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"], 0x42a) 00:21:26 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) 00:21:26 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x6, 0x0, 0x0, 0x0) 00:21:26 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2378.791253] FAULT_INJECTION: forcing a failure. [ 2378.791253] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.791266] CPU: 0 PID: 10629 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2378.791272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 00:21:26 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2378.791275] Call Trace: [ 2378.791291] dump_stack+0x107/0x167 00:21:26 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) [ 2378.791303] should_fail.cold+0x5/0xa [ 2378.791316] should_failslab+0x5/0x20 [ 2378.791328] kmem_cache_alloc_bulk+0x4b/0x320 [ 2378.791343] io_submit_sqes+0x6fe7/0x8610 00:21:26 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c245093"], 0x42a) [ 2378.791368] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2378.791377] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2378.791390] ? find_held_lock+0x2c/0x110 [ 2378.791403] ? io_submit_sqes+0x8610/0x8610 [ 2378.791417] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2378.791428] ? wait_for_completion_io+0x270/0x270 [ 2378.791440] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.791450] ? vfs_write+0x354/0xb10 [ 2378.791461] ? fput_many+0x2f/0x1a0 [ 2378.791471] ? ksys_write+0x1a9/0x260 [ 2378.791482] ? __ia32_sys_read+0xb0/0xb0 [ 2378.791494] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.791509] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.791520] do_syscall_64+0x33/0x40 [ 2378.791531] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2378.791538] RIP: 0033:0x7fa5a9c0bb19 [ 2378.791548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.791553] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2378.791564] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2378.791569] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2378.791575] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.791580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.791586] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2378.888695] FAULT_INJECTION: forcing a failure. [ 2378.888695] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.888709] CPU: 0 PID: 10639 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2378.888715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.888719] Call Trace: [ 2378.888738] dump_stack+0x107/0x167 [ 2378.888750] should_fail.cold+0x5/0xa [ 2378.888763] ? create_object.isra.0+0x3a/0xa30 [ 2378.888774] should_failslab+0x5/0x20 [ 2378.888791] kmem_cache_alloc+0x5b/0x310 [ 2378.888804] create_object.isra.0+0x3a/0xa30 [ 2378.888813] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2378.888826] kmem_cache_alloc_bulk+0x168/0x320 [ 2378.888841] io_submit_sqes+0x6fe7/0x8610 [ 2378.888867] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2378.888876] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2378.888890] ? find_held_lock+0x2c/0x110 [ 2378.888903] ? io_submit_sqes+0x8610/0x8610 [ 2378.888917] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2378.888928] ? wait_for_completion_io+0x270/0x270 [ 2378.888941] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.888950] ? vfs_write+0x354/0xb10 [ 2378.888960] ? fput_many+0x2f/0x1a0 [ 2378.888970] ? ksys_write+0x1a9/0x260 [ 2378.888981] ? __ia32_sys_read+0xb0/0xb0 [ 2378.889000] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.915282] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.915294] do_syscall_64+0x33/0x40 [ 2378.915305] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2378.915312] RIP: 0033:0x7fa5a9c0bb19 [ 2378.915322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.915328] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2378.915339] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2378.915345] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2378.915351] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.915356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.915362] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:21:26 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x600, 0x0, 0x0, 0x0) 00:21:26 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) [ 2379.082038] FAULT_INJECTION: forcing a failure. [ 2379.082038] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2379.082051] CPU: 0 PID: 10653 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2379.082057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2379.082060] Call Trace: [ 2379.082078] dump_stack+0x107/0x167 [ 2379.082090] should_fail.cold+0x5/0xa [ 2379.082105] _copy_from_user+0x2e/0x1b0 [ 2379.082119] move_addr_to_kernel.part.0+0x31/0x110 [ 2379.082131] move_addr_to_kernel+0x4f/0x70 [ 2379.082142] io_connect+0x47a/0x610 [ 2379.082153] ? io_prep_rw+0x1050/0x1050 [ 2379.082175] ? __lock_acquire+0xbb1/0x5b00 [ 2379.082187] io_issue_sqe+0x1611/0x77d0 [ 2379.082202] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2379.082212] ? lock_chain_count+0x20/0x20 [ 2379.082224] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2379.082233] ? io_connect+0x610/0x610 [ 2379.082246] ? lock_acquire+0x197/0x470 [ 2379.082254] ? find_held_lock+0x2c/0x110 [ 2379.082268] ? __fget_files+0x2cf/0x520 [ 2379.082278] ? lock_downgrade+0x6d0/0x6d0 [ 2379.082290] __io_queue_sqe+0x90/0x9d0 [ 2379.082303] ? io_issue_sqe+0x77d0/0x77d0 [ 2379.082311] ? __fget_files+0x2f8/0x520 [ 2379.082329] io_submit_sqes+0x44ab/0x8610 [ 2379.082354] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2379.082363] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2379.082374] ? find_held_lock+0x2c/0x110 [ 2379.082387] ? io_submit_sqes+0x8610/0x8610 [ 2379.082401] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2379.082412] ? wait_for_completion_io+0x270/0x270 [ 2379.082424] ? rcu_read_lock_any_held+0x75/0xa0 [ 2379.082434] ? vfs_write+0x354/0xb10 [ 2379.082444] ? fput_many+0x2f/0x1a0 [ 2379.082454] ? ksys_write+0x1a9/0x260 [ 2379.082464] ? __ia32_sys_read+0xb0/0xb0 [ 2379.082476] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2379.082487] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2379.082499] do_syscall_64+0x33/0x40 [ 2379.082509] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2379.082516] RIP: 0033:0x7fa5a9c0bb19 [ 2379.082526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2379.082531] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2379.082543] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2379.082549] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2379.082554] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2379.082560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2379.082566] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2392.023990] FAULT_INJECTION: forcing a failure. [ 2392.023990] name failslab, interval 1, probability 0, space 0, times 0 00:21:39 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x2000, 0x0, 0x0, 0x0) 00:21:39 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:39 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:39 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:39 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) [ 2392.024004] CPU: 1 PID: 10671 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2392.024010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460200000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:21:39 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:39 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:39 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38) [ 2392.024014] Call Trace: [ 2392.024030] dump_stack+0x107/0x167 [ 2392.024042] should_fail.cold+0x5/0xa [ 2392.024056] ? create_object.isra.0+0x3a/0xa30 [ 2392.024067] should_failslab+0x5/0x20 [ 2392.024080] kmem_cache_alloc+0x5b/0x310 [ 2392.024092] ? mark_held_locks+0x9e/0xe0 [ 2392.024105] create_object.isra.0+0x3a/0xa30 [ 2392.024115] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2392.024130] kmem_cache_alloc_bulk+0x168/0x320 [ 2392.024146] io_submit_sqes+0x6fe7/0x8610 [ 2392.024175] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2392.024187] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2392.024202] ? find_held_lock+0x2c/0x110 [ 2392.024217] ? io_submit_sqes+0x8610/0x8610 [ 2392.024233] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2392.024245] ? wait_for_completion_io+0x270/0x270 [ 2392.024259] ? rcu_read_lock_any_held+0x75/0xa0 [ 2392.024269] ? vfs_write+0x354/0xb10 [ 2392.024280] ? fput_many+0x2f/0x1a0 [ 2392.024292] ? ksys_write+0x1a9/0x260 [ 2392.024303] ? __ia32_sys_read+0xb0/0xb0 [ 2392.024317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2392.024330] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2392.024343] do_syscall_64+0x33/0x40 [ 2392.024354] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2392.024362] RIP: 0033:0x7fa5a9c0bb19 [ 2392.024373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2392.024379] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2392.024392] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2392.024398] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2392.024404] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2392.024410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2392.024417] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:21:50 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39) 00:21:50 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x4000, 0x0, 0x0, 