv+0x46/0xa0 [ 1644.797434] notify_change+0x886/0x1160 [ 1644.798340] file_remove_privs+0x364/0x520 [ 1644.799296] ? inode_set_ctime_current+0xa0/0xa0 [ 1644.800355] ? generic_write_checks+0x2ad/0x390 [ 1644.801399] ? down_write+0xe0/0x160 [ 1644.802226] ? down_write_killable+0x180/0x180 [ 1644.803271] file_modified+0x14/0xa0 [ 1644.804099] ext4_file_write_iter+0x8f8/0x1530 [ 1644.805127] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1644.806149] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1644.807325] new_sync_write+0x42c/0x660 [ 1644.808213] ? new_sync_read+0x6f0/0x6f0 [ 1644.809127] ? ksys_write+0x12d/0x260 [ 1644.809974] ? lock_release+0x680/0x680 [ 1644.810866] ? avc_policy_seqno+0x9/0x70 [ 1644.811780] ? selinux_file_permission+0x92/0x520 [ 1644.812864] vfs_write+0x7c0/0xb10 [ 1644.813656] ksys_write+0x12d/0x260 [ 1644.814477] ? __ia32_sys_read+0xb0/0xb0 [ 1644.815377] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1644.816541] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1644.817698] do_syscall_64+0x33/0x40 [ 1644.818527] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1644.819666] RIP: 0033:0x7f692f402b19 [ 1644.820496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1644.824591] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1644.826290] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1644.827882] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1644.829459] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1644.831071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1644.832657] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 07:04:36 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}], @NL80211_ATTR_DURATION={0x8, 0x57, 0xfffff801}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x6cc, r0, 0x300, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x1b}, @val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x9de, 0x3c}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x5c8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x5a4, 0x4, 0x0, 0x1, [{0x6c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x31, 0x1, "0e0713e89f6cda2543514fb67fcde6dde5fe28f97ed70e4bae4150a59c9de18f4c2e935c336944a689bbc35acf"}, @NL80211_PKTPAT_MASK={0x31, 0x1, "7cbc70dc02ff337df81ac760fb83d137a6a96d305dc4cab7f400db473d9a60d0f9d908d72b6c00a5f146520685"}]}, {0x350, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}, @NL80211_PKTPAT_PATTERN={0xce, 0x2, "91e6aac3360b41647f9593de4e789e760e8d5d24735a961ccb3b9ea043c84a9333e6dae1ccd81a38b805524814ab07ca7f776240625673e6b6051e2ddc6ae576db33553ae6ba2b0387e95d901e59d00d98dd6e6edf8a010d31ba0fb147ff8dcb4acaf3ffeffa0c343a8d0b4943ee567069aaaf12453003f2efc9dbf65c36b22dbe3accb139eae0e69172cbbbcb58974e6bbca296fddbb549072c861b8861264667caacf2b901fdffc7c42026fd316d3b77818fa09b3681a93fb244c8ab33b7075cbd5ab73a37e1b0b4aa"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8}, @NL80211_PKTPAT_MASK={0x2d, 0x1, "8f18fa6e2073a584520719a2061f95cec3acb0b2368358bbcaa8516a38dbabc7f1494fe7a30cc21166"}, @NL80211_PKTPAT_MASK={0x4d, 0x1, "74072e39faa5c0dcd54c9fa5301dc8e7d9b0530c7346faff20a2f1e3e83b82c6f0cd84d8cfe54a319fee4d49567f1e63a28570d8edcfd8991d701315d4cd04d695d2ba0b5b81c24e9b"}, @NL80211_PKTPAT_MASK={0x100, 0x1, "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"}, @NL80211_PKTPAT_MASK={0x63, 0x1, "52a3363b27a98de081ed9d5d326c60acbfe888b7c558ec8e4d7c73b30608e1ff5df7c0505c7ec1627313aab4541badef562a78963600172c2bcf3f56da2b48d5b4676495b016902745881e4168816280265f9d7c74d9bd9acf7a5473eb4234"}, @NL80211_PKTPAT_PATTERN={0x86, 0x2, "d51cdd8880fa7fb5940dec3550f9ac553ed1a819622101fbaf1cd1c77dff6df96920cb30bfc9355bf18b796d42f4e687dfd45a4d6fa26a1c86e4f5cf6278922ec275e28419e42df5c64938a9a56877c8fd57f90244e81b9638915caeb15692632ef79813c8512390419672b8591dd303b8adade9cc99d1dcba468b7dcc393ce0144e"}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x2f, 0x1, "958096a4653b75aaea338ffc2eb31052e2b466eb35cd4f0bf4ee9fce317c248d8b9edbfb047ed980271ebb"}]}, {0x1b0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xc8, 0x1, "798f803065af35cdf9af8335c6a69a8e1db0b0bd692ad3b7bd33602f17486fcf1d873f40a30c5bb0c01b8fbfc3e657ffb1d4026caf493d95abb82b8fac56f2f499dce90f26c7391f648d2778e82607b16254a571fdfaf3ece5e61db8daf1f902f23ea80de7d963195e650881c33087457b53af8b6d1f95542e8d85cb5efe9589d1df40e2d0e392f3382a3760e6c0e2c08002dd14d56c06a76e8ee7120c50d8076c0a09bd0f954578363364bf740d857024eab10f3962c8783d0eabd3886559f24a7bb956"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x3}, @NL80211_PKTPAT_PATTERN={0xbf, 0x2, "11b1d5b7b0a3c05353a42c11b225e6f1bd2a4aea77192a209f39132a56278b3be9f44d4f858c3f4bfbf75a639b940fcfe290a951d8217e18dc1b39ca997efb40dbe044abaf834bdf7de355d3264590b67906dfeb15f2c05100230d8a04585bfcbc830c8c14780f13bfc5faea8fe4df33c29fcae2b59d416ba1b44672aedf83e6585dc22cd01b1ec184e8c945a5c914d56750265116a1dc3b11964e11f1102e1e0ee864c105abee12cd6d167447186dc0dbcdccd5a0f8d455ed2247"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8001}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x100}, @NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x9}]}]}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0xc, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0xff}]}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0xd4, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xc0, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DST_IPV4={0x8, 0x2, @empty}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @rand_addr=0x64010102}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x80, 0x5, 0x4}}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x17, 0xa, "34b489f9bfd2a766f0ab22dbbe909d9d9e5da1"}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x7b, 0x8, {0x20, 0x7158, "0417bd0cf8f9cacaa2f74b8e64d3c27ac493d17af909d3d43d6a29debde00e986e5eb2f5bf71c6c77dd290536e74f9ed6f2c8b16096a4cb0ffe499793ac7712e0db0805c8fdb8a54221d6750401af754437a80d28777e6fab15cb9d2b96482e8589254042224a3c8527f7594b5b3f1"}}]}]}]}, 0x6cc}, 0x1, 0x0, 0x0, 0xc0}, 0x82) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000140)={@private0, r4}, 0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000bc0)=0xe8) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000001100)={'syztnl2\x00', &(0x7f0000001080)={'syztnl0\x00', 0x0, 0x20, 0x20, 0xffff99d5, 0x81000000, {{0x11, 0x4, 0x0, 0x10, 0x44, 0x64, 0x0, 0xfe, 0x0, 0x0, @private=0xa010100, @local, {[@rr={0x7, 0xf, 0xad, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @noop, @end, @end, @end, @ssrr={0x89, 0x1b, 0x1a, [@private=0xa010102, @empty, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000011c0)={'ip6_vti0\x00', &(0x7f0000001140)={'ip6_vti0\x00', 0x0, 0x2f, 0xdb, 0x0, 0xffffffff, 0x11, @mcast1, @dev={0xfe, 0x80, '\x00', 0xa}, 0x10, 0x40, 0x5}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000140)={@private0, r8}, 0x14) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000001480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001440)={&(0x7f0000001200)={0x22c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x22c}, 0x1, 0x0, 0x0, 0x24004891}, 0xc044) r9 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r12 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r9, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r12, r11, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r9, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:04:36 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x2000, 0x0, 0x0, 0x0) 07:04:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000000)=""/234, &(0x7f0000000100)=0xea) syz_mount_image$ext4(&(0x7f0000001e40)='ext4\x00', &(0x7f0000001e80)='./file0\x00', 0x300, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB='$']) 07:04:36 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 100) [ 1644.945951] loop7: detected capacity change from 0 to 512 [ 1644.960537] EXT4-fs (loop7): unable to read superblock 07:04:36 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) [ 1645.031342] FAULT_INJECTION: forcing a failure. [ 1645.031342] name failslab, interval 1, probability 0, space 0, times 0 [ 1645.033843] CPU: 1 PID: 8612 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 1645.035289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1645.037038] Call Trace: [ 1645.037599] dump_stack+0x107/0x167 [ 1645.038392] should_fail.cold+0x5/0xa [ 1645.039198] should_failslab+0x5/0x20 [ 1645.040014] kmem_cache_alloc_bulk+0x4b/0x320 [ 1645.040973] io_submit_sqes+0x6fe6/0x8610 [ 1645.041880] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1645.042934] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1645.043951] ? find_held_lock+0x2c/0x110 [ 1645.044819] ? io_submit_sqes+0x8610/0x8610 [ 1645.045746] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1645.046773] ? wait_for_completion_io+0x270/0x270 [ 1645.047785] ? rcu_read_lock_any_held+0x75/0xa0 [ 1645.048762] ? vfs_write+0x354/0xb10 [ 1645.049550] ? fput_many+0x2f/0x1a0 [ 1645.050324] ? ksys_write+0x1a9/0x260 [ 1645.051125] ? __ia32_sys_read+0xb0/0xb0 [ 1645.051982] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1645.053092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1645.054181] do_syscall_64+0x33/0x40 [ 1645.054982] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1645.056060] RIP: 0033:0x7f7015fcab19 [ 1645.056853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1645.060745] RSP: 002b:00007f7013540188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1645.062356] RAX: ffffffffffffffda RBX: 00007f70160ddf60 RCX: 00007f7015fcab19 [ 1645.063873] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1645.065374] RBP: 00007f70135401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1645.066897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1645.068395] R13: 00007ffd0b73969f R14: 00007f7013540300 R15: 0000000000022000 [ 1645.099261] FAULT_INJECTION: forcing a failure. [ 1645.099261] name failslab, interval 1, probability 0, space 0, times 0 [ 1645.101952] CPU: 1 PID: 8614 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1645.103687] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1645.105454] Call Trace: [ 1645.106012] dump_stack+0x107/0x167 [ 1645.106796] should_fail.cold+0x5/0xa [ 1645.107601] ? getname_flags.part.0+0x50/0x4f0 [ 1645.108559] should_failslab+0x5/0x20 [ 1645.109364] kmem_cache_alloc+0x5b/0x310 [ 1645.110469] ? strncpy_from_user+0x9e/0x470 [ 1645.111389] getname_flags.part.0+0x50/0x4f0 [ 1645.112315] getname_flags+0x9a/0xe0 [ 1645.113107] __x64_sys_rename+0x65/0xa0 [ 1645.113947] do_syscall_64+0x33/0x40 [ 1645.114739] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1645.115811] RIP: 0033:0x7ff571175b19 [ 1645.116595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1645.120454] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1645.122061] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1645.123580] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1645.125082] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1645.126587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1645.128085] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 07:04:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 5) 07:04:50 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:04:50 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:04:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 4) 07:04:50 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf73", 0xdc, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x101, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x144, 0x0, 0x8, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='loor0\x00\x00\x00\x00\x00\x00'], &(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000180)='coda\x00', 0x28000, &(0x7f00000001c0)='$\x00') mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0) 07:04:50 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) fcntl$addseals(r4, 0x409, 0xa) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101300, 0x0) r7 = syz_io_uring_setup(0x21, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r6}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r7, 0x12, 0x0, r8) syz_io_uring_submit(r3, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x1, {0x0, r8}}, 0x0) 07:04:50 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xeaff, 0x0, 0x0, 0x0) [ 1658.942362] FAULT_INJECTION: forcing a failure. [ 1658.942362] name failslab, interval 1, probability 0, space 0, times 0 [ 1658.944021] CPU: 0 PID: 8634 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1658.944870] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1658.945915] Call Trace: [ 1658.946241] dump_stack+0x107/0x167 [ 1658.946691] should_fail.cold+0x5/0xa [ 1658.947143] ? create_object.isra.0+0x3a/0xa20 [ 1658.947678] should_failslab+0x5/0x20 [ 1658.948127] kmem_cache_alloc+0x5b/0x310 [ 1658.948615] create_object.isra.0+0x3a/0xa20 [ 1658.949138] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1658.949753] kmem_cache_alloc+0x159/0x310 [ 1658.950247] mb_cache_entry_create+0xbf/0x910 [ 1658.950826] ext4_xattr_get+0x563/0xa00 [ 1658.951300] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1658.951849] ? xattr_resolve_name+0x26e/0x3e0 [ 1658.952381] ? ext4_xattr_security_set+0x40/0x40 [ 1658.952944] __vfs_getxattr+0xe3/0x150 [ 1658.953413] ? __vfs_setxattr+0x180/0x180 [ 1658.953911] ? igrab+0xc0/0xc0 [ 1658.954288] ? ext4_xattr_security_set+0x40/0x40 [ 1658.954864] cap_inode_need_killpriv+0x3c/0x60 [ 1658.955408] security_inode_need_killpriv+0x46/0xa0 [ 1658.955994] notify_change+0x886/0x1160 [ 1658.956472] file_remove_privs+0x364/0x520 [ 1658.957014] ? inode_set_ctime_current+0xa0/0xa0 [ 1658.957576] ? generic_write_checks+0x2ad/0x390 [ 1658.958129] ? down_write+0xe0/0x160 [ 1658.958578] ? down_write_killable+0x180/0x180 [ 1658.959125] file_modified+0x14/0xa0 [ 1658.959563] ext4_file_write_iter+0x8f8/0x1530 [ 1658.960115] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1658.960672] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1658.961305] new_sync_write+0x42c/0x660 [ 1658.961781] ? new_sync_read+0x6f0/0x6f0 [ 1658.962291] ? ksys_write+0x12d/0x260 [ 1658.962763] ? lock_release+0x680/0x680 [ 1658.963237] ? avc_policy_seqno+0x9/0x70 [ 1658.963747] ? selinux_file_permission+0x92/0x520 [ 1658.964341] vfs_write+0x7c0/0xb10 [ 1658.964775] ksys_write+0x12d/0x260 [ 1658.965205] ? __ia32_sys_read+0xb0/0xb0 [ 1658.965686] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1658.966305] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1658.966959] do_syscall_64+0x33/0x40 [ 1658.967404] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1658.968017] RIP: 0033:0x7f692f402b19 [ 1658.968460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1658.970652] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1658.971572] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1658.972475] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1658.973368] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1658.974258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1658.975188] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 [ 1658.985484] FAULT_INJECTION: forcing a failure. [ 1658.985484] name