0x0) 00:21:50 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2402.805264] FAULT_INJECTION: forcing a failure. [ 2402.805264] name failslab, interval 1, probability 0, space 0, times 0 [ 2402.807305] CPU: 1 PID: 10699 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2402.808520] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2402.808525] Call Trace: [ 2402.808544] dump_stack+0x107/0x167 [ 2402.808563] should_fail.cold+0x5/0xa [ 2402.808579] ? create_object.isra.0+0x3a/0xa30 [ 2402.808591] should_failslab+0x5/0x20 [ 2402.808606] kmem_cache_alloc+0x5b/0x310 [ 2402.808620] ? mark_held_locks+0x9e/0xe0 [ 2402.808635] create_object.isra.0+0x3a/0xa30 [ 2402.808645] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2402.808662] kmem_cache_alloc_bulk+0x168/0x320 [ 2402.808680] io_submit_sqes+0x6fe7/0x8610 00:21:50 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40) [ 2402.808712] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2402.808723] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2402.808737] ? find_held_lock+0x2c/0x110 [ 2402.808753] ? io_submit_sqes+0x8610/0x8610 [ 2402.808770] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2402.808784] ? wait_for_completion_io+0x270/0x270 [ 2402.808799] ? rcu_read_lock_any_held+0x75/0xa0 [ 2402.808810] ? vfs_write+0x354/0xb10 [ 2402.808823] ? fput_many+0x2f/0x1a0 [ 2402.808836] ? ksys_write+0x1a9/0x260 [ 2402.808849] ? __ia32_sys_read+0xb0/0xb0 [ 2402.808864] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2402.808878] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2402.808892] do_syscall_64+0x33/0x40 [ 2402.808905] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2402.808914] RIP: 0033:0x7fa5a9c0bb19 [ 2402.808925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2402.808932] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2402.808946] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2402.808953] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2402.808961] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2402.808968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2402.808976] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2402.895606] FAULT_INJECTION: forcing a failure. [ 2402.895606] name failslab, interval 1, probability 0, space 0, times 0 [ 2402.899426] CPU: 0 PID: 10706 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2402.899438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2402.899444] Call Trace: [ 2402.899472] dump_stack+0x107/0x167 [ 2402.899496] should_fail.cold+0x5/0xa [ 2402.899533] ? create_object.isra.0+0x3a/0xa30 [ 2402.899560] should_failslab+0x5/0x20 [ 2402.899588] kmem_cache_alloc+0x5b/0x310 [ 2402.899617] ? mark_held_locks+0x9e/0xe0 [ 2402.899651] create_object.isra.0+0x3a/0xa30 [ 2402.899670] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2402.899699] kmem_cache_alloc_bulk+0x168/0x320 [ 2402.899728] io_submit_sqes+0x6fe7/0x8610 [ 2402.899781] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2402.899801] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2402.899826] ? find_held_lock+0x2c/0x110 [ 2402.899853] ? io_submit_sqes+0x8610/0x8610 [ 2402.899881] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2402.899904] ? wait_for_completion_io+0x270/0x270 [ 2402.899929] ? rcu_read_lock_any_held+0x75/0xa0 [ 2402.899948] ? vfs_write+0x354/0xb10 [ 2402.899969] ? fput_many+0x2f/0x1a0 [ 2402.899992] ? ksys_write+0x1a9/0x260 [ 2402.900013] ? __ia32_sys_read+0xb0/0xb0 [ 2402.900039] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2402.900061] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2402.900085] do_syscall_64+0x33/0x40 [ 2402.900107] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2402.900120] RIP: 0033:0x7fa5a9c0bb19 [ 2402.900139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2402.900150] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2402.900173] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2402.900184] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2402.900196] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2402.900207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2402.900219] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:21:50 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x400000, 0x0, 0x0, 0x0) 00:21:50 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460500000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:21:50 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41) 00:21:50 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2403.188260] FAULT_INJECTION: forcing a failure. [ 2403.188260] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.188274] CPU: 1 PID: 10727 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2403.188280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.188283] Call Trace: [ 2403.188300] dump_stack+0x107/0x167 [ 2403.188313] should_fail.cold+0x5/0xa [ 2403.188326] ? create_object.isra.0+0x3a/0xa30 [ 2403.188337] should_failslab+0x5/0x20 [ 2403.188349] kmem_cache_alloc+0x5b/0x310 [ 2403.188361] ? mark_held_locks+0x9e/0xe0 [ 2403.188374] create_object.isra.0+0x3a/0xa30 [ 2403.188383] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2403.188398] kmem_cache_alloc_bulk+0x168/0x320 [ 2403.188414] io_submit_sqes+0x6fe7/0x8610 [ 2403.188441] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2403.188451] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2403.188464] ? find_held_lock+0x2c/0x110 [ 2403.188478] ? io_submit_sqes+0x8610/0x8610 [ 2403.188493] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2403.188505] ? wait_for_completion_io+0x270/0x270 [ 2403.188519] ? rcu_read_lock_any_held+0x75/0xa0 [ 2403.188529] ? vfs_write+0x354/0xb10 [ 2403.188539] ? fput_many+0x2f/0x1a0 [ 2403.188551] ? ksys_write+0x1a9/0x260 [ 2403.188562] ? __ia32_sys_read+0xb0/0xb0 [ 2403.188575] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2403.188588] ? syscall_enter_from_user_mode+0x1d/0x50 00:21:50 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x800000, 0x0, 0x0, 0x0) [ 2403.188600] do_syscall_64+0x33/0x40 [ 2403.188612] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2403.188619] RIP: 0033:0x7fa5a9c0bb19 [ 2403.188630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.188635] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2403.188647] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2403.188653] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2403.188659] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2403.188665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.188671] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:21:50 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 1: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x400000, 0x0, 0x0, 0x0) 00:21:50 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:21:50 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42) [ 2403.396800] FAULT_INJECTION: forcing a failure. [ 2403.396800] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.396888] CPU: 0 PID: 10749 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2403.396898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.396904] Call Trace: [ 2403.396929] dump_stack+0x107/0x167 [ 2403.396951] should_fail.cold+0x5/0xa [ 2403.396972] ? create_object.isra.0+0x3a/0xa30 [ 2403.396990] should_failslab+0x5/0x20 [ 2403.397010] kmem_cache_alloc+0x5b/0x310 [ 2403.397029] ? mark_held_locks+0x9e/0xe0 [ 2403.397053] create_object.isra.0+0x3a/0xa30 [ 2403.397069] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2403.397095] kmem_cache_alloc_bulk+0x168/0x320 [ 2403.397123] io_submit_sqes+0x6fe7/0x8610 [ 2403.397173] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2403.397191] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2403.397214] ? find_held_lock+0x2c/0x110 [ 2403.397240] ? io_submit_sqes+0x8610/0x8610 [ 2403.397266] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2403.397288] ? wait_for_completion_io+0x270/0x270 [ 2403.397311] ? rcu_read_lock_any_held+0x75/0xa0 [ 2403.397329] ? vfs_write+0x354/0xb10 [ 2403.397349] ? fput_many+0x2f/0x1a0 [ 2403.397369] ? ksys_write+0x1a9/0x260 [ 2403.397390] ? __ia32_sys_read+0xb0/0xb0 [ 2403.397414] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2403.397435] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2403.397458] do_syscall_64+0x33/0x40 [ 2403.397478] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2403.397491] RIP: 0033:0x7fa5a9c0bb19 [ 2403.397509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.397520] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2403.397541] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2403.397552] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2403.397563] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2403.397574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.397585] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:03 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c464f00000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:22:03 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43) 00:22:03 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c463e00000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:22:03 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:04 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:04 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x2000000, 0x0, 0x0, 0x0) 00:22:04 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460700000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:22:04 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2416.530737] FAULT_INJECTION: forcing a failure. [ 2416.530737] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.530752] CPU: 0 PID: 10763 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2416.530757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2416.530761] Call Trace: [ 2416.530777] dump_stack+0x107/0x167 [ 2416.530803] should_fail.cold+0x5/0xa [ 2416.536240] ? create_object.isra.0+0x3a/0xa30 [ 2416.536251] should_failslab+0x5/0x20 [ 2416.536264] kmem_cache_alloc+0x5b/0x310 [ 2416.536276] ? mark_held_locks+0x9e/0xe0 [ 2416.536288] create_object.isra.0+0x3a/0xa30 [ 2416.536297] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2416.536312] kmem_cache_alloc_bulk+0x168/0x320 [ 2416.536328] io_submit_sqes+0x6fe7/0x8610 [ 2416.536355] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2416.536364] __do_sys_io_uring_enter+0x6b2/0x1890 00:22:04 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x6000000, 0x0, 0x0, 0x0) [ 2416.536377] ? find_held_lock+0x2c/0x110 [ 2416.536390] ? io_submit_sqes+0x8610/0x8610 [ 2416.536405] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2416.536417] ? wait_for_completion_io+0x270/0x270 [ 2416.536430] ? rcu_read_lock_any_held+0x75/0xa0 [ 2416.536439] ? vfs_write+0x354/0xb10 00:22:04 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44) [ 2416.536450] ? fput_many+0x2f/0x1a0 [ 2416.536462] ? ksys_write+0x1a9/0x260 [ 2416.536472] ? __ia32_sys_read+0xb0/0xb0 [ 2416.536486] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2416.536497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2416.536510] do_syscall_64+0x33/0x40 [ 2416.536521] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2416.536528] RIP: 0033:0x7fa5a9c0bb19 [ 2416.536539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2416.536544] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2416.536557] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2416.536563] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2416.536569] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2416.536575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2416.536581] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2416.631167] FAULT_INJECTION: forcing a failure. [ 2416.631167] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2416.631180] CPU: 0 PID: 10780 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2416.631186] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2416.631189] Call Trace: [ 2416.631205] dump_stack+0x107/0x167 [ 2416.631218] should_fail.cold+0x5/0xa [ 2416.631233] _copy_from_user+0x2e/0x1b0 [ 2416.631249] move_addr_to_kernel.part.0+0x31/0x110 [ 2416.631261] move_addr_to_kernel+0x4f/0x70 [ 2416.631273] io_connect+0x47a/0x610 [ 2416.631285] ? io_prep_rw+0x1050/0x1050 [ 2416.631302] ? lock_acquire+0x197/0x470 [ 2416.631316] ? __lock_acquire+0xbb1/0x5b00 [ 2416.631329] io_issue_sqe+0x1611/0x77d0 [ 2416.631344] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2416.631354] ? lock_chain_count+0x20/0x20 [ 2416.631366] ? __is_insn_slot_addr+0x14c/0x290 [ 2416.631377] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2416.631387] ? io_connect+0x610/0x610 [ 2416.631401] ? lock_acquire+0x197/0x470 [ 2416.631410] ? find_held_lock+0x2c/0x110 [ 2416.631425] ? __fget_files+0x2cf/0x520 [ 2416.631435] ? lock_downgrade+0x6d0/0x6d0 [ 2416.631449] __io_queue_sqe+0x90/0x9d0 [ 2416.631462] ? io_issue_sqe+0x77d0/0x77d0 [ 2416.631471] ? __fget_files+0x2f8/0x520 [ 2416.631489] io_submit_sqes+0x44ab/0x8610 [ 2416.631515] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2416.631524] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2416.631536] ? find_held_lock+0x2c/0x110 [ 2416.631549] ? io_submit_sqes+0x8610/0x8610 [ 2416.631565] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2416.631577] ? wait_for_completion_io+0x270/0x270 [ 2416.631589] ? rcu_read_lock_any_held+0x75/0xa0 [ 2416.631600] ? vfs_write+0x354/0xb10 [ 2416.631611] ? fput_many+0x2f/0x1a0 [ 2416.631622] ? ksys_write+0x1a9/0x260 [ 2416.631632] ? __ia32_sys_read+0xb0/0xb0 [ 2416.631645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2416.631656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2416.631669] do_syscall_64+0x33/0x40 [ 2416.631679] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2416.631687] RIP: 0033:0x7fa5a9c0bb19 [ 2416.631704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2416.631710] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2416.631721] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2416.631727] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2416.631733] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2416.631739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2416.631744] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:17 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:17 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:17 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x20000000, 0x0, 0x0, 0x0) 00:22:17 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460800000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:22:17 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45) 00:22:17 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:17 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:17 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:17 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c468001000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2430.204356] FAULT_INJECTION: forcing a failure. [ 2430.204356] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2430.204369] CPU: 0 PID: 10809 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2430.204374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2430.204378] Call Trace: [ 2430.204394] dump_stack+0x107/0x167 [ 2430.204406] should_fail.cold+0x5/0xa [ 2430.204422] _copy_from_user+0x2e/0x1b0 [ 2430.204438] move_addr_to_kernel.part.0+0x31/0x110 [ 2430.204450] move_addr_to_kernel+0x4f/0x70 [ 2430.204462] io_connect+0x47a/0x610 [ 2430.204474] ? io_prep_rw+0x1050/0x1050 [ 2430.204497] ? __lock_acquire+0xbb1/0x5b00 [ 2430.204510] io_issue_sqe+0x1611/0x77d0 [ 2430.204526] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2430.204537] ? lock_chain_count+0x20/0x20 [ 2430.204548] ? __is_insn_slot_addr+0x14c/0x290 [ 2430.204560] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 00:22:17 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x40000000, 0x0, 0x0, 0x0) [ 2430.204570] ? io_connect+0x610/0x610 [ 2430.204584] ? lock_acquire+0x197/0x470 [ 2430.204593] ? find_held_lock+0x2c/0x110 [ 2430.204608] ? __fget_files+0x2cf/0x520 [ 2430.204619] ? lock_downgrade+0x6d0/0x6d0 [ 2430.204632] __io_queue_sqe+0x90/0x9d0 [ 2430.204647] ? io_issue_sqe+0x77d0/0x77d0 [ 2430.204655] ? __fget_files+0x2f8/0x520 [ 2430.204674] io_submit_sqes+0x44ab/0x8610 [ 2430.204701] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2430.204711] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2430.204723] ? find_held_lock+0x2c/0x110 [ 2430.204737] ? io_submit_sqes+0x8610/0x8610 [ 2430.204752] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2430.204764] ? wait_for_completion_io+0x270/0x270 [ 2430.204777] ? rcu_read_lock_any_held+0x75/0xa0 [ 2430.204792] ? vfs_write+0x354/0xb10 [ 2430.204803] ? fput_many+0x2f/0x1a0 [ 2430.204814] ? ksys_write+0x1a9/0x260 [ 2430.204825] ? __ia32_sys_read+0xb0/0xb0 [ 2430.204839] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2430.204851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2430.204863] do_syscall_64+0x33/0x40 [ 2430.204874] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2430.204882] RIP: 0033:0x7fa5a9c0bb19 [ 2430.204892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2430.204897] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2430.204909] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2430.204915] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 00:22:17 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46) [ 2430.204921] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2430.204927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2430.204933] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:17 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x2, 0x0, 0x0) [ 2430.380749] FAULT_INJECTION: forcing a failure. [ 2430.380749] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2430.380771] CPU: 1 PID: 10820 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2430.380786] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2430.380793] Call Trace: [ 2430.380817] dump_stack+0x107/0x167 [ 2430.380840] should_fail.cold+0x5/0xa [ 2430.380867] _copy_from_user+0x2e/0x1b0 [ 2430.380894] move_addr_to_kernel.part.0+0x31/0x110 [ 2430.380917] move_addr_to_kernel+0x4f/0x70 [ 2430.380938] io_connect+0x47a/0x610 00:22:17 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2430.380960] ? io_prep_rw+0x1050/0x1050 00:22:17 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460900000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2430.380977] ? trace_hardirqs_on+0x5b/0x180 [ 2430.381000] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2430.381027] ? io_issue_sqe+0x134/0x77d0 [ 2430.381049] ? write_comp_data+0xa/0x80 [ 2430.381075] io_issue_sqe+0x1611/0x77d0 [ 2430.381106] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2430.381126] ? lock_chain_count+0x20/0x20 [ 2430.381145] ? __is_insn_slot_addr+0x14c/0x290 [ 2430.381167] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2430.381185] ? io_connect+0x610/0x610 [ 2430.381210] ? lock_acquire+0x197/0x470 [ 2430.381228] ? find_held_lock+0x2c/0x110 [ 2430.381254] ? __fget_files+0x2cf/0x520 [ 2430.381273] ? lock_downgrade+0x6d0/0x6d0 [ 2430.381298] __io_queue_sqe+0x90/0x9d0 [ 2430.381324] ? io_issue_sqe+0x77d0/0x77d0 [ 2430.381341] ? __fget_files+0x2f8/0x520 [ 2430.381376] io_submit_sqes+0x44ab/0x8610 [ 2430.381425] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2430.381443] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2430.381466] ? find_held_lock+0x2c/0x110 [ 2430.381491] ? io_submit_sqes+0x8610/0x8610 [ 2430.381516] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2430.381537] ? wait_for_completion_io+0x270/0x270 [ 2430.381560] ? rcu_read_lock_any_held+0x75/0xa0 00:22:17 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x6, 0x0, 0x0) [ 2430.381579] ? vfs_write+0x354/0xb10 [ 2430.381598] ? fput_many+0x2f/0x1a0 [ 2430.381619] ? ksys_write+0x1a9/0x260 [ 2430.381639] ? __ia32_sys_read+0xb0/0xb0 [ 2430.381663] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2430.381684] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2430.381706] do_syscall_64+0x33/0x40 [ 2430.381725] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2430.381738] RIP: 0033:0x7fa5a9c0bb19 [ 2430.381756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:22:18 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2430.381766] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2430.381787] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2430.381798] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2430.381808] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2430.381819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2430.381830] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:18 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:18 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47) [ 2430.633938] FAULT_INJECTION: forcing a failure. [ 2430.633938] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.635445] CPU: 0 PID: 10842 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2430.635452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2430.635455] Call Trace: [ 2430.635472] dump_stack+0x107/0x167 [ 2430.635484] should_fail.cold+0x5/0xa [ 2430.635497] ? create_object.isra.0+0x3a/0xa30 [ 2430.635507] should_failslab+0x5/0x20 [ 2430.635518] kmem_cache_alloc+0x5b/0x310 [ 2430.635529] ? mark_held_locks+0x9e/0xe0 [ 2430.635540] create_object.isra.0+0x3a/0xa30 [ 2430.635549] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2430.635562] kmem_cache_alloc_bulk+0x168/0x320 [ 2430.635577] io_submit_sqes+0x6fe7/0x8610 [ 2430.635602] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2430.635611] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2430.635622] ? find_held_lock+0x2c/0x110 [ 2430.635635] ? io_submit_sqes+0x8610/0x8610 [ 2430.635649] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2430.635660] ? wait_for_completion_io+0x270/0x270 [ 2430.635672] ? rcu_read_lock_any_held+0x75/0xa0 [ 2430.635682] ? vfs_write+0x354/0xb10 [ 2430.635692] ? fput_many+0x2f/0x1a0 [ 2430.635702] ? ksys_write+0x1a9/0x260 [ 2430.635712] ? __ia32_sys_read+0xb0/0xb0 [ 2430.635725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2430.635735] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2430.635756] do_syscall_64+0x33/0x40 [ 2430.650101] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2430.650108] RIP: 0033:0x7fa5a9c0bb19 [ 2430.650118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2430.650123] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2430.650134] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2430.650140] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2430.650145] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2430.650150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2430.650156] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:30 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:30 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x600, 0x0, 0x0) 00:22:30 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:30 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:30 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:30 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48) 00:22:30 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:30 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2443.187627] FAULT_INJECTION: forcing a failure. [ 2443.187627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2443.187651] CPU: 0 PID: 10856 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2443.187662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2443.187668] Call Trace: [ 2443.187694] dump_stack+0x107/0x167 [ 2443.187715] should_fail.cold+0x5/0xa [ 2443.187741] _copy_from_user+0x2e/0x1b0 [ 2443.187766] move_addr_to_kernel.part.0+0x31/0x110 [ 2443.187794] move_addr_to_kernel+0x4f/0x70 [ 2443.187814] io_connect+0x47a/0x610 00:22:30 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x2000, 0x0, 0x0) [ 2443.187834] ? io_prep_rw+0x1050/0x1050 [ 2443.187874] ? __lock_acquire+0xbb1/0x5b00 [ 2443.187897] io_issue_sqe+0x1611/0x77d0 [ 2443.187925] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2443.187943] ? lock_chain_count+0x20/0x20 [ 2443.187961] ? __is_insn_slot_addr+0x14c/0x290 [ 2443.187982] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2443.187999] ? io_connect+0x610/0x610 [ 2443.188032] ? lock_acquire+0x197/0x470 [ 2443.188049] ? find_held_lock+0x2c/0x110 [ 2443.188074] ? __fget_files+0x2cf/0x520 [ 2443.188092] ? lock_downgrade+0x6d0/0x6d0 [ 2443.188114] __io_queue_sqe+0x90/0x9d0 [ 2443.188139] ? io_issue_sqe+0x77d0/0x77d0 [ 2443.188154] ? __fget_files+0x2f8/0x520 [ 2443.188186] io_submit_sqes+0x44ab/0x8610 [ 2443.188233] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2443.188249] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2443.188270] ? find_held_lock+0x2c/0x110 [ 2443.188293] ? io_submit_sqes+0x8610/0x8610 [ 2443.188317] ? __mutex_unlock_slowpath+0xe1/0x600 00:22:30 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x4000, 0x0, 0x0) [ 2443.188337] ? wait_for_completion_io+0x270/0x270 [ 2443.188358] ? rcu_read_lock_any_held+0x75/0xa0 [ 2443.188375] ? vfs_write+0x354/0xb10 [ 2443.188393] ? fput_many+0x2f/0x1a0 00:22:30 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49) [ 2443.188412] ? ksys_write+0x1a9/0x260 [ 2443.188431] ? __ia32_sys_read+0xb0/0xb0 [ 2443.188454] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2443.188473] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.188494] do_syscall_64+0x33/0x40 [ 2443.188512] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2443.188524] RIP: 0033:0x7fa5a9c0bb19 [ 2443.188541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.188551] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2443.188571] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2443.188581] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2443.188591] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.188601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.188612] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2443.361237] FAULT_INJECTION: forcing a failure. [ 2443.361237] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2443.367269] CPU: 1 PID: 10875 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2443.367283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2443.367290] Call Trace: [ 2443.367319] dump_stack+0x107/0x167 [ 2443.367345] should_fail.cold+0x5/0xa [ 2443.367375] _copy_from_user+0x2e/0x1b0 [ 2443.367407] move_addr_to_kernel.part.0+0x31/0x110 [ 2443.367433] move_addr_to_kernel+0x4f/0x70 [ 2443.367459] io_connect+0x47a/0x610 [ 2443.367485] ? io_prep_rw+0x1050/0x1050 [ 2443.367534] ? __lock_acquire+0xbb1/0x5b00 [ 2443.367562] io_issue_sqe+0x1611/0x77d0 [ 2443.367597] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2443.380066] ? lock_chain_count+0x20/0x20 [ 2443.380090] ? __is_insn_slot_addr+0x14c/0x290 [ 2443.380117] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2443.380138] ? io_connect+0x610/0x610 [ 2443.380166] ? lock_acquire+0x197/0x470 [ 2443.380188] ? find_held_lock+0x2c/0x110 [ 2443.380219] ? __fget_files+0x2cf/0x520 [ 2443.380241] ? lock_downgrade+0x6d0/0x6d0 [ 2443.380270] __io_queue_sqe+0x90/0x9d0 [ 2443.380301] ? io_issue_sqe+0x77d0/0x77d0 [ 2443.380321] ? __fget_files+0x2f8/0x520 [ 2443.380363] io_submit_sqes+0x44ab/0x8610 [ 2443.390831] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2443.390852] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2443.390879] ? find_held_lock+0x2c/0x110 [ 2443.390910] ? io_submit_sqes+0x8610/0x8610 [ 2443.390940] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2443.390965] ? wait_for_completion_io+0x270/0x270 [ 2443.390991] ? rcu_read_lock_any_held+0x75/0xa0 [ 2443.391013] ? vfs_write+0x354/0xb10 [ 2443.391036] ? fput_many+0x2f/0x1a0 [ 2443.391063] ? ksys_write+0x1a9/0x260 [ 2443.391086] ? __ia32_sys_read+0xb0/0xb0 [ 2443.391113] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2443.391136] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.391160] do_syscall_64+0x33/0x40 [ 2443.391182] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2443.391196] RIP: 0033:0x7fa5a9c0bb19 [ 2443.391217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.391228] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2443.391252] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2443.391273] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2443.414365] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 00:22:30 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x400000, 0x0, 0x0) [ 