failslab, interval 1, probability 0, space 0, times 0 [ 1658.988175] CPU: 1 PID: 8625 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1658.989639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1658.991444] Call Trace: [ 1658.992028] dump_stack+0x107/0x167 [ 1658.992806] should_fail.cold+0x5/0xa [ 1658.993642] ? create_object.isra.0+0x3a/0xa20 [ 1658.994649] should_failslab+0x5/0x20 [ 1658.995475] kmem_cache_alloc+0x5b/0x310 [ 1658.996353] create_object.isra.0+0x3a/0xa20 [ 1658.997302] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1658.998406] kmem_cache_alloc+0x159/0x310 [ 1658.999317] ? strncpy_from_user+0x9e/0x470 [ 1659.000376] getname_flags.part.0+0x50/0x4f0 [ 1659.001445] getname_flags+0x9a/0xe0 [ 1659.002256] __x64_sys_rename+0x65/0xa0 [ 1659.003132] do_syscall_64+0x33/0x40 [ 1659.003914] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1659.005019] RIP: 0033:0x7ff571175b19 [ 1659.005810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.009737] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1659.011393] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1659.012929] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1659.014611] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1659.016474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1659.018018] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 [ 1659.046088] FAULT_INJECTION: forcing a failure. [ 1659.046088] name failslab, interval 1, probability 0, space 0, times 0 07:04:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 5) [ 1659.049194] CPU: 1 PID: 8624 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1659.050695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.052430] Call Trace: [ 1659.052992] dump_stack+0x107/0x167 [ 1659.053768] should_fail.cold+0x5/0xa [ 1659.054579] ? jbd2__journal_start+0x190/0x7e0 [ 1659.055536] should_failslab+0x5/0x20 [ 1659.056341] kmem_cache_alloc+0x5b/0x310 [ 1659.057199] ? _down_write_nest_lock+0x160/0x160 [ 1659.058199] jbd2__journal_start+0x190/0x7e0 [ 1659.059133] __ext4_journal_start_sb+0x214/0x390 [ 1659.060179] ext4_xattr_set+0x23a/0x340 [ 1659.061053] ? ext4_xattr_set_credits+0x200/0x200 [ 1659.062091] ? _down_write_nest_lock+0x160/0x160 [ 1659.063127] ? xattr_resolve_name+0x26e/0x3e0 [ 1659.064130] ? ext4_initxattrs+0x120/0x120 [ 1659.065053] __vfs_removexattr+0xf9/0x170 [ 1659.065930] ? __vfs_getxattr+0x150/0x150 [ 1659.066845] cap_inode_killpriv+0x19/0x50 [ 1659.067739] security_inode_killpriv+0x46/0xa0 [ 1659.068745] setattr_prepare+0x19f/0x7c0 [ 1659.069609] ext4_setattr+0x199/0x20f0 [ 1659.070441] ? igrab+0xc0/0xc0 [ 1659.071114] ? ext4_xattr_security_set+0x40/0x40 [ 1659.072127] ? ext4_journalled_write_end+0x1190/0x1190 [ 1659.073223] notify_change+0xc28/0x1160 [ 1659.074065] file_remove_privs+0x364/0x520 [ 1659.074957] ? inode_set_ctime_current+0xa0/0xa0 [ 1659.075948] ? generic_write_checks+0x2ad/0x390 [ 1659.076938] ? down_write+0xe0/0x160 [ 1659.077715] ? down_write_killable+0x180/0x180 [ 1659.078681] file_modified+0x14/0xa0 [ 1659.079465] ext4_file_write_iter+0x8f8/0x1530 [ 1659.080434] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1659.081403] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1659.082527] new_sync_write+0x42c/0x660 [ 1659.083362] ? new_sync_read+0x6f0/0x6f0 [ 1659.084217] ? ksys_write+0x12d/0x260 [ 1659.085023] ? lock_release+0x680/0x680 [ 1659.085859] ? avc_policy_seqno+0x9/0x70 [ 1659.086725] ? selinux_file_permission+0x92/0x520 [ 1659.087752] vfs_write+0x7c0/0xb10 [ 1659.088509] ksys_write+0x12d/0x260 [ 1659.089274] ? __ia32_sys_read+0xb0/0xb0 [ 1659.090138] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.091246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.092336] do_syscall_64+0x33/0x40 [ 1659.093118] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1659.094204] RIP: 0033:0x7fcaf76dab19 [ 1659.095003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.098869] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1659.100472] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1659.101970] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1659.103476] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1659.104966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1659.106465] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 [ 1659.113266] FAULT_INJECTION: forcing a failure. [ 1659.113266] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.114795] CPU: 0 PID: 8642 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1659.115597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.116570] Call Trace: [ 1659.116891] dump_stack+0x107/0x167 [ 1659.117330] should_fail.cold+0x5/0xa [ 1659.117787] ? jbd2__journal_start+0x190/0x7e0 [ 1659.118326] should_failslab+0x5/0x20 [ 1659.118783] kmem_cache_alloc+0x5b/0x310 [ 1659.119269] ? _down_write_nest_lock+0x160/0x160 [ 1659.119829] jbd2__journal_start+0x190/0x7e0 [ 1659.120350] __ext4_journal_start_sb+0x214/0x390 [ 1659.120919] ext4_xattr_set+0x23a/0x340 [ 1659.121402] ? ext4_xattr_set_credits+0x200/0x200 [ 1659.121968] ? _down_write_nest_lock+0x160/0x160 [ 1659.122539] ? xattr_resolve_name+0x26e/0x3e0 [ 1659.123068] ? ext4_initxattrs+0x120/0x120 [ 1659.123569] __vfs_removexattr+0xf9/0x170 [ 1659.124062] ? __vfs_getxattr+0x150/0x150 [ 1659.124559] cap_inode_killpriv+0x19/0x50 [ 1659.125046] security_inode_killpriv+0x46/0xa0 [ 1659.125588] setattr_prepare+0x19f/0x7c0 [ 1659.126082] ext4_setattr+0x199/0x20f0 [ 1659.126553] ? igrab+0xc0/0xc0 [ 1659.126934] ? ext4_xattr_security_set+0x40/0x40 [ 1659.127508] ? ext4_journalled_write_end+0x1190/0x1190 [ 1659.128130] notify_change+0xc28/0x1160 [ 1659.128606] file_remove_privs+0x364/0x520 [ 1659.129108] ? inode_set_ctime_current+0xa0/0xa0 [ 1659.129667] ? generic_write_checks+0x2ad/0x390 [ 1659.130222] ? down_write+0xe0/0x160 [ 1659.130675] ? down_write_killable+0x180/0x180 [ 1659.131222] file_modified+0x14/0xa0 [ 1659.131667] ext4_file_write_iter+0x8f8/0x1530 [ 1659.132225] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1659.132771] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1659.133403] new_sync_write+0x42c/0x660 [ 1659.133880] ? new_sync_read+0x6f0/0x6f0 [ 1659.134359] ? ksys_write+0x12d/0x260 [ 1659.134823] ? lock_release+0x680/0x680 [ 1659.135295] ? avc_policy_seqno+0x9/0x70 [ 1659.135779] ? selinux_file_permission+0x92/0x520 [ 1659.136369] vfs_write+0x7c0/0xb10 [ 1659.136795] ksys_write+0x12d/0x260 [ 1659.137234] ? __ia32_sys_read+0xb0/0xb0 [ 1659.137721] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.138339] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.138960] do_syscall_64+0x33/0x40 [ 1659.139401] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1659.140003] RIP: 0033:0x7f692f402b19 [ 1659.140442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.142624] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1659.143533] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1659.144380] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1659.145217] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1659.146068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1659.146913] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 07:04:50 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:04:50 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:04:50 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf73", 0xdc, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:50 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000040)={0x8, 'sit0\x00', {'veth0_virt_wifi\x00'}, 0x24ad}) r1 = fcntl$dupfd(r0, 0x0, r0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101300, 0x0) r5 = syz_io_uring_setup(0x21, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r4}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r5, 0x12, 0x0, r6) syz_io_uring_submit(r2, 0x0, &(0x7f00000000c0)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, r1, 0x0, &(0x7f0000000080)='./file0\x00', 0x11, 0x200000, 0x12345, {0x0, r6}}, 0xd2a) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20044041) 07:04:50 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xffea, 0x0, 0x0, 0x0) 07:04:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 6) 07:04:50 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a", 0xe3, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:04:50 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1659.298233] FAULT_INJECTION: forcing a failure. [ 1659.298233] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.299712] CPU: 0 PID: 8660 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1659.300513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.301504] Call Trace: [ 1659.301824] dump_stack+0x107/0x167 [ 1659.302255] should_fail.cold+0x5/0xa [ 1659.302722] ? create_object.isra.0+0x3a/0xa20 [ 1659.303259] should_failslab+0x5/0x20 [ 1659.303714] kmem_cache_alloc+0x5b/0x310 [ 1659.304199] create_object.isra.0+0x3a/0xa20 [ 1659.304716] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1659.305464] kmem_cache_alloc+0x159/0x310 [ 1659.306037] ? _down_write_nest_lock+0x160/0x160 [ 1659.306656] jbd2__journal_start+0x190/0x7e0 [ 1659.307178] __ext4_journal_start_sb+0x214/0x390 [ 1659.307745] ext4_xattr_set+0x23a/0x340 [ 1659.308220] ? ext4_xattr_set_credits+0x200/0x200 [ 1659.308783] ? _down_write_nest_lock+0x160/0x160 [ 1659.309345] ? xattr_resolve_name+0x26e/0x3e0 [ 1659.309880] ? ext4_initxattrs+0x120/0x120 [ 1659.310382] __vfs_removexattr+0xf9/0x170 [ 1659.310893] ? __vfs_getxattr+0x150/0x150 [ 1659.311392] cap_inode_killpriv+0x19/0x50 [ 1659.311889] security_inode_killpriv+0x46/0xa0 [ 1659.312467] setattr_prepare+0x19f/0x7c0 [ 1659.312962] ext4_setattr+0x199/0x20f0 [ 1659.313420] ? igrab+0xc0/0xc0 [ 1659.313799] ? ext4_xattr_security_set+0x40/0x40 [ 1659.314391] ? ext4_journalled_write_end+0x1190/0x1190 [ 1659.315027] notify_change+0xc28/0x1160 [ 1659.315502] file_remove_privs+0x364/0x520 [ 1659.316029] ? inode_set_ctime_current+0xa0/0xa0 [ 1659.316595] ? generic_write_checks+0x2ad/0x390 [ 1659.317148] ? down_write+0xe0/0x160 [ 1659.317594] ? down_write_killable+0x180/0x180 [ 1659.318166] file_modified+0x14/0xa0 [ 1659.318651] ext4_file_write_iter+0x8f8/0x1530 [ 1659.319203] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1659.319743] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.320399] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1659.321040] ? trace_hardirqs_on+0x5b/0x180 [ 1659.321554] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1659.322197] new_sync_write+0x42c/0x660 [ 1659.322682] ? new_sync_read+0x6f0/0x6f0 [ 1659.323168] ? lock_release+0x680/0x680 [ 1659.323635] ? avc_policy_seqno+0x9/0x70 [ 1659.324112] ? selinux_file_permission+0x92/0x520 [ 1659.324698] vfs_write+0x7c0/0xb10 [ 1659.325126] ksys_write+0x12d/0x260 [ 1659.325566] ? __ia32_sys_read+0xb0/0xb0 [ 1659.326052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.326685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.327295] do_syscall_64+0x33/0x40 [ 1659.327765] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1659.328371] RIP: 0033:0x7fcaf76dab19 [ 1659.328858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.331034] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1659.331931] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1659.332777] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1659.333676] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1659.334532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1659.335433] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 [ 1659.421404] FAULT_INJECTION: forcing a failure. [ 1659.421404] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1659.424135] CPU: 1 PID: 8668 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1659.425847] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.427648] Call Trace: [ 1659.428226] dump_stack+0x107/0x167 [ 1659.429007] should_fail.cold+0x5/0xa [ 1659.429820] strncpy_from_user+0x34/0x470 [ 1659.430746] getname_flags.part.0+0x95/0x4f0 [ 1659.431710] getname_flags+0x9a/0xe0 [ 1659.432507] __x64_sys_rename+0x65/0xa0 [ 1659.433363] do_syscall_64+0x33/0x40 [ 1659.434175] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1659.435278] RIP: 0033:0x7ff571175b19 [ 1659.436081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.440035] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1659.441650] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1659.443209] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1659.444739] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1659.446287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1659.447852] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 07:05:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 6) 07:05:06 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 7) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:05:06 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a", 0xe3, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:05:06 executing program 5: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@initdev, @in=@local}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) recvmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000000500), 0x6e, &(0x7f0000001780)=[{&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/88, 0x58}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/34, 0x22}, {&(0x7f0000001680)=""/253, 0xfd}], 0x5, &(0x7f0000001800)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88}, 0x140) getresuid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)=0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x1, &(0x7f0000000240)=[{&(0x7f0000001900)="b8a45a270f2f4de239970b130c7bfe4431ff5461dae55dedbcb57d73edf76259dc84cade5619ed13fd468aaaf8727cac0bd3f8ae7f74e303f67c2a2c155788af3b9543f82cb2f247611bb95bcf721f0cdd817519f5f8b410df336d244e0d304883143ce480cb54fbae9e4ff5f5cca062c17630ca797111dce01dbfc900cd01accfad16e1ef34c39cc100360bd833804b7acfb6f4a5eaa6b888952944720eb1ff26ca5772988b20bc5cd08f31bfaccbbf5d9402e57da163a818ef02d8bae59a372821e7117b17e4a9a4a1b10cd00b80bbfd9112a22c9a6c706dac5a9d8ae17e50eb5cc03371aa175c7b8757fe8dcf92ec29cbefe9ed45d49b599b735603d616274ea62e55399dbf3e7e", 0x109, 0x3f}], 0x40001, &(0x7f0000001b00)={[{@noauto_da_alloc}, {@abort}, {@discard}, {@jqfmt_vfsold}, {@usrquota}, {@journal_async_commit}, {@nobarrier}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@dioread_lock}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x7}}], [{@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@obj_user={'obj_user', 0x3d, '\x00'}}, {@fowner_lt}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@fowner_lt={'fowner<', 0xee00}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:05:06 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xea, 0x0, 0x0, 0x0) 07:05:06 executing program 7: setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x36, 0x5, 0x8, "3a037607e4c442cbedc63aadb6d98029", "0c61cecd5ef11864d7a20cefc6e76d8a78f4bee5cce8f05e69ec9999da3ba20ab5"}, 0x36, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.metadata\x00', &(0x7f0000000200)=""/116, 0x74) pwrite64(r1, &(0x7f0000000140)="af", 0x1, 