2443.414377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.414389] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:30 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:31 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c469f03000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:22:31 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x800000, 0x0, 0x0) 00:22:31 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000b000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:22:31 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c468001000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:22:31 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:31 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:31 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50) [ 2443.752461] FAULT_INJECTION: forcing a failure. [ 2443.752461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2443.752482] CPU: 1 PID: 10907 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2443.752492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2443.752498] Call Trace: [ 2443.752523] dump_stack+0x107/0x167 [ 2443.752544] should_fail.cold+0x5/0xa [ 2443.752570] _copy_from_user+0x2e/0x1b0 [ 2443.752595] move_addr_to_kernel.part.0+0x31/0x110 [ 2443.752617] move_addr_to_kernel+0x4f/0x70 [ 2443.752637] io_connect+0x47a/0x610 [ 2443.752657] ? io_prep_rw+0x1050/0x1050 [ 2443.752696] ? __lock_acquire+0xbb1/0x5b00 [ 2443.752719] io_issue_sqe+0x1611/0x77d0 [ 2443.752747] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2443.752765] ? lock_chain_count+0x20/0x20 [ 2443.752790] ? __is_insn_slot_addr+0x14c/0x290 [ 2443.752811] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2443.752827] ? io_connect+0x610/0x610 [ 2443.752851] ? lock_acquire+0x197/0x470 [ 2443.752867] ? find_held_lock+0x2c/0x110 [ 2443.752891] ? __fget_files+0x2cf/0x520 [ 2443.752909] ? lock_downgrade+0x6d0/0x6d0 [ 2443.752932] __io_queue_sqe+0x90/0x9d0 [ 2443.752956] ? io_issue_sqe+0x77d0/0x77d0 [ 2443.752972] ? __fget_files+0x2f8/0x520 [ 2443.753004] io_submit_sqes+0x44ab/0x8610 [ 2443.753051] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2443.753067] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2443.753088] ? find_held_lock+0x2c/0x110 [ 2443.753111] ? io_submit_sqes+0x8610/0x8610 [ 2443.753136] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2443.753156] ? wait_for_completion_io+0x270/0x270 [ 2443.753177] ? rcu_read_lock_any_held+0x75/0xa0 [ 2443.753195] ? vfs_write+0x354/0xb10 [ 2443.753213] ? fput_many+0x2f/0x1a0 [ 2443.753232] ? ksys_write+0x1a9/0x260 [ 2443.753251] ? __ia32_sys_read+0xb0/0xb0 [ 2443.753274] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2443.753293] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.753314] do_syscall_64+0x33/0x40 [ 2443.753333] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2443.753345] RIP: 0033:0x7fa5a9c0bb19 [ 2443.753363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.753373] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2443.753393] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2443.753403] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2443.753414] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.753424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.753435] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:43 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:43 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:43 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:43 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:43 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:43 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x2000000, 0x0, 0x0) 00:22:43 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51) 00:22:43 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460003000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2456.535395] FAULT_INJECTION: forcing a failure. [ 2456.535395] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2456.535416] CPU: 0 PID: 10931 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2456.535432] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.535437] Call Trace: [ 2456.535463] dump_stack+0x107/0x167 [ 2456.535490] should_fail.cold+0x5/0xa [ 2456.543483] _copy_from_user+0x2e/0x1b0 [ 2456.543515] move_addr_to_kernel.part.0+0x31/0x110 [ 2456.543537] move_addr_to_kernel+0x4f/0x70 [ 2456.543558] io_connect+0x47a/0x610 [ 2456.543579] ? io_prep_rw+0x1050/0x1050 [ 2456.543619] ? __lock_acquire+0xbb1/0x5b00 [ 2456.543643] io_issue_sqe+0x1611/0x77d0 [ 2456.543672] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.543690] ? lock_chain_count+0x20/0x20 [ 2456.543709] ? __is_insn_slot_addr+0x14c/0x290 [ 2456.543730] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.543747] ? io_connect+0x610/0x610 [ 2456.543771] ? lock_acquire+0x197/0x470 [ 2456.543788] ? find_held_lock+0x2c/0x110 [ 2456.543813] ? __fget_files+0x2cf/0x520 [ 2456.543832] ? lock_downgrade+0x6d0/0x6d0 [ 2456.543855] __io_queue_sqe+0x90/0x9d0 [ 2456.543880] ? io_issue_sqe+0x77d0/0x77d0 [ 2456.543896] ? __fget_files+0x2f8/0x520 [ 2456.543930] io_submit_sqes+0x44ab/0x8610 [ 2456.543977] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2456.543995] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2456.544016] ? find_held_lock+0x2c/0x110 [ 2456.544040] ? io_submit_sqes+0x8610/0x8610 [ 2456.544065] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2456.544085] ? wait_for_completion_io+0x270/0x270 [ 2456.544107] ? rcu_read_lock_any_held+0x75/0xa0 [ 2456.544125] ? vfs_write+0x354/0xb10 [ 2456.544143] ? fput_many+0x2f/0x1a0 [ 2456.544163] ? ksys_write+0x1a9/0x260 [ 2456.544208] ? __ia32_sys_read+0xb0/0xb0 [ 2456.572684] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.572710] ? syscall_enter_from_user_mode+0x1d/0x50 00:22:44 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x6000000, 0x0, 0x0) [ 2456.572732] do_syscall_64+0x33/0x40 [ 2456.572751] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2456.572764] RIP: 0033:0x7fa5a9c0bb19 [ 2456.572781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:22:44 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2456.572791] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2456.572811] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2456.572821] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2456.572831] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.572840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.572851] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:44 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:56 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:56 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:22:56 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000d000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:22:56 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x20000000, 0x0, 0x0) 00:22:56 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000c000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:22:56 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52) 00:22:56 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2469.101273] FAULT_INJECTION: forcing a failure. [ 2469.101273] name failslab, interval 1, probability 0, space 0, times 0 [ 2469.102691] CPU: 1 PID: 10964 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2469.103534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.104545] Call Trace: [ 2469.104873] dump_stack+0x107/0x167 [ 2469.105316] should_fail.cold+0x5/0xa [ 2469.105783] should_failslab+0x5/0x20 [ 2469.106242] kmem_cache_alloc_bulk+0x4b/0x320 [ 2469.106786] io_submit_sqes+0x6fe7/0x8610 [ 2469.107302] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.107906] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.108499] ? find_held_lock+0x2c/0x110 [ 2469.108993] ? io_submit_sqes+0x8610/0x8610 [ 2469.109518] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2469.110101] ? wait_for_completion_io+0x270/0x270 [ 2469.110682] ? rcu_read_lock_any_held+0x75/0xa0 [ 2469.111242] ? vfs_write+0x354/0xb10 [ 2469.111695] ? fput_many+0x2f/0x1a0 [ 2469.112135] ? ksys_write+0x1a9/0x260 [ 2469.112603] ? __ia32_sys_read+0xb0/0xb0 [ 2469.113094] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.113726] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.114349] do_syscall_64+0x33/0x40 [ 2469.114802] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2469.115419] RIP: 0033:0x7fa5a9c0bb19 [ 2469.115868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.118089] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2469.119008] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2469.119869] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2469.120736] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.121599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2469.121606] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:56 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53) 00:22:56 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x40000000, 0x0, 0x0) 00:22:56 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2469.210322] FAULT_INJECTION: forcing a failure. [ 2469.210322] name failslab, interval 1, probability 0, space 0, times 0 [ 2469.210335] CPU: 1 PID: 10980 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2469.210341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.210344] Call Trace: [ 2469.210359] dump_stack+0x107/0x167 [ 2469.210371] should_fail.cold+0x5/0xa [ 2469.210383] ? create_object.isra.0+0x3a/0xa30 [ 2469.210394] should_failslab+0x5/0x20 00:22:56 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54) [ 