0xffffff) write$P9_RREADDIR(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="700000002900a52d2c4000"], 0xb) fallocate(r0, 0x3, 0x0, 0x8000) 07:05:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 7) 07:05:06 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x200000, 0x0, 0x0, 0x0) [ 1675.352191] FAULT_INJECTION: forcing a failure. [ 1675.352191] name failslab, interval 1, probability 0, space 0, times 0 [ 1675.355943] CPU: 0 PID: 8676 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1675.357718] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1675.359630] Call Trace: [ 1675.360242] dump_stack+0x107/0x167 [ 1675.361081] should_fail.cold+0x5/0xa [ 1675.361957] ? create_object.isra.0+0x3a/0xa20 [ 1675.363012] should_failslab+0x5/0x20 [ 1675.363883] kmem_cache_alloc+0x5b/0x310 [ 1675.364819] create_object.isra.0+0x3a/0xa20 [ 1675.365827] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1675.367004] kmem_cache_alloc+0x159/0x310 [ 1675.367951] ? _down_write_nest_lock+0x160/0x160 [ 1675.369046] jbd2__journal_start+0x190/0x7e0 [ 1675.370057] __ext4_journal_start_sb+0x214/0x390 [ 1675.371155] ext4_xattr_set+0x23a/0x340 [ 1675.372081] ? ext4_xattr_set_credits+0x200/0x200 [ 1675.373180] ? _down_write_nest_lock+0x160/0x160 [ 1675.374266] ? xattr_resolve_name+0x26e/0x3e0 [ 1675.375303] ? ext4_initxattrs+0x120/0x120 [ 1675.376274] __vfs_removexattr+0xf9/0x170 [ 1675.377224] ? __vfs_getxattr+0x150/0x150 [ 1675.378187] cap_inode_killpriv+0x19/0x50 [ 1675.379156] security_inode_killpriv+0x46/0xa0 [ 1675.380201] setattr_prepare+0x19f/0x7c0 [ 1675.381138] ext4_setattr+0x199/0x20f0 [ 1675.382026] ? igrab+0xc0/0xc0 [ 1675.382771] ? ext4_xattr_security_set+0x40/0x40 [ 1675.383860] ? ext4_journalled_write_end+0x1190/0x1190 [ 1675.385060] notify_change+0xc28/0x1160 [ 1675.385981] file_remove_privs+0x364/0x520 [ 1675.387241] ? inode_set_ctime_current+0xa0/0xa0 [ 1675.388538] ? generic_write_checks+0x2ad/0x390 [ 1675.389810] ? down_write+0xe0/0x160 [ 1675.390847] ? down_write_killable+0x180/0x180 [ 1675.392016] file_modified+0x14/0xa0 [ 1675.392871] ext4_file_write_iter+0x8f8/0x1530 [ 1675.393931] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1675.394996] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1675.396208] new_sync_write+0x42c/0x660 [ 1675.397122] ? new_sync_read+0x6f0/0x6f0 [ 1675.398051] ? ksys_write+0x12d/0x260 [ 1675.398938] ? lock_release+0x680/0x680 [ 1675.399860] ? avc_policy_seqno+0x9/0x70 [ 1675.400793] ? selinux_file_permission+0x92/0x520 [ 1675.401922] vfs_write+0x7c0/0xb10 [ 1675.402755] ksys_write+0x12d/0x260 [ 1675.403591] ? __ia32_sys_read+0xb0/0xb0 [ 1675.404527] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1675.405737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1675.406939] do_syscall_64+0x33/0x40 [ 1675.407800] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1675.408981] RIP: 0033:0x7f692f402b19 [ 1675.409845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.414101] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1675.415862] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1675.417513] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1675.419170] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1675.420819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1675.422470] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 07:05:06 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a", 0xe3, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1675.456665] FAULT_INJECTION: forcing a failure. [ 1675.456665] name failslab, interval 1, probability 0, space 0, times 0 [ 1675.459878] CPU: 1 PID: 8690 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1675.461313] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1675.463091] Call Trace: [ 1675.463653] dump_stack+0x107/0x167 [ 1675.464430] should_fail.cold+0x5/0xa [ 1675.465240] ? create_object.isra.0+0x3a/0xa20 [ 1675.466203] should_failslab+0x5/0x20 [ 1675.467019] kmem_cache_alloc+0x5b/0x310 [ 1675.467882] create_object.isra.0+0x3a/0xa20 [ 1675.468821] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1675.469903] kmem_cache_alloc+0x159/0x310 [ 1675.470796] ? jbd2_journal_put_journal_head+0x38a/0x560 [ 1675.471950] insert_revoke_hash+0x28/0x270 [ 1675.472854] jbd2_journal_revoke+0x2bb/0x570 [ 1675.473786] __ext4_forget+0x218/0x3e0 [ 1675.474632] ext4_free_blocks+0x2d0/0x21f0 [ 1675.475541] ? jbd2_write_access_granted+0x210/0x3d0 [ 1675.476616] ? lock_downgrade+0x6d0/0x6d0 [ 1675.477504] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 1675.478483] ? chksum_update+0x4c/0xb0 [ 1675.479322] ? jbd2_write_access_granted+0x60/0x3d0 [ 1675.480389] ? wake_up_var+0x120/0x120 [ 1675.481233] ext4_xattr_release_block+0x3a3/0x910 [ 1675.482280] ext4_xattr_block_set+0x1f99/0x3040 [ 1675.483287] ? mark_held_locks+0x9e/0xe0 [ 1675.484161] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 1675.485200] ? xattr_find_entry+0x2aa/0x3b0 [ 1675.486128] ? ext4_xattr_block_find+0x5c/0x6a0 [ 1675.487139] ext4_xattr_set_handle+0x1037/0x1320 [ 1675.488159] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 1675.489149] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1675.490234] ? trace_hardirqs_on+0x5b/0x180 [ 1675.491212] ? __ext4_journal_start_sb+0x214/0x390 [ 1675.492296] ? __ext4_journal_start_sb+0x1db/0x390 [ 1675.493383] ext4_xattr_set+0x13a/0x340 [ 1675.494279] ? ext4_xattr_set_credits+0x200/0x200 [ 1675.495346] ? _down_write_nest_lock+0x160/0x160 [ 1675.496394] ? xattr_resolve_name+0x26e/0x3e0 [ 1675.497386] ? ext4_initxattrs+0x120/0x120 [ 1675.498317] __vfs_removexattr+0xf9/0x170 [ 1675.499238] ? __vfs_getxattr+0x150/0x150 [ 1675.500165] cap_inode_killpriv+0x19/0x50 [ 1675.501073] security_inode_killpriv+0x46/0xa0 [ 1675.502079] setattr_prepare+0x19f/0x7c0 [ 1675.502981] ext4_setattr+0x199/0x20f0 [ 1675.503838] ? igrab+0xc0/0xc0 [ 1675.504541] ? ext4_xattr_security_set+0x40/0x40 [ 1675.505595] ? ext4_journalled_write_end+0x1190/0x1190 [ 1675.506943] notify_change+0xc28/0x1160 [ 1675.507834] file_remove_privs+0x364/0x520 [ 1675.508761] ? inode_set_ctime_current+0xa0/0xa0 [ 1675.509804] ? generic_write_checks+0x2ad/0x390 [ 1675.510844] ? down_write+0xe0/0x160 [ 1675.511660] ? down_write_killable+0x180/0x180 [ 1675.512669] file_modified+0x14/0xa0 [ 1675.513486] ext4_file_write_iter+0x8f8/0x1530 [ 1675.514503] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1675.515523] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1675.516686] new_sync_write+0x42c/0x660 [ 1675.517564] ? new_sync_read+0x6f0/0x6f0 [ 1675.518458] ? ksys_write+0x12d/0x260 [ 1675.519307] ? lock_release+0x680/0x680 [ 1675.520179] ? avc_policy_seqno+0x9/0x70 [ 1675.521064] ? selinux_file_permission+0x92/0x520 [ 1675.522134] vfs_write+0x7c0/0xb10 [ 1675.522926] ksys_write+0x12d/0x260 [ 1675.523719] ? __ia32_sys_read+0xb0/0xb0 [ 1675.524606] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1675.525747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1675.526881] do_syscall_64+0x33/0x40 [ 1675.527692] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1675.528808] RIP: 0033:0x7fcaf76dab19 [ 1675.529620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.533637] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1675.535302] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1675.536857] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1675.538410] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1675.539974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1675.541527] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 07:05:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 7) [ 1675.570040] FAULT_INJECTION: forcing a failure. [ 1675.570040] name failslab, interval 1, probability 0, space 0, times 0 [ 1675.572998] CPU: 1 PID: 8688 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1675.574483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1675.576295] Call Trace: [ 1675.576872] dump_stack+0x107/0x167 [ 1675.577664] should_fail.cold+0x5/0xa [ 1675.578491] ? jbd2__journal_start+0x190/0x7e0 [ 1675.579489] should_failslab+0x5/0x20 [ 1675.580317] kmem_cache_alloc+0x5b/0x310 [ 1675.581197] ? ext4_dx_find_entry+0x600/0x600 [ 1675.582175] jbd2__journal_start+0x190/0x7e0 [ 1675.583147] __ext4_journal_start_sb+0x214/0x390 [ 1675.584186] ext4_rename+0x96d/0x2bc0 [ 1675.585025] ? ext4_tmpfile+0x440/0x440 [ 1675.585894] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1675.587052] ? lock_acquire+0x197/0x470 [ 1675.587915] ? vfs_rename+0xc68/0x1510 [ 1675.588776] ? lockref_get+0x11/0x50 [ 1675.589591] ? find_held_lock+0x2c/0x110 [ 1675.590485] ? down_write+0xe0/0x160 [ 1675.591309] ext4_rename2+0x1af/0x240 [ 1675.592139] vfs_rename+0xd6c/0x1510 [ 1675.592955] ? vfs_unlink+0x8b0/0x8b0 [ 1675.593798] ? lookup_dcache+0x65/0x130 [ 1675.594677] do_renameat2+0xae1/0xbf0 [ 1675.595529] ? __ia32_sys_link+0x80/0x80 [ 1675.596417] ? __virt_addr_valid+0x170/0x5d0 [ 1675.597371] ? __check_object_size+0x319/0x440 [ 1675.598394] __x64_sys_rename+0x7d/0xa0 [ 1675.599270] do_syscall_64+0x33/0x40 [ 1675.600080] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1675.601187] RIP: 0033:0x7ff571175b19 [ 1675.601992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.605973] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1675.607633] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1675.609178] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1675.610734] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1675.612270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1675.613840] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 [ 1675.725456] FAULT_INJECTION: forcing a failure. [ 1675.725456] name failslab, interval 1, probability 0, space 0, times 0 [ 1675.728200] CPU: 1 PID: 8703 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1675.729679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1675.731494] Call Trace: [ 1675.732071] dump_stack+0x107/0x167 [ 1675.732863] should_fail.cold+0x5/0xa [ 1675.733691] ? create_object.isra.0+0x3a/0xa20 [ 1675.734687] should_failslab+0x5/0x20 [ 1675.735511] kmem_cache_alloc+0x5b/0x310 [ 1675.736393] create_object.isra.0+0x3a/0xa20 [ 1675.737338] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1675.738443] kmem_cache_alloc+0x159/0x310 [ 1675.739352] ? jbd2_journal_put_journal_head+0x38a/0x560 [ 1675.740528] insert_revoke_hash+0x28/0x270 [ 1675.741448] jbd2_journal_revoke+0x2bb/0x570 [ 1675.742405] __ext4_forget+0x218/0x3e0 [ 1675.743259] ext4_free_blocks+0x2d0/0x21f0 [ 1675.744179] ? jbd2_write_access_granted+0x210/0x3d0 [ 1675.745277] ? lock_downgrade+0x6d0/0x6d0 [ 1675.746176] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1675.747367] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 1675.748378] ? jbd2_write_access_granted+0x60/0x3d0 07:05:07 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x2000, 0x0, 0x0, 0x0) 07:05:07 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000340)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0600000000000000000100000008000100000000000800020001"], 0x54}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc}, 0x14}}, 0x8004) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = getpgrp(0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xff, 0x0, 0x0, 0x81, 0x0, 0x8001, 0x86010, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffc, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0xc225, 0x7, 0x6, 0x2, 0x0, 0x8, 0x2cec, 0x0, 0x4, 0x0, 0x13d}, r3, 0x1, 0xffffffffffffffff, 0x2) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000740)=ANY=[@ANYBLOB="18000000407866ed531d155c051a4c908ff72c33ac72ce5ee6b37ee6508e7db620bf63f5d5d2c038f4bf2e0b", @ANYRESDEC=r3, @ANYBLOB="0b0b00000000000000000100000004000180708870b47428d9e93cbe10052b42cf760d55eae7b4b2083e8f916369eaf9a5431cc1b3e475589bdc6c6731f14356f4b8bdb5fd2fe1dceadd7c2b0cbbc2c30e7fdb26aa2bf9c6798f343e858d6495c4800d00158d3ed8c37ca2"], 0x18}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x194, 0x7e2e}}, './file1\x00'}) r6 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r7, &(0x7f0000001480)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)={0x40, r6, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xff}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)={0x48, r6, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r7, {0xffffffffffffffff, 0xffffffffffffffff}}, './file1\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r8, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x600000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0x100, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf2f3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2232}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd50}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}]}, @TIPC_NLA_BEARER={0x78, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @loopback, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e24, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x454e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000}, 0x4004804) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f00000012c0)=ANY=[@ANYRES16, @ANYRES32, @ANYBLOB="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"]) [ 1675.749690] ? wake_up_var+0x120/0x120 [ 1675.750701] ext4_xattr_release_block+0x3a3/0x910 [ 1675.751744] ext4_xattr_block_set+0x1f99/0x3040 [ 1675.752732] ? mark_held_locks+0x9e/0xe0 [ 1675.753598] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 1675.754638] ? xattr_find_entry+0x2aa/0x3b0 [ 1675.755558] ? ext4_xattr_block_find+0x5c/0x6a0 [ 1675.756543] ext4_xattr_set_handle+0x1037/0x1320 [ 1675.757554] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 1675.758534] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1675.759629] ? trace_hardirqs_on+0x5b/0x180 [ 1675.760566] ? __ext4_journal_start_sb+0x214/0x390 [ 1675.761595] ? __ext4_journal_start_sb+0x1db/0x390 [ 1675.762641] ext4_xattr_set+0x13a/0x340 [ 1675.763491] ? ext4_xattr_set_credits+0x200/0x200 [ 1675.764501] ? _down_write_nest_lock+0x160/0x160 [ 1675.765505] ? xattr_resolve_name+0x26e/0x3e0 [ 1675.766448] ? ext4_initxattrs+0x120/0x120 [ 1675.767349] __vfs_removexattr+0xf9/0x170 [ 1675.768218] ? __vfs_getxattr+0x150/0x150 [ 1675.769101] cap_inode_killpriv+0x19/0x50 [ 1675.769975] security_inode_killpriv+0x46/0xa0 [ 1675.770940] setattr_prepare+0x19f/0x7c0 [ 1675.771799] ext4_setattr+0x199/0x20f0 [ 1675.772616] ? igrab+0xc0/0xc0 [ 1675.773289] ? ext4_xattr_security_set+0x40/0x40 [ 1675.774289] ? ext4_journalled_write_end+0x1190/0x1190 [ 1675.775398] notify_change+0xc28/0x1160 [ 1675.776243] file_remove_privs+0x364/0x520 [ 1675.777142] ? inode_set_ctime_current+0xa0/0xa0 [ 1675.778141] ? generic_write_checks+0x2ad/0x390 [ 1675.779127] ? down_write+0xe0/0x160 [ 1675.779912] ? down_write_killable+0x180/0x180 [ 1675.780886] file_modified+0x14/0xa0 [ 1675.781669] ext4_file_write_iter+0x8f8/0x1530 [ 1675.782657] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1675.783617] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1675.784733] new_sync_write+0x42c/0x660 [ 1675.785572] ? new_sync_read+0x6f0/0x6f0 [ 1675.786427] ? ksys_write+0x12d/0x260 [ 1675.787246] ? lock_release+0x680/0x680 [ 1675.788076] ? avc_policy_seqno+0x9/0x70 [ 1675.788926] ? selinux_file_permission+0x92/0x520 [ 1675.789961] vfs_write+0x7c0/0xb10 [ 1675.790729] ksys_write+0x12d/0x260 [ 1675.791501] ? __ia32_sys_read+0xb0/0xb0 [ 1675.792358] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1675.793457] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1675.794547] do_syscall_64+0x33/0x40 [ 1675.795334] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1675.796408] RIP: 0033:0x7f692f402b19 [ 1675.797187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.801043] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1675.802649] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1675.804142] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1675.805633] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1675.807149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1675.808661] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 [ 1675.838319] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1675.871834] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.7'. 