2469.210404] kmem_cache_alloc+0x5b/0x310 [ 2469.210417] create_object.isra.0+0x3a/0xa30 [ 2469.210426] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2469.210439] kmem_cache_alloc_bulk+0x168/0x320 [ 2469.210454] io_submit_sqes+0x6fe7/0x8610 00:22:56 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c466f06000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2469.210479] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.210489] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.210502] ? find_held_lock+0x2c/0x110 00:22:56 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000e000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2469.210515] ? io_submit_sqes+0x8610/0x8610 [ 2469.210529] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2469.210540] ? wait_for_completion_io+0x270/0x270 [ 2469.210553] ? rcu_read_lock_any_held+0x75/0xa0 00:22:56 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x40000000000000, 0x0, 0x0) [ 2469.210562] ? vfs_write+0x354/0xb10 00:22:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2469.210572] ? fput_many+0x2f/0x1a0 [ 2469.210583] ? ksys_write+0x1a9/0x260 [ 2469.210594] ? __ia32_sys_read+0xb0/0xb0 00:22:56 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55) [ 2469.210606] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.210617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.210629] do_syscall_64+0x33/0x40 [ 2469.210639] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2469.210646] RIP: 0033:0x7fa5a9c0bb19 [ 2469.210656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.210662] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2469.210673] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2469.210679] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2469.210685] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.210690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:22:56 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56) [ 2469.210696] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2469.298061] FAULT_INJECTION: forcing a failure. [ 2469.298061] name failslab, interval 1, probability 0, space 0, times 0 [ 2469.298074] CPU: 1 PID: 10990 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2469.298079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.298083] Call Trace: [ 2469.298098] dump_stack+0x107/0x167 [ 2469.298109] should_fail.cold+0x5/0xa [ 2469.298122] ? create_object.isra.0+0x3a/0xa30 [ 2469.298132] should_failslab+0x5/0x20 [ 2469.298143] kmem_cache_alloc+0x5b/0x310 [ 2469.298154] ? mark_held_locks+0x9e/0xe0 [ 2469.298166] create_object.isra.0+0x3a/0xa30 [ 2469.298174] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2469.298187] kmem_cache_alloc_bulk+0x168/0x320 [ 2469.298202] io_submit_sqes+0x6fe7/0x8610 [ 2469.298227] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.298236] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.298247] ? find_held_lock+0x2c/0x110 [ 2469.298260] ? io_submit_sqes+0x8610/0x8610 [ 2469.298274] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2469.298285] ? wait_for_completion_io+0x270/0x270 [ 2469.298298] ? rcu_read_lock_any_held+0x75/0xa0 [ 2469.298306] ? vfs_write+0x354/0xb10 [ 2469.298317] ? fput_many+0x2f/0x1a0 [ 2469.298327] ? ksys_write+0x1a9/0x260 [ 2469.298338] ? __ia32_sys_read+0xb0/0xb0 [ 2469.298350] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.298361] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.298372] do_syscall_64+0x33/0x40 [ 2469.298383] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2469.298390] RIP: 0033:0x7fa5a9c0bb19 [ 2469.298399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.298405] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2469.298416] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2469.298422] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2469.298427] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.298433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2469.298439] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2469.372569] FAULT_INJECTION: forcing a failure. [ 2469.372569] name failslab, interval 1, probability 0, space 0, times 0 [ 2469.372581] CPU: 1 PID: 10996 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2469.372587] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.372590] Call Trace: [ 2469.372607] dump_stack+0x107/0x167 [ 2469.372619] should_fail.cold+0x5/0xa [ 2469.372631] ? create_object.isra.0+0x3a/0xa30 [ 2469.372641] should_failslab+0x5/0x20 [ 2469.372652] kmem_cache_alloc+0x5b/0x310 [ 2469.372668] ? mark_held_locks+0x9e/0xe0 [ 2469.372679] create_object.isra.0+0x3a/0xa30 [ 2469.372688] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2469.372701] kmem_cache_alloc_bulk+0x168/0x320 [ 2469.372716] io_submit_sqes+0x6fe7/0x8610 [ 2469.372741] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.372750] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.372761] ? find_held_lock+0x2c/0x110 [ 2469.372774] ? io_submit_sqes+0x8610/0x8610 [ 2469.372788] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2469.372799] ? wait_for_completion_io+0x270/0x270 [ 2469.372811] ? rcu_read_lock_any_held+0x75/0xa0 [ 2469.372820] ? vfs_write+0x354/0xb10 [ 2469.372830] ? fput_many+0x2f/0x1a0 [ 2469.372840] ? ksys_write+0x1a9/0x260 [ 2469.372850] ? __ia32_sys_read+0xb0/0xb0 [ 2469.372862] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.372873] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.372884] do_syscall_64+0x33/0x40 [ 2469.372894] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2469.372901] RIP: 0033:0x7fa5a9c0bb19 [ 2469.372910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.372915] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2469.372926] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2469.372932] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2469.372937] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.372943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2469.372949] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2469.442158] FAULT_INJECTION: forcing a failure. [ 2469.442158] name failslab, interval 1, probability 0, space 0, times 0 [ 2469.442171] CPU: 1 PID: 11003 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2469.442177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.442180] Call Trace: [ 2469.442196] dump_stack+0x107/0x167 [ 2469.442208] should_fail.cold+0x5/0xa [ 2469.442220] ? create_object.isra.0+0x3a/0xa30 [ 2469.442231] should_failslab+0x5/0x20 [ 2469.442242] kmem_cache_alloc+0x5b/0x310 [ 2469.442253] ? mark_held_locks+0x9e/0xe0 [ 2469.442265] create_object.isra.0+0x3a/0xa30 [ 2469.442273] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2469.442286] kmem_cache_alloc_bulk+0x168/0x320 [ 2469.442301] io_submit_sqes+0x6fe7/0x8610 [ 2469.442326] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.442335] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.442351] ? find_held_lock+0x2c/0x110 [ 2469.442363] ? io_submit_sqes+0x8610/0x8610 [ 2469.442378] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2469.442389] ? wait_for_completion_io+0x270/0x270 [ 2469.442401] ? rcu_read_lock_any_held+0x75/0xa0 [ 2469.442410] ? vfs_write+0x354/0xb10 [ 2469.442420] ? fput_many+0x2f/0x1a0 [ 2469.442431] ? ksys_write+0x1a9/0x260 [ 2469.442441] ? __ia32_sys_read+0xb0/0xb0 [ 2469.442453] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.442464] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.442475] do_syscall_64+0x33/0x40 [ 2469.442485] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2469.442492] RIP: 0033:0x7fa5a9c0bb19 [ 2469.442502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.442507] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2469.442518] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2469.442524] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2469.442537] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.506233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2469.506239] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:22:57 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x80000000000000, 0x0, 0x0) 00:22:57 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57) 00:22:57 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460009000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2469.611892] FAULT_INJECTION: forcing a failure. [ 2469.611892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2469.613272] CPU: 1 PID: 11012 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2469.614068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.615023] Call Trace: [ 2469.615334] dump_stack+0x107/0x167 [ 2469.615755] should_fail.cold+0x5/0xa [ 2469.616203] _copy_from_user+0x2e/0x1b0 [ 2469.616693] move_addr_to_kernel.part.0+0x31/0x110 [ 2469.617266] move_addr_to_kernel+0x4f/0x70 [ 2469.617278] io_connect+0x47a/0x610 [ 2469.617289] ? io_prep_rw+0x1050/0x1050 [ 2469.617311] ? __lock_acquire+0xbb1/0x5b00 [ 2469.617324] io_issue_sqe+0x1611/0x77d0 [ 2469.617339] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2469.617349] ? lock_chain_count+0x20/0x20 [ 2469.617361] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2469.617370] ? io_connect+0x610/0x610 [ 2469.617383] ? lock_acquire+0x197/0x470 [ 2469.617392] ? find_held_lock+0x2c/0x110 [ 2469.617406] ? __fget_files+0x2cf/0x520 [ 2469.617415] ? lock_downgrade+0x6d0/0x6d0 [ 2469.617428] __io_queue_sqe+0x90/0x9d0 [ 2469.617441] ? io_issue_sqe+0x77d0/0x77d0 [ 2469.617450] ? __fget_files+0x2f8/0x520 [ 2469.617468] io_submit_sqes+0x44ab/0x8610 [ 