07:05:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 8) 07:05:19 executing program 7: statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x400, &(0x7f0000000980)) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x19, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2000000000000000000000c7ee7c09010000000d791e7ae85200008cbb4f357e701ce18d29fd466e1a230997d5b89da43923d460aec47cd3906f4ccb9ac1aed86a7e598e00a3b1304162b8021cb52bb1ffcb21fc471261402eb8405ab686169335c92858b4985b8aef9038fffbdd919a8479e1ac8bb3cc71e9be666ef405533efb19084038aaeabe4ed67de7ce561094618662a335e405c87167ffa05269c1a3a5d0981e6650663f5f5d02d85eff1da999fcb33881ed0b76d3633e6f83be83d9d5aa1ed49ec3b7b3952e"], 0x20}}, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000280)='./binderfs2/custom1\x00', 0x800, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0x400, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_open_dev$mouse(&(0x7f0000000200), 0x5, 0x2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r0) mkdirat$cgroup(r3, &(0x7f0000000240)='syz0\x00', 0x1ff) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x1, {0x4, 0x0, 0x2}, [@typed={0x8, 0xc, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 07:05:19 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xeaff, 0x0, 0x0, 0x0) 07:05:19 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x20000000, 0x0, 0x0, 0x0) 07:05:19 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:05:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 8) 07:05:19 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) r7 = dup3(r0, 0xffffffffffffffff, 0x80000) r8 = fsopen(&(0x7f0000000040)='openpromfs\x00', 0x1) r9 = socket$packet(0x11, 0x3, 0x300) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000240), 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f00000001c0)={0x1f, 0x0, &(0x7f0000000140)=[r0, r0, r5, r7, r8, r9]}, 0x6) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:05:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a0", 0xe7, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1688.205800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8718 comm=syz-executor.7 [ 1688.215997] FAULT_INJECTION: forcing a failure. [ 1688.215997] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.216348] FAULT_INJECTION: forcing a failure. [ 1688.216348] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.218105] CPU: 1 PID: 8720 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1688.220866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1688.222191] Call Trace: [ 1688.222624] dump_stack+0x107/0x167 [ 1688.223226] should_fail.cold+0x5/0xa [ 1688.223846] ? create_object.isra.0+0x3a/0xa20 [ 1688.224573] should_failslab+0x5/0x20 [ 1688.225179] kmem_cache_alloc+0x5b/0x310 [ 1688.225831] create_object.isra.0+0x3a/0xa20 [ 1688.226528] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1688.227364] __kmalloc_track_caller+0x177/0x370 [ 1688.228109] ? ext4_xattr_block_set+0x897/0x3040 [ 1688.228876] kmemdup+0x23/0x50 [ 1688.229413] ext4_xattr_block_set+0x897/0x3040 [ 1688.230163] ? mark_held_locks+0x9e/0xe0 [ 1688.230834] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 1688.231612] ? xattr_find_entry+0x2aa/0x3b0 [ 1688.232329] ? ext4_xattr_block_find+0x5c/0x6a0 [ 1688.233079] ext4_xattr_set_handle+0x1037/0x1320 [ 1688.233854] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 1688.234619] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1688.235469] ? trace_hardirqs_on+0x5b/0x180 [ 1688.236181] ? __ext4_journal_start_sb+0x214/0x390 [ 1688.236960] ? __ext4_journal_start_sb+0x1db/0x390 [ 1688.237750] ext4_xattr_set+0x13a/0x340 [ 1688.238409] ? ext4_xattr_set_credits+0x200/0x200 [ 1688.239193] ? _down_write_nest_lock+0x160/0x160 [ 1688.239957] ? xattr_resolve_name+0x26e/0x3e0 [ 1688.240674] ? ext4_initxattrs+0x120/0x120 [ 1688.241346] __vfs_removexattr+0xf9/0x170 [ 1688.242038] ? __vfs_getxattr+0x150/0x150 [ 1688.242712] cap_inode_killpriv+0x19/0x50 [ 1688.243378] security_inode_killpriv+0x46/0xa0 [ 1688.244126] setattr_prepare+0x19f/0x7c0 [ 1688.244778] ext4_setattr+0x199/0x20f0 [ 1688.245396] ? igrab+0xc0/0xc0 [ 1688.245923] ? ext4_xattr_security_set+0x40/0x40 [ 1688.246685] ? ext4_journalled_write_end+0x1190/0x1190 [ 1688.247567] notify_change+0xc28/0x1160 [ 1688.248233] file_remove_privs+0x364/0x520 [ 1688.248933] ? inode_set_ctime_current+0xa0/0xa0 [ 1688.249716] ? generic_write_checks+0x2ad/0x390 [ 1688.250483] ? down_write+0xe0/0x160 [ 1688.251111] ? down_write_killable+0x180/0x180 [ 1688.251876] file_modified+0x14/0xa0 [ 1688.252491] ext4_file_write_iter+0x8f8/0x1530 [ 1688.253254] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1688.254015] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1688.254897] new_sync_write+0x42c/0x660 [ 1688.255552] ? new_sync_read+0x6f0/0x6f0 [ 1688.256233] ? ksys_write+0x12d/0x260 [ 1688.256866] ? lock_release+0x680/0x680 [ 1688.257520] ? avc_policy_seqno+0x9/0x70 [ 1688.258196] ? selinux_file_permission+0x92/0x520 [ 1688.259025] vfs_write+0x7c0/0xb10 [ 1688.259617] ksys_write+0x12d/0x260 [ 1688.260219] ? __ia32_sys_read+0xb0/0xb0 [ 1688.260899] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1688.261756] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1688.262601] do_syscall_64+0x33/0x40 [ 1688.263221] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1688.264061] RIP: 0033:0x7f692f402b19 [ 1688.264668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1688.267678] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1688.268928] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1688.270099] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1688.271273] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.272444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1688.273613] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 [ 1688.274831] CPU: 0 PID: 8730 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1688.275909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1688.277163] Call Trace: [ 1688.277571] dump_stack+0x107/0x167 [ 1688.278125] should_fail.cold+0x5/0xa [ 1688.278709] ? create_object.isra.0+0x3a/0xa20 [ 1688.279118] FAULT_INJECTION: forcing a failure. [ 1688.279118] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.279411] should_failslab+0x5/0x20 [ 1688.281774] kmem_cache_alloc+0x5b/0x310 [ 1688.282388] create_object.isra.0+0x3a/0xa20 [ 1688.283065] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1688.283839] __kmalloc_track_caller+0x177/0x370 [ 1688.284545] ? ext4_xattr_block_set+0x897/0x3040 [ 1688.285262] kmemdup+0x23/0x50 [ 1688.285751] ext4_xattr_block_set+0x897/0x3040 [ 1688.286451] ? mark_held_locks+0x9e/0xe0 [ 1688.287071] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 1688.287814] ? xattr_find_entry+0x2aa/0x3b0 [ 1688.288471] ? ext4_xattr_block_find+0x5c/0x6a0 [ 1688.289185] ext4_xattr_set_handle+0x1037/0x1320 [ 1688.289907] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 1688.290605] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1688.291397] ? trace_hardirqs_on+0x5b/0x180 [ 1688.292065] ? __ext4_journal_start_sb+0x214/0x390 [ 1688.292802] ? __ext4_journal_start_sb+0x1db/0x390 [ 1688.293541] ext4_xattr_set+0x13a/0x340 [ 1688.294154] ? ext4_xattr_set_credits+0x200/0x200 [ 1688.294890] ? _down_write_nest_lock+0x160/0x160 [ 1688.295626] ? xattr_resolve_name+0x26e/0x3e0 [ 1688.296302] ? ext4_initxattrs+0x120/0x120 [ 1688.296942] __vfs_removexattr+0xf9/0x170 [ 1688.297572] ? __vfs_getxattr+0x150/0x150 [ 1688.298209] cap_inode_killpriv+0x19/0x50 [ 1688.298845] security_inode_killpriv+0x46/0xa0 [ 1688.299541] setattr_prepare+0x19f/0x7c0 [ 1688.300161] ext4_setattr+0x199/0x20f0 [ 1688.300747] ? igrab+0xc0/0xc0 [ 1688.301232] ? ext4_xattr_security_set+0x40/0x40 [ 1688.301936] ? ext4_journalled_write_end+0x1190/0x1190 [ 1688.302724] notify_change+0xc28/0x1160 [ 1688.303337] file_remove_privs+0x364/0x520 [ 1688.303983] ? inode_set_ctime_current+0xa0/0xa0 [ 1688.304675] ? generic_write_checks+0x2ad/0x390 [ 1688.305368] ? down_write+0xe0/0x160 [ 1688.305933] ? down_write_killable+0x180/0x180 [ 1688.306605] file_modified+0x14/0xa0 [ 1688.307167] ext4_file_write_iter+0x8f8/0x1530 [ 1688.307848] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1688.308533] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1688.309332] new_sync_write+0x42c/0x660 [ 1688.309918] ? new_sync_read+0x6f0/0x6f0 [ 1688.310512] ? ksys_write+0x12d/0x260 [ 1688.311095] ? lock_release+0x680/0x680 [ 1688.311687] ? avc_policy_seqno+0x9/0x70 [ 1688.312288] ? selinux_file_permission+0x92/0x520 [ 1688.313011] vfs_write+0x7c0/0xb10 [ 1688.313536] ksys_write+0x12d/0x260 [ 1688.314079] ? __ia32_sys_read+0xb0/0xb0 [ 1688.314691] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1688.315470] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1688.316250] do_syscall_64+0x33/0x40 [ 1688.316803] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1688.317559] RIP: 0033:0x7fcaf76dab19 [ 1688.318109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1688.320827] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1688.321949] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1688.323014] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1688.324064] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.325121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1688.326175] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 [ 1688.327261] CPU: 1 PID: 8731 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1688.328407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1688.329755] Call Trace: [ 1688.330193] dump_stack+0x107/0x167 [ 1688.330796] should_fail.cold+0x5/0xa [ 1688.331424] ? create_object.isra.0+0x3a/0xa20 [ 1688.332177] should_failslab+0x5/0x20 [ 1688.332813] kmem_cache_alloc+0x5b/0x310 [ 1688.333472] ? __ext4_find_entry+0x85b/0xfc0 [ 1688.334193] ? __ext4_find_entry+0x9f1/0xfc0 [ 1688.334919] create_object.isra.0+0x3a/0xa20 [ 1688.335628] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1688.336458] kmem_cache_alloc+0x159/0x310 [ 1688.337129] ? ext4_dx_find_entry+0x600/0x600 [ 1688.337858] jbd2__journal_start+0x190/0x7e0 [ 1688.338580] __ext4_journal_start_sb+0x214/0x390 [ 1688.339364] ext4_rename+0x96d/0x2bc0 [ 1688.339985] ? ext4_tmpfile+0x440/0x440 [ 1688.340634] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1688.341503] ? lock_acquire+0x197/0x470 [ 1688.342144] ? vfs_rename+0xc68/0x1510 [ 1688.342790] ? lockref_get+0x11/0x50 [ 1688.343392] ? find_held_lock+0x2c/0x110 [ 1688.344060] ? down_write+0xe0/0x160 [ 1688.344668] ext4_rename2+0x1af/0x240 [ 1688.345294] vfs_rename+0xd6c/0x1510 [ 1688.345910] ? vfs_unlink+0x8b0/0x8b0 [ 1688.346538] ? lookup_dcache+0x65/0x130 [ 1688.347206] do_renameat2+0xae1/0xbf0 [ 1688.347840] ? __ia32_sys_link+0x80/0x80 [ 1688.348512] ? __virt_addr_valid+0x170/0x5d0 [ 1688.349231] ? __check_object_size+0x319/0x440 [ 1688.350003] __x64_sys_rename+0x7d/0xa0 [ 1688.350655] do_syscall_64+0x33/0x40 [ 1688.351272] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1688.352100] RIP: 0033:0x7ff571175b19 [ 1688.352707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1688.355691] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1688.356930] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1688.358086] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1688.359256] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.360414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1688.361576] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 07:05:19 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xffea, 0x0, 0x0, 0x0) 07:05:19 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xeaffffff, 0x0, 0x0, 0x0) 07:05:19 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x200000, 0x0, 0x0, 0x0) 07:05:19 executing program 7: r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) io_uring_enter(r0, 0x24f3, 0x488, 0x0, &(0x7f0000000100)={[0x100000000001008]}, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x9, 0x81, 0x0, 0x1ff}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000040)='./file0\x00', 0x4, 0x1000, 0x1}, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r4) ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000001a80)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYRES64, @ANYRESDEC=r5, @ANYRES64=r2], 0x508}, 0x1, 0x0, 0x0, 0x40031}, 0x4c004) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 07:05:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a0", 0xe7, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1688.559835] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 07:05:19 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:05:19 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xffffffea, 0x0, 0x0, 0x0) 07:05:20 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000180)=0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x80010, r0, 0x8000000) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10) syz_io_uring_submit(r2, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0xa0200, 0x0) io_uring_enter(r5, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1688.628805] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1688.629926] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1688.631103] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1688.640322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 07:05:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 9) 07:05:20 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x20000000, 0x0, 0x0, 0x0) 07:05:20 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a0", 0xe7, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1688.731467] FAULT_INJECTION: forcing a failure. [ 1688.731467] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.733265] CPU: 1 PID: 8770 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1688.734215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1688.735345] Call Trace: [ 1688.735720] dump_stack+0x107/0x167 [ 1688.736229] should_fail.cold+0x5/0xa [ 1688.736758] ? jbd2__journal_start+0x190/0x7e0 [ 1688.737395] should_failslab+0x5/0x20 [ 1688.737949] kmem_cache_alloc+0x5b/0x310 [ 1688.738512] jbd2__journal_start+0x190/0x7e0 [ 1688.739147] __ext4_journal_start_sb+0x214/0x390 [ 1688.739819] ext4_dirty_inode+0xbc/0x130 [ 1688.740385] ? ext4_setattr+0x20f0/0x20f0 [ 1688.740967] __mark_inode_dirty+0x492/0xd40 [ 1688.741567] ? setattr_prepare+0x135/0x7c0 [ 1688.742161] ext4_setattr+0xbfb/0x20f0 [ 1688.742703] ? igrab+0xc0/0xc0 [ 1688.743167] ? ext4_xattr_security_set+0x40/0x40 [ 1688.743448] FAULT_INJECTION: forcing a failure. [ 1688.743448] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.743837] ? ext4_journalled_write_end+0x1190/0x1190 [ 1688.743876] notify_change+0xc28/0x1160 [ 1688.743894] file_remove_privs+0x364/0x520 [ 1688.743906] ? inode_set_ctime_current+0xa0/0xa0 [ 1688.743920] ? generic_write_checks+0x2ad/0x390 [ 1688.743934] ? down_write+0xe0/0x160 [ 1688.743945] ? down_write_killable+0x180/0x180 [ 1688.743961] file_modified+0x14/0xa0 [ 1688.743974] ext4_file_write_iter+0x8f8/0x1530 [ 1688.743995] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1688.744013] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1688.744032] new_sync_write+0x42c/0x660 [ 1688.752832] ? new_sync_read+0x6f0/0x6f0 [ 1688.753399] ? ksys_write+0x12d/0x260 [ 1688.753936] ? lock_release+0x680/0x680 [ 1688.754495] ? avc_policy_seqno+0x9/0x70 [ 1688.755071] ? selinux_file_permission+0x92/0x520 [ 1688.755756] vfs_write+0x7c0/0xb10 [ 1688.756249] ksys_write+0x12d/0x260 [ 1688.756755] ? __ia32_sys_read+0xb0/0xb0 [ 1688.757316] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1688.758044] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1688.758772] do_syscall_64+0x33/0x40 [ 1688.759286] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1688.760000] RIP: 0033:0x7f692f402b19 [ 1688.760518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1688.763089] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1688.764147] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1688.765140] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1688.766134] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.767137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1688.768132] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 [ 1688.769148] CPU: 0 PID: 8772 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1688.770092] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1688.771226] Call Trace: [ 1688.771589] dump_stack+0x107/0x167 [ 1688.772082] should_fail.cold+0x5/0xa [ 1688.772603] ? create_object.isra.0+0x3a/0xa20 [ 1688.773223] should_failslab+0x5/0x20 [ 1688.773742] kmem_cache_alloc+0x5b/0x310 [ 1688.774297] ? __ext4_find_entry+0x85b/0xfc0 [ 1688.774894] ? __ext4_find_entry+0x9f1/0xfc0 [ 1688.775488] create_object.isra.0+0x3a/0xa20 [ 1688.776077] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1688.776761] kmem_cache_alloc+0x159/0x310 [ 1688.777315] ? ext4_dx_find_entry+0x600/0x600 [ 1688.777920] jbd2__journal_start+0x190/0x7e0 [ 1688.778515] __ext4_journal_start_sb+0x214/0x390 [ 1688.779163] ext4_rename+0x96d/0x2bc0 [ 1688.779681] ? ext4_tmpfile+0x440/0x440 [ 1688.780216] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1688.780923] ? lock_acquire+0x197/0x470 [ 1688.781456] ? vfs_rename+0xc68/0x1510 [ 1688.781968] ? lockref_get+0x11/0x50 [ 1688.782470] ? find_held_lock+0x2c/0x110 [ 1688.783018] ? down_write+0xe0/0x160 [ 1688.783519] ext4_rename2+0x1af/0x240 [ 1688.784034] vfs_rename+0xd6c/0x1510 [ 1688.784538] ? vfs_unlink+0x8b0/0x8b0 [ 1688.785055] ? lookup_dcache+0x65/0x130 [ 1688.785593] do_renameat2+0xae1/0xbf0 [ 1688.786107] ? __ia32_sys_link+0x80/0x80 [ 1688.786661] ? __virt_addr_valid+0x170/0x5d0 [ 1688.787258] ? __check_object_size+0x319/0x440 [ 1688.787866] __x64_sys_rename+0x7d/0xa0 [ 1688.788405] do_syscall_64+0x33/0x40 [ 1688.788892] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1688.789579] RIP: 0033:0x7ff571175b19 [ 1688.790076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1688.792540] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1688.793560] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1688.794470] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1688.795429] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.796383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1688.797308] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 07:05:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 10) 07:05:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 9) 07:05:34 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xffffffff, 0x0, 0x0, 0x0) 07:05:34 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38", 0xe9, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:05:34 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000180)=0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r2, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r3 = io_uring_setup(0x16c1, &(0x7f0000000240)={0x0, 0xfe67, 0x20, 0x2, 0xcd}) syz_io_uring_setup(0x7a89, &(0x7f0000000340)={0x0, 0xc328, 0x8, 0x3, 0x34d}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101300, 0x0) r6 = syz_io_uring_setup(0x21, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r5}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0x12, 0x0, r7) syz_io_uring_submit(r4, r1, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x2, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r7}}, 0x61fe) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3) io_uring_enter(r3, 0x58a7, 0xa896, 0x0, 0x0, 0x0) 07:05:34 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:05:34 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xeaffffff, 0x0, 0x0, 0x0) [ 1702.855161] FAULT_INJECTION: forcing a failure. [ 1702.855161] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.858013] CPU: 0 PID: 8784 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1702.859556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1702.861417] Call Trace: [ 1702.862012] dump_stack+0x107/0x167 [ 1702.862832] should_fail.cold+0x5/0xa [ 1702.863704] ? jbd2__journal_start+0x190/0x7e0 [ 1702.864729] should_failslab+0x5/0x20 [ 1702.865587] kmem_cache_alloc+0x5b/0x310 [ 1702.866490] jbd2__journal_start+0x190/0x7e0 [ 1702.867484] __ext4_journal_start_sb+0x214/0x390 [ 1702.868531] ext4_dirty_inode+0xbc/0x130 [ 1702.869432] ? ext4_setattr+0x20f0/0x20f0 [ 1702.870349] __mark_inode_dirty+0x492/0xd40 [ 1702.871325] ? setattr_prepare+0x135/0x7c0 [ 1702.872282] ext4_setattr+0xbfb/0x20f0 [ 1702.873151] ? igrab+0xc0/0xc0 [ 1702.873866] ? ext4_xattr_security_set+0x40/0x40 [ 1702.874950] ? ext4_journalled_write_end+0x1190/0x1190 [ 1702.876122] notify_change+0xc28/0x1160 [ 1702.877017] file_remove_privs+0x364/0x520 [ 1702.877965] ? inode_set_ctime_current+0xa0/0xa0 [ 1702.879033] ? generic_write_checks+0x2ad/0x390 [ 1702.880074] ? down_write+0xe0/0x160 [ 1702.880901] ? down_write_killable+0x180/0x180 [ 1702.881935] file_modified+0x14/0xa0 [ 1702.882767] ext4_file_write_iter+0x8f8/0x1530 [ 1702.883811] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1702.884846] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1702.886030] new_sync_write+0x42c/0x660 [ 1702.886930] ? new_sync_read+0x6f0/0x6f0 [ 1702.887835] ? ksys_write+0x12d/0x260 [ 1702.888697] ? lock_release+0x680/0x680 [ 1702.889585] ? avc_policy_seqno+0x9/0x70 [ 1702.890492] ? selinux_file_permission+0x92/0x520 [ 1702.891598] vfs_write+0x7c0/0xb10 [ 1702.892400] ksys_write+0x12d/0x260 [ 1702.893213] ? __ia32_sys_read+0xb0/0xb0 [ 1702.894123] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1702.895299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1702.896451] do_syscall_64+0x33/0x40 [ 1702.897283] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1702.898443] RIP: 0033:0x7fcaf76dab19 [ 1702.899287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.903431] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1702.905144] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1702.906757] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1702.908361] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1702.909961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1702.911580] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 [ 1702.915549] FAULT_INJECTION: forcing a failure. [ 1702.915549] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.918349] CPU: 0 PID: 8783 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1702.919900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1702.921758] Call Trace: [ 1702.922350] dump_stack+0x107/0x167 [ 1702.923177] should_fail.cold+0x5/0xa [ 1702.924037] ? create_object.isra.0+0x3a/0xa20 [ 1702.925058] should_failslab+0x5/0x20 [ 1702.925916] kmem_cache_alloc+0x5b/0x310 [ 1702.926845] create_object.isra.0+0x3a/0xa20 [ 1702.927832] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1702.928981] kmem_cache_alloc+0x159/0x310 [ 1702.929916] jbd2__journal_start+0x190/0x7e0 [ 1702.930917] __ext4_journal_start_sb+0x214/0x390 [ 1702.931986] ext4_dirty_inode+0xbc/0x130 [ 1702.932891] ? ext4_setattr+0x20f0/0x20f0 [ 1702.933826] __mark_inode_dirty+0x492/0xd40 [ 1702.934796] ? setattr_prepare+0x135/0x7c0 [ 1702.935752] ext4_setattr+0xbfb/0x20f0 [ 1702.936618] ? igrab+0xc0/0xc0 [ 1702.937334] ? ext4_xattr_security_set+0x40/0x40 [ 1702.938406] ? ext4_journalled_write_end+0x1190/0x1190 [ 1702.939584] notify_change+0xc28/0x1160 [ 1702.940486] file_remove_privs+0x364/0x520 [ 1702.941440] ? inode_set_ctime_current+0xa0/0xa0 [ 1702.942500] ? generic_write_checks+0x2ad/0x390 [ 1702.943546] ? down_write+0xe0/0x160 [ 1702.944377] ? down_write_killable+0x180/0x180 [ 1702.945401] file_modified+0x14/0xa0 [ 1702.946231] ext4_file_write_iter+0x8f8/0x1530 [ 1702.947269] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1702.948296] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1702.949476] new_sync_write+0x42c/0x660 [ 1702.950370] ? new_sync_read+0x6f0/0x6f0 [ 1702.951293] ? ksys_write+0x12d/0x260 [ 1702.952148] ? lock_release+0x680/0x680 [ 1702.953040] ? avc_policy_seqno+0x9/0x70 [ 1702.953946] ? selinux_file_permission+0x92/0x520 [ 1702.955045] vfs_write+0x7c0/0xb10 [ 1702.955853] ksys_write+0x12d/0x260 [ 1702.956673] ? __ia32_sys_read+0xb0/0xb0 [ 1702.957581] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1702.958755] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1702.959925] do_syscall_64+0x33/0x40 [ 1702.960756] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1702.961906] RIP: 0033:0x7f692f402b19 [ 1702.962734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.966849] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1702.968551] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1702.970154] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1702.971779] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1702.973388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1702.975006] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 07:05:34 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xffffffea, 0x0, 0x0, 0x0) [ 1703.010379] FAULT_INJECTION: forcing a failure. [ 1703.010379] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.013464] CPU: 1 PID: 8795 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1703.014926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.016688] Call Trace: [ 1703.017250] dump_stack+0x107/0x167 [ 1703.018029] should_fail.cold+0x5/0xa [ 1703.018841] ? create_object.isra.0+0x3a/0xa20 [ 1703.019808] should_failslab+0x5/0x20 [ 1703.020608] kmem_cache_alloc+0x5b/0x310 [ 1703.021467] create_object.isra.0+0x3a/0xa20 [ 1703.022403] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1703.023488] kmem_cache_alloc+0x159/0x310 [ 1703.024373] jbd2__journal_start+0x190/0x7e0 [ 1703.025321] __ext4_journal_start_sb+0x214/0x390 [ 1703.026324] ext4_evict_inode+0x8f4/0x1a60 [ 1703.027231] ? ext4_da_write_begin+0xd40/0xd40 [ 1703.028192] ? rwlock_bug.part.0+0x90/0x90 [ 1703.029091] ? ext4_da_write_begin+0xd40/0xd40 [ 1703.030058] evict+0x32b/0x8c0 [ 1703.030745] ? new_inode+0x250/0x250 [ 1703.031549] ? lock_downgrade+0x6d0/0x6d0 [ 1703.032417] ? rwlock_bug.part.0+0x90/0x90 [ 1703.033308] ? fsnotify_grab_connector+0x11a/0x250 [ 1703.034372] iput.part.0+0x4b9/0x6d0 [ 1703.035167] ? trace_event_raw_event_ext4_fc_track_inode+0x320/0x320 [ 1703.036525] iput+0x58/0x70 [ 1703.037158] dentry_unlink_inode+0x2bb/0x470 [ 1703.038088] __dentry_kill+0x36f/0x5c0 [ 1703.038929] ? dput+0x35/0xcd0 [ 1703.039621] dput+0x6f4/0xcd0 [ 1703.040299] do_renameat2+0x715/0xbf0 [ 1703.041117] ? __ia32_sys_link+0x80/0x80 [ 1703.041996] ? __virt_addr_valid+0x170/0x5d0 [ 1703.042932] ? __check_object_size+0x319/0x440 [ 1703.043932] __x64_sys_rename+0x7d/0xa0 [ 1703.044769] do_syscall_64+0x33/0x40 [ 1703.045563] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1703.046639] RIP: 0033:0x7ff571175b19 [ 1703.047442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.051336] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1703.052946] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1703.054456] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1703.055980] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.057740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1703.059313] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 07:05:34 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38", 0xe9, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:05:34 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000001500)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x10000000c) r4 = syz_io_uring_setup(0x77d9, &(0x7f0000001380)={0x0, 0xcb30, 0x0, 0x402, 0x279, 0x0, r1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000001340)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000000300)={0x607, [{r5}, {r5, r7}, {r6}, {r6, r7}, {r6, r7}, {r5}, {r5, r7}, {r6}, {r5, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {0x0, r7}, {r6, r7}, {0x0, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {0x0, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {0x0, r7}, {r6, r7}, {0x0, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {0x0, r7}, {0x0, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {0x0, r7}, {0x0, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r6}, {r6, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r5}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6}, {r5}, {r6, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6}, {r6, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {0x0, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {}, {r5, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6}, {r5, r7}, {0x0, r7}, {r6, r7}, {0x0, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {0x0, r7}, {r6, r7}, {r6, r7}, {r6}, {r5}, {r5, r7}, {r6}, {r5, r7}, {0x0, r7}, {r5, r7}, {r5, r7}, {r6}, {r5, r7}, {r6, r7}, {r6}, {r6}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r5}, {r5, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {0x0, r7}, {0x0, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {0x0, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {0x0, r7}, {r5, r7}, {r5}, {r6}, {r5, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r5, r7}, {r5, r7}, {r6, r7}, {r6}, {r5, r7}, {0x0, r7}, {r5}, {r5, r7}, {r5, r7}, {0x0, r7}], 0x8, "91cbc4e9f111f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0xd4, "544d056968f26f"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x46e2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000040)=0x2, 0x4) ioctl$FS_IOC_FSSETXATTR(r9, 0x40086602, &(0x7f0000000100)={0x8e7}) r10 = socket(0x1d, 0xa, 0xffffffff) read(r10, &(0x7f0000019340)=""/102387, 0x18ff3) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) r11 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r11, 0x40086602, &(0x7f0000000100)={0x8e7}) fcntl$setlease(r11, 0x400, 0x0) 07:05:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202321202000204025de5d3a2c25205b230a1e2512b1f3b300000100000000003b2c4a3a9dac8691cbd0325cfc378ed44531d10e4be8ef9ae7245dffe017bf2a02c01479f6daf363c9e2790d15ecef85b02c07fa6c46b4acf723d5ec1805fae53ffaea093e291c076a867604000000cd2b642b66b13cdc5feaec0bd9c55d006b7f422e022a0c433858abb849c273c155f7529ad7558629d163445a1edcad814f31b6c1b10000000000000000000017054bbb357cc218e446eacedb50093ac4be84a1b67c79848aa0f161f7a43c2d5132c0a313b91a47115878d0b224f10f520800708eceada24d333791c0981dcb976b659e7a235ddceb24dc0568981511d911de6d56233df135a870496e417c2a490f7f3a977af001e565b0db808133d4507d19cbe721f53a7cf7251190b4"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 10) [ 1703.089467] loop7: detected capacity change from 0 to 32768 [ 1703.103895] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:05:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 11) [ 1703.129022] FAULT_INJECTION: forcing a failure. [ 1703.129022] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.131652] CPU: 1 PID: 8808 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1703.133105] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.134865] Call Trace: [ 1703.135435] dump_stack+0x107/0x167 [ 1703.136211] should_fail.cold+0x5/0xa [ 1703.137021] ? create_object.isra.0+0x3a/0xa20 [ 1703.137989] should_failslab+0x5/0x20 [ 1703.138799] kmem_cache_alloc+0x5b/0x310 [ 1703.139681] create_object.isra.0+0x3a/0xa20 [ 1703.140609] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1703.141695] kmem_cache_alloc+0x159/0x310 [ 1703.142581] jbd2__journal_start+0x190/0x7e0 [ 1703.143527] __ext4_journal_start_sb+0x214/0x390 [ 1703.144545] ext4_dirty_inode+0xbc/0x130 [ 1703.145409] ? ext4_setattr+0x20f0/0x20f0 [ 1703.146286] __mark_inode_dirty+0x492/0xd40 [ 1703.147214] ? setattr_prepare+0x135/0x7c0 [ 1703.148111] ext4_setattr+0xbfb/0x20f0 [ 1703.148948] ? igrab+0xc0/0xc0 [ 1703.149630] ? ext4_xattr_security_set+0x40/0x40 [ 1703.150649] ? ext4_journalled_write_end+0x1190/0x1190 [ 1703.151782] notify_change+0xc28/0x1160 [ 1703.152649] file_remove_privs+0x364/0x520 [ 1703.153546] ? inode_set_ctime_current+0xa0/0xa0 [ 1703.154560] ? generic_write_checks+0x2ad/0x390 [ 1703.155558] ? down_write+0xe0/0x160 [ 1703.156363] ? down_write_killable+0x180/0x180 [ 1703.157353] file_modified+0x14/0xa0 [ 1703.158148] ext4_file_write_iter+0x8f8/0x1530 [ 1703.159146] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1703.160139] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1703.161265] new_sync_write+0x42c/0x660 [ 1703.162113] ? new_sync_read+0x6f0/0x6f0 [ 1703.162982] ? ksys_write+0x12d/0x260 [ 1703.163791] ? lock_release+0x680/0x680 [ 1703.164644] ? avc_policy_seqno+0x9/0x70 [ 1703.165519] ? selinux_file_permission+0x92/0x520 [ 1703.166572] vfs_write+0x7c0/0xb10 [ 1703.167347] ksys_write+0x12d/0x260 [ 1703.168123] ? __ia32_sys_read+0xb0/0xb0 [ 1703.168995] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.170115] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.171225] do_syscall_64+0x33/0x40 [ 1703.172016] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1703.173096] RIP: 0033:0x7fcaf76dab19 [ 1703.173883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.177832] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1703.179462] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1703.180977] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1703.182500] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.184027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1703.185543] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 07:05:34 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) [ 1703.239446] FAULT_INJECTION: forcing a failure. [ 1703.239446] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.242106] CPU: 1 PID: 8814 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1703.243576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.245342] Call Trace: [ 1703.245908] dump_stack+0x107/0x167 [ 1703.246685] should_fail.cold+0x5/0xa [ 1703.247508] ? jbd2__journal_start+0x190/0x7e0 [ 1703.248483] should_failslab+0x5/0x20 [ 1703.249302] kmem_cache_alloc+0x5b/0x310 [ 1703.250183] jbd2__journal_start+0x190/0x7e0 [ 1703.251143] __ext4_journal_start_sb+0x214/0x390 [ 1703.252155] ext4_dirty_inode+0xbc/0x130 [ 1703.253020] ? ext4_setattr+0x20f0/0x20f0 [ 1703.253896] __mark_inode_dirty+0x492/0xd40 [ 1703.254792] generic_update_time+0x21c/0x370 [ 1703.255730] file_update_time+0x43a/0x520 [ 1703.256608] ? evict_inodes+0x470/0x470 [ 1703.257459] ? down_write_killable+0x180/0x180 [ 1703.258435] file_modified+0x7d/0xa0 [ 1703.259246] ext4_file_write_iter+0x8f8/0x1530 [ 1703.260243] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1703.261216] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1703.262354] new_sync_write+0x42c/0x660 [ 1703.263212] ? new_sync_read+0x6f0/0x6f0 [ 1703.264075] ? ksys_write+0x12d/0x260 [ 1703.264895] ? lock_release+0x680/0x680 [ 1703.265752] ? avc_policy_seqno+0x9/0x70 [ 1703.266625] ? selinux_file_permission+0x92/0x520 [ 1703.267678] vfs_write+0x7c0/0xb10 [ 1703.268444] ksys_write+0x12d/0x260 [ 1703.269210] ? __ia32_sys_read+0xb0/0xb0 [ 1703.270075] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.271205] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.272299] do_syscall_64+0x33/0x40 [ 1703.273085] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1703.274180] RIP: 0033:0x7f692f402b19 [ 1703.274979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.278873] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1703.280495] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1703.282010] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1703.283523] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.285037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1703.286525] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 07:05:34 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xffffffff, 0x0, 0x0, 0x0) 07:05:34 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0xea, 0x0, 0x0) [ 1703.408190] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:05:49 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0xea, 0x0, 0x0) 07:05:49 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38", 0xe9, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:05:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 11) 07:05:49 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0)={0x0, 0x200000, 0x0, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) io_uring_enter(r4, 0x2afe, 0x51b3, 0x3, &(0x7f00000001c0)={[0xfffffffffffffffc]}, 0x8) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r6 = fsmount(r3, 0x0, 0x74) io_uring_enter(r6, 0x6d21, 0xe135, 0x2, &(0x7f0000000240)={[0x7fff]}, 0x8) r7 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000) openat(r7, &(0x7f0000000140)='./file0\x00', 0x20080, 0x4) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 07:05:49 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 11) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:05:49 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) openat(r0, &(0x7f0000000200)='./file0\x00', 0x35e7eaa4871bc4b0, 0x0) openat(r0, 0x0, 0x206000, 0x18) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0xffffffffffffffff], 0x1}, 0x7990) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x1, 0x0, @fd_index=0x2, 0x4, 0x0, 0xff, 0x5}, 0x80) chdir(&(0x7f0000000040)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000100)=ANY=[], 0x10) r5 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) openat(0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x200, 0x11) write$binfmt_elf64(r5, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xfdef) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='cgroup\x00', 0x8000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r4, 0x0, 0x100000001) 07:05:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 12) 07:05:49 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x2000, 0x0, 0x0) [ 1717.982263] loop7: detected capacity change from 0 to 41948160 [ 1717.994265] FAULT_INJECTION: forcing a failure. [ 1717.994265] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.997143] CPU: 0 PID: 8844 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1717.998693] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1718.000594] Call Trace: [ 1718.001191] dump_stack+0x107/0x167 [ 1718.002016] should_fail.cold+0x5/0xa [ 1718.002877] ? jbd2__journal_start+0x190/0x7e0 [ 1718.003919] should_failslab+0x5/0x20 [ 1718.004779] kmem_cache_alloc+0x5b/0x310 [ 1718.005702] jbd2__journal_start+0x190/0x7e0 [ 1718.006701] __ext4_journal_start_sb+0x214/0x390 [ 1718.007791] ext4_dirty_inode+0xbc/0x130 [ 1718.008711] ? ext4_setattr+0x20f0/0x20f0 [ 1718.009647] __mark_inode_dirty+0x492/0xd40 [ 1718.010628] generic_update_time+0x21c/0x370 [ 1718.011637] file_update_time+0x43a/0x520 [ 1718.012577] ? evict_inodes+0x470/0x470 [ 1718.013476] ? down_write_killable+0x180/0x180 [ 1718.014514] file_modified+0x7d/0xa0 [ 1718.015371] ext4_file_write_iter+0x8f8/0x1530 [ 1718.016407] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1718.017255] FAULT_INJECTION: forcing a failure. [ 1718.017255] name failslab, interval 1, probability 0, space 0, times 0 [ 1718.017450] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1718.017486] new_sync_write+0x42c/0x660 [ 1718.017508] ? new_sync_read+0x6f0/0x6f0 [ 1718.023109] ? ksys_write+0x12d/0x260 [ 1718.023978] ? lock_release+0x680/0x680 [ 1718.024878] ? avc_policy_seqno+0x9/0x70 [ 1718.025800] ? selinux_file_permission+0x92/0x520 [ 1718.026916] vfs_write+0x7c0/0xb10 [ 1718.027738] ksys_write+0x12d/0x260 [ 1718.028563] ? __ia32_sys_read+0xb0/0xb0 [ 1718.029483] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1718.030677] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1718.031867] do_syscall_64+0x33/0x40 [ 1718.032709] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1718.033874] RIP: 0033:0x7fcaf76dab19 [ 1718.034723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1718.038920] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1718.040655] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1718.042285] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1718.043918] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1718.045547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1718.047182] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 [ 1718.048882] CPU: 1 PID: 8845 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1718.050433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1718.052274] Call Trace: [ 1718.052868] dump_stack+0x107/0x167 [ 1718.053717] should_fail.cold+0x5/0xa [ 1718.054725] ? create_object.isra.0+0x3a/0xa20 [ 1718.055747] should_failslab+0x5/0x20 [ 1718.056584] kmem_cache_alloc+0x5b/0x310 [ 1718.057478] ? __kasan_slab_free+0x122/0x160 [ 1718.058449] create_object.isra.0+0x3a/0xa20 [ 1718.059410] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1718.060515] __kmalloc+0x16e/0x390 [ 1718.061287] ? __ext4_journal_start_sb+0x1db/0x390 [ 1718.062359] ext4_ext_remove_space+0x15af/0x3da0 [ 1718.063413] ? ext4_es_remove_extent+0x2f2/0x450 [ 1718.064452] ? do_raw_read_unlock+0x70/0x70 [ 1718.065397] ? ext4_da_release_space+0x21/0x480 [ 1718.066406] ? ext4_ext_index_trans_blocks+0x110/0x110 [ 1718.067572] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 1718.068600] ? down_write+0xe0/0x160 [ 1718.069405] ? down_write_killable+0x180/0x180 [ 1718.070411] ext4_ext_truncate+0x1ea/0x250 [ 1718.071358] ext4_truncate+0xc38/0x1160 [ 1718.072241] ? ext4_punch_hole+0x1070/0x1070 [ 1718.073207] ? __ext4_journal_start_sb+0x214/0x390 [ 1718.074284] ? __ext4_journal_start_sb+0x1db/0x390 [ 1718.075369] ext4_evict_inode+0xae0/0x1a60 [ 1718.076293] ? ext4_da_write_begin+0xd40/0xd40 [ 1718.077297] ? rwlock_bug.part.0+0x90/0x90 [ 1718.078231] ? ext4_da_write_begin+0xd40/0xd40 [ 1718.079225] evict+0x32b/0x8c0 [ 1718.079929] ? new_inode+0x250/0x250 [ 1718.080746] ? lock_downgrade+0x6d0/0x6d0 [ 1718.081646] ? rwlock_bug.part.0+0x90/0x90 [ 1718.082566] ? fsnotify_grab_connector+0x11a/0x250 [ 1718.083654] iput.part.0+0x4b9/0x6d0 [ 1718.084466] ? trace_event_raw_event_ext4_fc_track_inode+0x320/0x320 [ 1718.085862] iput+0x58/0x70 [ 1718.086508] dentry_unlink_inode+0x2bb/0x470 [ 1718.087475] __dentry_kill+0x36f/0x5c0 [ 1718.088323] ? dput+0x35/0xcd0 [ 1718.089034] dput+0x6f4/0xcd0 [ 1718.089738] do_renameat2+0x715/0xbf0 [ 1718.090578] ? __ia32_sys_link+0x80/0x80 [ 1718.091501] ? __virt_addr_valid+0x170/0x5d0 [ 1718.092464] ? __check_object_size+0x319/0x440 [ 1718.093491] __x64_sys_rename+0x7d/0xa0 [ 1718.094347] do_syscall_64+0x33/0x40 [ 1718.095156] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1718.096252] RIP: 0033:0x7ff571175b19 [ 1718.097054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1718.101001] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1718.102642] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1718.104175] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1718.105708] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1718.107254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1718.108779] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 [ 1718.127254] FAULT_INJECTION: forcing a failure. [ 1718.127254] name failslab, interval 1, probability 0, space 0, times 0 [ 1718.129823] CPU: 1 PID: 8847 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1718.131284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1718.133041] Call Trace: [ 1718.133603] dump_stack+0x107/0x167 [ 1718.134381] should_fail.cold+0x5/0xa [ 1718.135202] ? create_object.isra.0+0x3a/0xa20 [ 1718.136169] should_failslab+0x5/0x20 [ 1718.136983] kmem_cache_alloc+0x5b/0x310 [ 1718.137848] create_object.isra.0+0x3a/0xa20 [ 1718.138780] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1718.139864] kmem_cache_alloc+0x159/0x310 [ 1718.140746] jbd2__journal_start+0x190/0x7e0 [ 1718.141679] __ext4_journal_start_sb+0x214/0x390 [ 1718.142685] ext4_dirty_inode+0xbc/0x130 [ 1718.143552] ? ext4_setattr+0x20f0/0x20f0 [ 1718.144433] __mark_inode_dirty+0x492/0xd40 [ 1718.145357] generic_update_time+0x21c/0x370 07:05:49 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0xeaff, 0x0, 0x0) 07:05:49 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x2000, 0x0, 0x0) [ 1718.146283] file_update_time+0x43a/0x520 [ 1718.147426] ? evict_inodes+0x470/0x470 [ 1718.148257] ? down_write_killable+0x180/0x180 [ 1718.149211] file_modified+0x7d/0xa0 [ 1718.149993] ext4_file_write_iter+0x8f8/0x1530 [ 1718.150968] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1718.151938] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1718.153036] new_sync_write+0x42c/0x660 [ 1718.153871] ? new_sync_read+0x6f0/0x6f0 [ 1718.154717] ? ksys_write+0x12d/0x260 [ 1718.155532] ? lock_release+0x680/0x680 [ 1718.156367] ? avc_policy_seqno+0x9/0x70 [ 1718.157217] ? selinux_file_permission+0x92/0x520 [ 1718.158253] vfs_write+0x7c0/0xb10 [ 1718.159016] ksys_write+0x12d/0x260 [ 1718.159787] ? __ia32_sys_read+0xb0/0xb0 [ 1718.160645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1718.161744] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1718.162829] do_syscall_64+0x33/0x40 [ 1718.163673] entry_SYSCALL_64_after_hwframe+0x67/0xd1 07:05:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 12) [ 1718.164890] RIP: 0033:0x7f692f402b19 [ 1718.165890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1718.170294] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1718.172111] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1718.173808] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1718.175519] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1718.177230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1718.178931] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 [ 1718.221501] FAULT_INJECTION: forcing a failure. [ 1718.221501] name failslab, interval 1, probability 0, space 0, times 0 [ 1718.224456] CPU: 0 PID: 8864 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1718.226001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1718.227896] Call Trace: [ 1718.228495] dump_stack+0x107/0x167 [ 1718.229327] should_fail.cold+0x5/0xa [ 1718.230188] ? create_object.isra.0+0x3a/0xa20 [ 1718.231233] should_failslab+0x5/0x20 [ 1718.232101] kmem_cache_alloc+0x5b/0x310 [ 1718.233027] create_object.isra.0+0x3a/0xa20 [ 1718.234031] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1718.235192] kmem_cache_alloc+0x159/0x310 [ 1718.236134] jbd2__journal_start+0x190/0x7e0 [ 1718.237137] __ext4_journal_start_sb+0x214/0x390 [ 1718.238213] ext4_dirty_inode+0xbc/0x130 [ 1718.239135] ? ext4_setattr+0x20f0/0x20f0 [ 1718.240071] __mark_inode_dirty+0x492/0xd40 [ 1718.241057] generic_update_time+0x21c/0x370 [ 1718.242059] file_update_time+0x43a/0x520 [ 1718.242996] ? evict_inodes+0x470/0x470 [ 1718.243902] ? down_write_killable+0x180/0x180 [ 1718.244938] file_modified+0x7d/0xa0 [ 1718.245778] ext4_file_write_iter+0x8f8/0x1530 [ 1718.246828] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1718.247878] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1718.249070] new_sync_write+0x42c/0x660 [ 1718.249967] ? new_sync_read+0x6f0/0x6f0 [ 1718.250886] ? ksys_write+0x12d/0x260 [ 1718.251761] ? lock_release+0x680/0x680 [ 1718.252663] ? avc_policy_seqno+0x9/0x70 [ 1718.253583] ? selinux_file_permission+0x92/0x520 [ 1718.254691] vfs_write+0x7c0/0xb10 [ 1718.255515] ksys_write+0x12d/0x260 [ 1718.256338] ? __ia32_sys_read+0xb0/0xb0 [ 1718.257262] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1718.258450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1718.259645] do_syscall_64+0x33/0x40 [ 1718.260500] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1718.261661] RIP: 0033:0x7fcaf76dab19 [ 1718.262503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1718.266685] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1718.268401] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1718.270006] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1718.271634] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1718.273238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1718.274849] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 07:05:49 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:05:49 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0xffea, 0x0, 0x0) 07:05:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 13) [ 1718.396402] FAULT_INJECTION: forcing a failure. [ 1718.396402] name failslab, interval 1, probability 0, space 0, times 0 [ 1718.399293] CPU: 0 PID: 8874 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1718.400851] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1718.402735] Call Trace: [ 1718.403353] dump_stack+0x107/0x167 [ 1718.404186] should_fail.cold+0x5/0xa [ 1718.405255] ? jbd2__journal_start+0x190/0x7e0 [ 1718.406332] should_failslab+0x5/0x20 [ 1718.407202] kmem_cache_alloc+0x5b/0x310 [ 1718.408128] jbd2__journal_start+0x190/0x7e0 [ 1718.409123] __ext4_journal_start_sb+0x214/0x390 [ 1718.410180] ext4_file_write_iter+0xee9/0x1530 [ 1718.411226] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1718.412268] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1718.413460] new_sync_write+0x42c/0x660 [ 1718.414364] ? new_sync_read+0x6f0/0x6f0 [ 1718.415284] ? ksys_write+0x12d/0x260 [ 1718.416143] ? lock_release+0x680/0x680 [ 1718.417039] ? avc_policy_seqno+0x9/0x70 [ 1718.417972] ? selinux_file_permission+0x92/0x520 [ 1718.419092] vfs_write+0x7c0/0xb10 [ 1718.419901] ksys_write+0x12d/0x260 [ 1718.420717] ? __ia32_sys_read+0xb0/0xb0 [ 1718.421642] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1718.422822] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1718.424001] do_syscall_64+0x33/0x40 [ 1718.424847] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1718.426004] RIP: 0033:0x7f692f402b19 [ 1718.426841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1718.430991] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1718.432702] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1718.434302] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1718.435920] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1718.437518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1718.439130] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 07:06:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 13) 07:06:03 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0xeaff, 0x0, 0x0) 07:06:03 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 12) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:06:03 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x200000, 0x0, 0x0) 07:06:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 14) 07:06:03 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) 07:06:03 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0)={0x0, 0x0, 0x10}, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000001c0), &(0x7f0000000240)='system_u:object_r:scanner_device_t:s0\x00', 0x26, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', 0x42440, 0x108) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000003, 0x20010, r4, 0x8000000) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd_index, 0x0, 0x0}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB="00000002beda32", @ANYRESHEX=r8, @ANYBLOB="2c634db0dfbc7639195f616368653d6e6f6e652c00"/30]) syz_io_uring_submit(r5, r6, &(0x7f00000014c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)=[r4], 0x1, 0x0, 0x1}, 0x7992) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r9, 0x7, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x1000000, 0x110, r9, 0x8000000) syz_io_uring_submit(0x0, r6, &(0x7f0000000140)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x2, &(0x7f0000000040)={0x77359400}, 0x1, 0x1}, 0x10000) 07:06:03 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002800000000000028252f4500000000000000000000000000000000000000000000000000000000000100000101e70001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000100)="225d62c8551ed7d86b2ee0f8d100bfc65ab5303a515d2968f173", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6368650300000000000000742c00"]) openat(r0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 1731.769101] FAULT_INJECTION: forcing a failure. [ 1731.769101] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.772029] CPU: 0 PID: 8888 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1731.773616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.775574] Call Trace: [ 1731.776188] dump_stack+0x107/0x167 [ 1731.777030] should_fail.cold+0x5/0xa [ 1731.777912] ? jbd2__journal_start+0x190/0x7e0 [ 1731.778974] should_failslab+0x5/0x20 [ 1731.779880] kmem_cache_alloc+0x5b/0x310 [ 1731.780821] jbd2__journal_start+0x190/0x7e0 [ 1731.781845] __ext4_journal_start_sb+0x214/0x390 [ 1731.782949] ext4_file_write_iter+0xee9/0x1530 [ 1731.784048] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1731.785107] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1731.786329] new_sync_write+0x42c/0x660 [ 1731.787267] ? new_sync_read+0x6f0/0x6f0 [ 1731.788226] ? ksys_write+0x12d/0x260 [ 1731.789113] ? lock_release+0x680/0x680 [ 1731.790038] ? avc_policy_seqno+0x9/0x70 [ 1731.790981] ? selinux_file_permission+0x92/0x520 [ 1731.792139] vfs_write+0x7c0/0xb10 [ 1731.792972] ksys_write+0x12d/0x260 [ 1731.793813] ? __ia32_sys_read+0xb0/0xb0 [ 1731.794759] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.796000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.797202] do_syscall_64+0x33/0x40 [ 1731.798061] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1731.799261] RIP: 0033:0x7fcaf76dab19 [ 1731.800128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.804381] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1731.806133] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1731.807800] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1731.809443] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1731.811085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1731.812759] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 [ 1731.823975] loop7: detected capacity change from 0 to 122880 [ 1731.827142] FAULT_INJECTION: forcing a failure. [ 1731.827142] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.830101] CPU: 0 PID: 8884 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1731.831705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.833614] Call Trace: [ 1731.834224] dump_stack+0x107/0x167 [ 1731.835067] should_fail.cold+0x5/0xa [ 1731.835975] ? create_object.isra.0+0x3a/0xa20 [ 1731.837032] should_failslab+0x5/0x20 [ 1731.837910] kmem_cache_alloc+0x5b/0x310 [ 1731.838853] create_object.isra.0+0x3a/0xa20 [ 1731.839890] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1731.840211] 9pnet: Insufficient options for proto=fd [ 1731.841061] kmem_cache_alloc+0x159/0x310 [ 1731.841083] ? jbd2_journal_put_journal_head+0x38a/0x560 [ 1731.841119] insert_revoke_hash+0x28/0x270 [ 1731.845226] jbd2_journal_revoke+0x2bb/0x570 [ 1731.846125] __ext4_forget+0x218/0x3e0 [ 1731.846914] ext4_free_blocks+0x194b/0x21f0 [ 1731.847821] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 1731.848565] ? ext4_ext_get_access.constprop.0.isra.0+0x80/0x80 [ 1731.849431] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1731.850231] ext4_ext_remove_space+0x1ef7/0x3da0 [ 1731.850939] ? ext4_ext_index_trans_blocks+0x110/0x110 [ 1731.851710] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 1731.852398] ? down_write+0xe0/0x160 [ 1731.852933] ? down_write_killable+0x180/0x180 [ 1731.853608] ext4_ext_truncate+0x1ea/0x250 [ 1731.854230] ext4_truncate+0xc38/0x1160 [ 1731.854808] ? ext4_punch_hole+0x1070/0x1070 [ 1731.855460] ? __ext4_journal_start_sb+0x214/0x390 07:06:03 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0xffea, 0x0, 0x0) [ 1731.856165] ? __ext4_journal_start_sb+0x1db/0x390 [ 1731.856913] ext4_evict_inode+0xae0/0x1a60 [ 1731.857405] ? ext4_da_write_begin+0xd40/0xd40 [ 1731.857926] ? rwlock_bug.part.0+0x90/0x90 [ 1731.858414] ? ext4_da_write_begin+0xd40/0xd40 [ 1731.858935] evict+0x32b/0x8c0 [ 1731.859315] ? new_inode+0x250/0x250 [ 1731.859742] ? lock_downgrade+0x6d0/0x6d0 [ 1731.860214] ? rwlock_bug.part.0+0x90/0x90 [ 1731.860698] ? fsnotify_grab_connector+0x11a/0x250 [ 1731.861271] iput.part.0+0x4b9/0x6d0 [ 1731.861696] ? trace_event_raw_event_ext4_fc_track_inode+0x320/0x320 [ 1731.862431] iput+0x58/0x70 [ 1731.862775] dentry_unlink_inode+0x2bb/0x470 [ 1731.863290] __dentry_kill+0x36f/0x5c0 [ 1731.863736] ? dput+0x35/0xcd0 [ 1731.864102] dput+0x6f4/0xcd0 [ 1731.864468] do_renameat2+0x715/0xbf0 [ 1731.864912] ? __ia32_sys_link+0x80/0x80 [ 1731.865382] ? __virt_addr_valid+0x170/0x5d0 [ 1731.865889] ? __check_object_size+0x319/0x440 [ 1731.866434] __x64_sys_rename+0x7d/0xa0 [ 1731.866891] do_syscall_64+0x33/0x40 [ 1731.867330] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1731.867916] RIP: 0033:0x7ff571175b19 [ 1731.868345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.870443] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1731.871319] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1731.872138] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1731.872951] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1731.873767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1731.874587] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 [ 1731.901950] FAULT_INJECTION: forcing a failure. [ 1731.901950] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.904599] CPU: 1 PID: 8896 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1731.906036] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.907794] Call Trace: [ 1731.908359] dump_stack+0x107/0x167 [ 1731.909129] should_fail.cold+0x5/0xa [ 1731.909931] ? create_object.isra.0+0x3a/0xa20 [ 1731.910884] should_failslab+0x5/0x20 [ 1731.911709] kmem_cache_alloc+0x5b/0x310 [ 1731.912557] ? ext4_dirty_inode+0x107/0x130 [ 1731.913462] create_object.isra.0+0x3a/0xa20 [ 1731.914382] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1731.915309] 9pnet: Insufficient options for proto=fd [ 1731.915452] kmem_cache_alloc+0x159/0x310 [ 1731.916933] jbd2__journal_start+0x190/0x7e0 [ 1731.917867] __ext4_journal_start_sb+0x214/0x390 [ 1731.918875] ext4_file_write_iter+0xee9/0x1530 [ 1731.919859] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1731.920826] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1731.921949] new_sync_write+0x42c/0x660 [ 1731.922799] ? new_sync_read+0x6f0/0x6f0 [ 1731.923654] ? ksys_write+0x12d/0x260 07:06:03 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="a7", 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r3, 0x0) [ 1731.924467] ? lock_release+0x680/0x680 [ 1731.925511] ? avc_policy_seqno+0x9/0x70 [ 1731.926370] ? selinux_file_permission+0x92/0x520 [ 1731.927415] vfs_write+0x7c0/0xb10 [ 1731.928176] ksys_write+0x12d/0x260 [ 1731.928938] ? __ia32_sys_read+0xb0/0xb0 [ 1731.929795] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.930901] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.931986] do_syscall_64+0x33/0x40 [ 1731.932763] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1731.933837] RIP: 0033:0x7f692f402b19 [ 1731.934617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:06:03 executing program 5: r0 = syz_io_uring_setup(0x1c28, &(0x7f0000000140), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x148, 0x4496, 0x1, &(0x7f00000001c0)={[0xab80]}, 0x8) [ 1731.938523] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1731.940275] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1731.941780] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1731.943299] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 