2469.617493] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.617502] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2469.617513] ? find_held_lock+0x2c/0x110 [ 2469.617526] ? io_submit_sqes+0x8610/0x8610 [ 2469.617541] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2469.617551] ? wait_for_completion_io+0x270/0x270 [ 2469.617564] ? rcu_read_lock_any_held+0x75/0xa0 [ 2469.617574] ? vfs_write+0x354/0xb10 [ 2469.617584] ? fput_many+0x2f/0x1a0 [ 2469.617594] ? ksys_write+0x1a9/0x260 [ 2469.617604] ? __ia32_sys_read+0xb0/0xb0 [ 2469.617617] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.617628] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.617640] do_syscall_64+0x33/0x40 [ 2469.617650] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2469.617657] RIP: 0033:0x7fa5a9c0bb19 [ 2469.617667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.617672] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2469.617683] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2469.617689] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2469.617694] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.617699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2469.617705] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:23:13 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:13 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000f000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:23:13 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:13 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x200000000000000, 0x0, 0x0) 00:23:13 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:13 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58) 00:23:13 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:13 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2486.198480] FAULT_INJECTION: forcing a failure. [ 2486.198480] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.198503] CPU: 0 PID: 11036 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2486.198513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2486.198520] Call Trace: [ 2486.198546] dump_stack+0x107/0x167 [ 2486.198568] should_fail.cold+0x5/0xa [ 2486.198592] should_failslab+0x5/0x20 [ 2486.198613] kmem_cache_alloc_bulk+0x4b/0x320 [ 2486.198640] io_submit_sqes+0x6fe7/0x8610 [ 2486.198690] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2486.198708] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2486.198732] ? find_held_lock+0x2c/0x110 [ 2486.198765] ? io_submit_sqes+0x8610/0x8610 [ 2486.198792] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2486.198814] ? wait_for_completion_io+0x270/0x270 [ 2486.198837] ? rcu_read_lock_any_held+0x75/0xa0 [ 2486.198855] ? vfs_write+0x354/0xb10 [ 2486.198875] ? fput_many+0x2f/0x1a0 [ 2486.198896] ? ksys_write+0x1a9/0x260 [ 2486.198917] ? __ia32_sys_read+0xb0/0xb0 [ 2486.198941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2486.198962] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2486.198994] do_syscall_64+0x33/0x40 [ 2486.223159] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2486.223173] RIP: 0033:0x7fa5a9c0bb19 [ 2486.223193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:23:13 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2486.223203] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2486.223225] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2486.223237] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2486.223248] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2486.223259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2486.223270] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:23:13 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:13 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:13 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:13 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x600000000000000, 0x0, 0x0) 00:23:14 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59) [ 2486.572462] FAULT_INJECTION: forcing a failure. [ 2486.572462] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.575050] CPU: 1 PID: 11063 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2486.576553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2486.578347] Call Trace: [ 2486.578930] dump_stack+0x107/0x167 [ 2486.579725] should_fail.cold+0x5/0xa [ 2486.580555] ? create_object.isra.0+0x3a/0xa30 [ 2486.581554] should_failslab+0x5/0x20 [ 2486.582383] kmem_cache_alloc+0x5b/0x310 [ 2486.583269] create_object.isra.0+0x3a/0xa30 [ 2486.584229] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2486.585351] kmem_cache_alloc_bulk+0x168/0x320 [ 2486.586346] io_submit_sqes+0x6fe7/0x8610 [ 2486.587280] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2486.588363] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2486.589424] ? find_held_lock+0x2c/0x110 [ 2486.590317] ? io_submit_sqes+0x8610/0x8610 [ 2486.591268] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2486.592318] ? wait_for_completion_io+0x270/0x270 [ 2486.593372] ? rcu_read_lock_any_held+0x75/0xa0 [ 2486.594387] ? vfs_write+0x354/0xb10 [ 2486.595203] ? fput_many+0x2f/0x1a0 [ 2486.595998] ? ksys_write+0x1a9/0x260 [ 2486.596832] ? __ia32_sys_read+0xb0/0xb0 [ 2486.597712] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2486.598851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2486.599978] do_syscall_64+0x33/0x40 [ 2486.600797] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2486.601903] RIP: 0033:0x7fa5a9c0bb19 [ 2486.602708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2486.606692] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2486.608341] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2486.609877] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2486.611426] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2486.612977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2486.614513] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:23:30 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:30 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000a000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:23:30 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x2000000000000000, 0x0, 0x0) 00:23:30 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:30 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:30 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:30 executing program 1: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x2, 0x0, 0x0, 0x0) 00:23:30 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60) [ 2503.249796] FAULT_INJECTION: forcing a failure. [ 2503.249796] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.250028] CPU: 0 PID: 11076 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2503.250038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.250044] Call Trace: [ 2503.250067] dump_stack+0x107/0x167 [ 2503.250087] should_fail.cold+0x5/0xa [ 2503.250108] ? create_object.isra.0+0x3a/0xa30 [ 2503.250126] should_failslab+0x5/0x20 [ 2503.250145] kmem_cache_alloc+0x5b/0x310 [ 2503.250164] ? mark_held_locks+0x9e/0xe0 [ 2503.250192] create_object.isra.0+0x3a/0xa30 [ 2503.250208] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2503.250232] kmem_cache_alloc_bulk+0x168/0x320 00:23:30 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x4000000000000000, 0x0, 0x0) [ 2503.250258] io_submit_sqes+0x6fe7/0x8610 [ 2503.250305] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2503.250322] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2503.250343] ? find_held_lock+0x2c/0x110 [ 2503.250367] ? io_submit_sqes+0x8610/0x8610 [ 2503.250392] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2503.250412] ? wait_for_completion_io+0x270/0x270 [ 2503.250434] ? rcu_read_lock_any_held+0x75/0xa0 [ 2503.250450] ? vfs_write+0x354/0xb10 [ 2503.250469] ? fput_many+0x2f/0x1a0 [ 2503.250488] ? ksys_write+0x1a9/0x260 [ 2503.250508] ? __ia32_sys_read+0xb0/0xb0 [ 2503.250530] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.250550] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.250571] do_syscall_64+0x33/0x40 [ 2503.250589] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2503.250601] RIP: 0033:0x7fa5a9c0bb19 [ 2503.250617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.250627] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2503.250647] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2503.250657] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2503.250667] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2503.250677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2503.250687] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:23:30 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) 00:23:30 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:30 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:31 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:31 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2503.563006] FAULT_INJECTION: forcing a failure. [ 2503.563006] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.563028] CPU: 1 PID: 11102 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2503.563040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.563047] Call Trace: [ 2503.563075] dump_stack+0x107/0x167 [ 2503.563099] should_fail.cold+0x5/0xa [ 2503.563121] ? create_object.isra.0+0x3a/0xa30 [ 2503.563143] should_failslab+0x5/0x20 00:23:31 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:31 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2503.563164] kmem_cache_alloc+0x5b/0x310 00:23:31 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0xffffffff00000000, 