07:06:03 executing program 2: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x200000, 0x0, 0x0) [ 1731.944806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1731.946425] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 [ 1731.950502] loop7: detected capacity change from 0 to 122880 07:06:03 executing program 4: r0 = syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0xffffffffffffffff, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x20000000, 0x0, 0x0) 07:06:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 14) 07:06:03 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') (fail_nth: 13) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0) 07:06:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb8) ftruncate(r0, 0x1000003) faccessat2(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x80, 0x0) getpgrp(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1278, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) syz_io_uring_setup(0x5045, &(0x7f0000000800)={0x0, 0x3ed, 0x8, 0x2, 0x27a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) (fail_nth: 15) 07:06:03 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x14) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="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"], 0x274}, 0x1, 0x0, 0x0, 0x3}, 0x800) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x24, r2, 0x2ff, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}]}, 0x24}}, 0x0) syz_80211_join_ibss(&(0x7f0000000040)='wlan1\x00', &(0x7f0000000380)=@random='y', 0x1, 0x0) [ 1732.083484] FAULT_INJECTION: forcing a failure. [ 1732.083484] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.086307] CPU: 1 PID: 8918 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1732.087750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1732.089496] Call Trace: [ 1732.090064] dump_stack+0x107/0x167 [ 1732.090834] should_fail.cold+0x5/0xa [ 1732.091656] ? create_object.isra.0+0x3a/0xa20 [ 1732.092621] should_failslab+0x5/0x20 [ 1732.093423] kmem_cache_alloc+0x5b/0x310 [ 1732.094276] ? pagecache_get_page+0x243/0xc80 [ 1732.095231] create_object.isra.0+0x3a/0xa20 [ 1732.096150] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1732.097222] kmem_cache_alloc+0x159/0x310 [ 1732.098109] ext4_free_blocks+0x10ef/0x21f0 [ 1732.099039] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 1732.100047] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1732.101200] ext4_ext_remove_space+0x1ef7/0x3da0 [ 1732.102239] ? ext4_ext_index_trans_blocks+0x110/0x110 [ 1732.103369] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 1732.104358] ? down_write+0xe0/0x160 [ 1732.105143] ? down_write_killable+0x180/0x180 [ 1732.106114] ext4_ext_truncate+0x1ea/0x250 [ 1732.107011] ext4_truncate+0xc38/0x1160 [ 1732.107860] ? ext4_punch_hole+0x1070/0x1070 [ 1732.108791] ? __ext4_journal_start_sb+0x214/0x390 [ 1732.109819] ? __ext4_journal_start_sb+0x1db/0x390 [ 1732.110863] ext4_evict_inode+0xae0/0x1a60 [ 1732.111763] ? ext4_da_write_begin+0xd40/0xd40 [ 1732.112723] ? rwlock_bug.part.0+0x90/0x90 [ 1732.113626] ? ext4_da_write_begin+0xd40/0xd40 [ 1732.114583] evict+0x32b/0x8c0 [ 1732.115269] ? new_inode+0x250/0x250 [ 1732.116056] ? lock_downgrade+0x6d0/0x6d0 [ 1732.116923] ? rwlock_bug.part.0+0x90/0x90 [ 1732.117821] ? fsnotify_grab_connector+0x11a/0x250 [ 1732.118870] iput.part.0+0x4b9/0x6d0 [ 1732.119667] ? trace_event_raw_event_ext4_fc_track_inode+0x320/0x320 [ 1732.121027] iput+0x58/0x70 [ 1732.121652] dentry_unlink_inode+0x2bb/0x470 [ 1732.122575] __dentry_kill+0x36f/0x5c0 [ 1732.123400] ? dput+0x35/0xcd0 [ 1732.124077] dput+0x6f4/0xcd0 [ 1732.124748] do_renameat2+0x715/0xbf0 [ 1732.125568] ? __ia32_sys_link+0x80/0x80 [ 1732.126430] ? __virt_addr_valid+0x170/0x5d0 [ 1732.127368] ? __check_object_size+0x319/0x440 [ 1732.128366] __x64_sys_rename+0x7d/0xa0 [ 1732.129204] do_syscall_64+0x33/0x40 [ 1732.129993] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1732.131074] RIP: 0033:0x7ff571175b19 [ 1732.131862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1732.135740] RSP: 002b:00007ff56e6eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1732.137334] RAX: ffffffffffffffda RBX: 00007ff571288f60 RCX: 00007ff571175b19 [ 1732.138835] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000020000180 [ 1732.140337] RBP: 00007ff56e6eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1732.141847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1732.143349] R13: 00007ffcea15ae8f R14: 00007ff56e6eb300 R15: 0000000000022000 [ 1732.157149] FAULT_INJECTION: forcing a failure. [ 1732.157149] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.159243] CPU: 0 PID: 8927 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1732.160372] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1732.161742] Call Trace: [ 1732.162176] dump_stack+0x107/0x167 [ 1732.162780] should_fail.cold+0x5/0xa [ 1732.163417] ? __iomap_dio_rw+0x1ee/0x1110 [ 1732.164117] should_failslab+0x5/0x20 [ 1732.164745] kmem_cache_alloc_trace+0x55/0x320 [ 1732.165501] __iomap_dio_rw+0x1ee/0x1110 [ 1732.166175] ? jbd2_journal_stop+0x188/0xdc0 [ 1732.166898] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1732.167654] ? ext4_orphan_add+0x253/0x9e0 [ 1732.168344] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1732.169172] ? ext4_empty_dir+0xae0/0xae0 [ 1732.169859] ? jbd2__journal_start+0xf3/0x7e0 [ 1732.170612] iomap_dio_rw+0x31/0x90 [ 1732.171207] ext4_file_write_iter+0xe0e/0x1530 [ 1732.171983] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1732.172744] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1732.173610] new_sync_write+0x42c/0x660 [ 1732.174271] ? new_sync_read+0x6f0/0x6f0 [ 1732.174352] FAULT_INJECTION: forcing a failure. [ 1732.174352] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.174936] ? ksys_write+0x12d/0x260 [ 1732.174954] ? lock_release+0x680/0x680 [ 1732.174969] ? avc_policy_seqno+0x9/0x70 [ 1732.174982] ? selinux_file_permission+0x92/0x520 [ 1732.175010] vfs_write+0x7c0/0xb10 [ 1732.175030] ksys_write+0x12d/0x260 [ 1732.175045] ? __ia32_sys_read+0xb0/0xb0 [ 1732.175062] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1732.175078] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1732.175094] do_syscall_64+0x33/0x40 [ 1732.175109] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1732.175119] RIP: 0033:0x7f692f402b19 [ 1732.175133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1732.175140] RSP: 002b:00007f692c978188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1732.175156] RAX: ffffffffffffffda RBX: 00007f692f515f60 RCX: 00007f692f402b19 [ 1732.175164] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1732.175172] RBP: 00007f692c9781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1732.175180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1732.175198] R13: 00007ffdf432110f R14: 00007f692c978300 R15: 0000000000022000 [ 1732.199562] CPU: 1 PID: 8925 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1732.201027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1732.202788] Call Trace: [ 1732.203356] dump_stack+0x107/0x167 [ 1732.204132] should_fail.cold+0x5/0xa [ 1732.204942] ? create_object.isra.0+0x3a/0xa20 [ 1732.205920] should_failslab+0x5/0x20 [ 1732.206733] kmem_cache_alloc+0x5b/0x310 [ 1732.207608] ? ext4_dirty_inode+0x107/0x130 [ 1732.208534] create_object.isra.0+0x3a/0xa20 [ 1732.209475] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1732.210544] kmem_cache_alloc+0x159/0x310 [ 1732.211453] jbd2__journal_start+0x190/0x7e0 [ 1732.212389] __ext4_journal_start_sb+0x214/0x390 [ 1732.213407] ext4_file_write_iter+0xee9/0x1530 [ 1732.214394] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1732.215382] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1732.216494] new_sync_write+0x42c/0x660 [ 1732.217345] ? new_sync_read+0x6f0/0x6f0 [ 1732.218212] ? ksys_write+0x12d/0x260 [ 1732.219025] ? lock_release+0x680/0x680 [ 1732.219884] ? avc_policy_seqno+0x9/0x70 [ 1732.220744] ? selinux_file_permission+0x92/0x520 [ 1732.221787] vfs_write+0x7c0/0xb10 [ 1732.222551] ksys_write+0x12d/0x260 [ 1732.223334] ? __ia32_sys_read+0xb0/0xb0 [ 1732.224210] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1732.225309] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1732.226401] do_syscall_64+0x33/0x40 [ 1732.227193] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1732.228285] RIP: 0033:0x7fcaf76dab19 [ 1732.229062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1732.232922] RSP: 002b:00007fcaf4c50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1732.234524] RAX: ffffffffffffffda RBX: 00007fcaf77edf60 RCX: 00007fcaf76dab19 [ 1732.236036] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1732.237543] RBP: 00007fcaf4c501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1732.239043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1732.240552] R13: 00007ffd14da0caf R14: 00007fcaf4c50300 R15: 0000000000022000 [ 1732.327019] ------------[ cut here ]------------ [ 1732.328338] wlan1: Failed check-sdata-in-driver check, flags: 0x4 [ 1732.330195] WARNING: CPU: 1 PID: 8932 at net/mac80211/driver-ops.h:172 drv_bss_info_changed+0x554/0x5f0 [ 1732.332184] Modules linked in: [ 1732.333080] CPU: 1 PID: 8932 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1732.334571] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1732.336400] RIP: 0010:drv_bss_info_changed+0x554/0x5f0 [ 1732.337548] Code: 49 8b ac 24 a8 03 00 00 48 85 ed 74 3e e8 64 3c 8b fd e8 5f 3c 8b fd 8b 54 24 04 48 89 ee 48 c7 c7 20 f2 95 84 e8 fc 09 25 00 <0f> 0b e9 c7 fd ff ff 4c 89 ff e8 3d 4b b7 fd e9 97 fb ff ff 4c 89 [ 1732.341510] RSP: 0018:ffff88804b18f5c8 EFLAGS: 00010282 [ 1732.342679] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1732.344241] RDX: 0000000000040000 RSI: ffffffff8129f703 RDI: ffffed1009631eab [ 1732.347058] RBP: ffff88801d3bc000 R08: 0000000000000001 R09: ffff88806cf37b0f [ 1732.353117] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88801d3bcbc0 [ 1732.354681] R13: 0000000000400000 R14: ffff88801d3bdda0 R15: ffff88801d3bdd98 [ 1732.356252] FS: 00007f8494dda700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1732.358008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1732.359285] CR2: 0000001b2d223000 CR3: 000000000ed22000 CR4: 0000000000350ee0 [ 1732.360843] Call Trace: [ 1732.361411] ieee80211_bss_info_change_notify+0x9a/0xc0 [ 1732.362588] ieee80211_ocb_leave+0x1ed/0x340 [ 1732.363554] ? nl80211_parse_mon_options+0x477/0x6d0 [ 1732.364683] __cfg80211_leave_ocb+0x1d6/0x570 [ 1732.365675] cfg80211_leave_ocb+0x4e/0x70 [ 1732.366568] cfg80211_change_iface+0x843/0xf90 [ 1732.367593] nl80211_set_interface+0x67c/0x8f0 [ 1732.368637] ? nl80211_notify_iface+0x180/0x180 [ 1732.369667] ? nl80211_pre_doit+0xa2/0x640 [ 1732.370576] genl_family_rcv_msg_doit+0x22d/0x330 [ 1732.371667] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1732.373112] ? cap_capable+0x1cd/0x230 [ 1732.373990] ? ns_capable+0xe2/0x110 [ 1732.374836] genl_rcv_msg+0x36a/0x5a0 [ 1732.375697] ? genl_get_cmd+0x480/0x480 [ 1732.376576] ? nl80211_notify_iface+0x180/0x180 [ 1732.377628] ? lock_release+0x680/0x680 [ 1732.378477] ? netlink_deliver_tap+0xf4/0xcc0 [ 1732.379479] netlink_rcv_skb+0x14b/0x430 [ 1732.380383] ? genl_get_cmd+0x480/0x480 [ 1732.381271] ? netlink_ack+0xab0/0xab0 [ 1732.382146] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1732.383155] ? is_vmalloc_addr+0x7b/0xb0 [ 1732.384074] genl_rcv+0x24/0x40 [ 1732.384816] netlink_unicast+0x6ce/0xa00 [ 1732.385719] ? netlink_attachskb+0xab0/0xab0 [ 1732.386703] netlink_sendmsg+0x90f/0xe00 [ 1732.387597] ? netlink_unicast+0xa00/0xa00 [ 1732.388545] ? netlink_unicast+0xa00/0xa00 [ 1732.389486] __sock_sendmsg+0x154/0x190 [ 1732.390395] __sys_sendto+0x21c/0x320 [ 1732.391256] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1732.392281] ? kmem_cache_free+0xa7/0x2d0 [ 1732.393219] ? _cond_resched+0x10/0x30 [ 1732.394263] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1732.395431] ? call_rcu+0x3e7/0x9e0 [ 1732.396238] ? trace_hardirqs_on+0x5b/0x180 [ 1732.397224] __x64_sys_sendto+0xdd/0x1b0 [ 1732.398136] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1732.399282] do_syscall_64+0x33/0x40 [ 1732.400118] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1732.401241] RIP: 0033:0x7f84978178ac [ 1732.402077] Code: fa fa ff ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 20 fb ff ff 48 8b [ 1732.406039] RSP: 002b:00007f8494dd8f80 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1732.407714] RAX: ffffffffffffffda RBX: 00007f8494dd90f0 RCX: 00007f84978178ac [ 1732.409271] RDX: 0000000000000024 RSI: 00007f8494dd9140 RDI: 0000000000000004 [ 1732.410823] RBP: 0000000000000000 R08: 00007f8494dd8fd4 R09: 000000000000000c [ 1732.412404] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1732.413959] R13: 00007f8494dd9140 R14: 0000000000000004 R15: 0000000000000000 [ 1732.415547] irq event stamp: 2485 [ 1732.416323] hardirqs last enabled at (2495): [] console_unlock+0x92d/0xb40 [ 1732.418181] hardirqs last disabled at (2504): [] console_unlock+0x839/0xb40 [ 1732.420053] softirqs last enabled at (1848): [] asm_call_irq_on_stack+0x12/0x20 [ 1732.422037] softirqs last disabled at (1801): [] asm_call_irq_on_stack+0x12/0x20 [ 1732.423982] ---[ end trace 77829ff236e06c3d ]--- [ 1732.430192] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1732.431740] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1732.433295] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready VM DIAGNOSIS: 07:06:04 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=ffff88800fe41a40 RCX=1ffffffff0acec11 RDX=1ffff11001fc8470 RSI=0000000000000006 RDI=ffff88800fe42380 RBP=ffff88800fe41a40 RSP=ffff88800eedf9b8 R8 =0000000000000000 R9 =0000000000000001 R10=0000000000000000 R11=0000000000000001 R12=0000000000000dc0 R13=0000000000000000 R14=0000000000000dc0 R15=ffff88800d15d2c0 RIP=ffffffff8126e940 RFL=00000057 [---ZAPC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f802ffe5900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f802f40a0c0 CR3=000000000dac2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=00000000000d0602 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffffffff XMM01=30306234386136303638616663356134 XMM02=38303062343861363036386166633561 XMM03=2f6c616e72756f6a2f676f6c2f6e7572 XMM04=a4b52147399d73d7000000000052f2f0 XMM05=d3fdd5f48436fbd700000000000aeab0 XMM06=14d6cc92175dc29600000000000ae968 XMM07=00000000000000000000000000000000 XMM08=44495f474f4c5359530069253d595449 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822e2601 RDI=ffffffff879f5140 RBP=ffffffff879f5100 RSP=ffff88804b18efd8 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000030 R13=0000000000000030 R14=ffffffff879f5100 R15=dffffc0000000000 RIP=ffffffff822e2658 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8494dda700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d223000 CR3=000000000ed22000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffff0000000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000