0x0, 0x0) [ 2503.563184] ? mark_held_locks+0x9e/0xe0 [ 2503.563206] create_object.isra.0+0x3a/0xa30 [ 2503.563221] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2503.563247] kmem_cache_alloc_bulk+0x168/0x320 [ 2503.563277] io_submit_sqes+0x6fe7/0x8610 [ 2503.563333] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2503.563351] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2503.563375] ? find_held_lock+0x2c/0x110 [ 2503.563399] ? io_submit_sqes+0x8610/0x8610 [ 2503.563426] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2503.563448] ? wait_for_completion_io+0x270/0x270 [ 2503.563474] ? rcu_read_lock_any_held+0x75/0xa0 [ 2503.563493] ? vfs_write+0x354/0xb10 [ 2503.563519] ? fput_many+0x2f/0x1a0 [ 2503.563542] ? ksys_write+0x1a9/0x260 [ 2503.563568] ? __ia32_sys_read+0xb0/0xb0 [ 2503.563592] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 00:23:31 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) [ 2503.563613] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.563635] do_syscall_64+0x33/0x40 [ 2503.563666] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2503.563680] RIP: 0033:0x7fa5a9c0bb19 [ 2503.563698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.563709] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2503.563730] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2503.563742] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2503.563751] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2503.563761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2503.563772] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2503.795281] FAULT_INJECTION: forcing a failure. [ 2503.795281] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.795304] CPU: 0 PID: 11115 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2503.795314] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.795320] Call Trace: [ 2503.795345] dump_stack+0x107/0x167 [ 2503.795367] should_fail.cold+0x5/0xa [ 2503.795388] ? create_object.isra.0+0x3a/0xa30 00:23:31 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x2) [ 2503.795405] should_failslab+0x5/0x20 [ 2503.795424] kmem_cache_alloc+0x5b/0x310 [ 2503.795444] ? mark_held_locks+0x9e/0xe0 [ 2503.795466] create_object.isra.0+0x3a/0xa30 [ 2503.795481] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2503.795506] kmem_cache_alloc_bulk+0x168/0x320 [ 2503.795532] io_submit_sqes+0x6fe7/0x8610 [ 2503.795581] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2503.795598] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2503.795619] ? find_held_lock+0x2c/0x110 [ 2503.795643] ? io_submit_sqes+0x8610/0x8610 [ 2503.795676] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2503.795696] ? wait_for_completion_io+0x270/0x270 [ 2503.795718] ? rcu_read_lock_any_held+0x75/0xa0 [ 2503.795735] ? vfs_write+0x354/0xb10 [ 2503.795754] ? fput_many+0x2f/0x1a0 [ 2503.795774] ? ksys_write+0x1a9/0x260 [ 2503.795794] ? __ia32_sys_read+0xb0/0xb0 [ 2503.795816] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.795841] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.795863] do_syscall_64+0x33/0x40 [ 2503.795881] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2503.795894] RIP: 0033:0x7fa5a9c0bb19 [ 2503.795912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.795922] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2503.795943] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2503.795953] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2503.795964] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2503.795974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2503.795985] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:23:43 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46001a000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:23:43 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:43 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f459b460000000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2516.482184] FAULT_INJECTION: forcing a failure. [ 2516.482184] name failslab, interval 1, probability 0, space 0, times 0 [ 2516.482205] CPU: 1 PID: 11145 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2516.482214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 00:23:43 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:43 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:43 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 00:23:43 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:43 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x6) [ 2516.482219] Call Trace: [ 2516.482242] dump_stack+0x107/0x167 [ 2516.482263] should_fail.cold+0x5/0xa [ 2516.482283] ? create_object.isra.0+0x3a/0xa30 [ 2516.482300] should_failslab+0x5/0x20 [ 2516.482318] kmem_cache_alloc+0x5b/0x310 [ 2516.482336] ? mark_held_locks+0x9e/0xe0 [ 2516.482358] create_object.isra.0+0x3a/0xa30 [ 2516.482373] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2516.482397] kmem_cache_alloc_bulk+0x168/0x320 [ 2516.482422] io_submit_sqes+0x6fe7/0x8610 [ 2516.482469] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2516.482485] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2516.482506] ? find_held_lock+0x2c/0x110 [ 2516.482530] ? io_submit_sqes+0x8610/0x8610 [ 2516.482560] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2516.482580] ? wait_for_completion_io+0x270/0x270 [ 2516.482601] ? rcu_read_lock_any_held+0x75/0xa0 [ 2516.482617] ? vfs_write+0x354/0xb10 [ 2516.482636] ? fput_many+0x2f/0x1a0 [ 2516.482655] ? ksys_write+0x1a9/0x260 [ 2516.482674] ? __ia32_sys_read+0xb0/0xb0 [ 2516.482697] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2516.482717] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2516.482738] do_syscall_64+0x33/0x40 [ 2516.482758] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2516.482776] RIP: 0033:0x7fa5a9c0bb19 [ 2516.482795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:23:44 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) [ 2516.482806] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2516.482827] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2516.482837] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2516.482848] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2516.482858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2516.482868] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2516.635603] FAULT_INJECTION: forcing a failure. [ 2516.635603] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2516.635660] CPU: 0 PID: 11151 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2516.635671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2516.635676] Call Trace: [ 2516.635701] dump_stack+0x107/0x167 [ 2516.635722] should_fail.cold+0x5/0xa [ 2516.635747] _copy_from_user+0x2e/0x1b0 [ 2516.635771] move_addr_to_kernel.part.0+0x31/0x110 [ 2516.635798] move_addr_to_kernel+0x4f/0x70 [ 2516.635818] io_connect+0x47a/0x610 [ 2516.635838] ? io_prep_rw+0x1050/0x1050 [ 2516.635877] ? __lock_acquire+0xbb1/0x5b00 [ 2516.635899] io_issue_sqe+0x1611/0x77d0 [ 2516.635926] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2516.635944] ? lock_chain_count+0x20/0x20 [ 2516.635963] ? __is_insn_slot_addr+0x14c/0x290 [ 2516.635983] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2516.636000] ? io_connect+0x610/0x610 [ 2516.636023] ? lock_acquire+0x197/0x470 [ 2516.636040] ? find_held_lock+0x2c/0x110 [ 2516.636063] ? __fget_files+0x2cf/0x520 [ 2516.636081] ? lock_downgrade+0x6d0/0x6d0 [ 2516.636104] __io_queue_sqe+0x90/0x9d0 [ 2516.636128] ? io_issue_sqe+0x77d0/0x77d0 [ 2516.636145] ? __fget_files+0x2f8/0x520 [ 2516.636180] io_submit_sqes+0x44ab/0x8610 [ 2516.636226] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2516.636243] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2516.636263] ? find_held_lock+0x2c/0x110 [ 2516.636287] ? io_submit_sqes+0x8610/0x8610 [ 2516.636311] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2516.636331] ? wait_for_completion_io+0x270/0x270 [ 2516.636352] ? rcu_read_lock_any_held+0x75/0xa0 [ 2516.636369] ? vfs_write+0x354/0xb10 [ 2516.636387] ? fput_many+0x2f/0x1a0 [ 2516.636407] ? ksys_write+0x1a9/0x260 [ 2516.636425] ? __ia32_sys_read+0xb0/0xb0 [ 2516.636448] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2516.636467] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2516.636489] do_syscall_64+0x33/0x40 [ 2516.636507] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2516.636519] RIP: 0033:0x7fa5a9c0bb19 [ 2516.636537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2516.636547] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2516.636567] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2516.636577] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2516.636588] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2516.636598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2516.636608] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:23:57 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:57 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x600) 00:23:57 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:57 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) 00:23:57 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:57 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:57 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c461b00000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:23:57 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2529.724748] FAULT_INJECTION: forcing a failure. [ 2529.724748] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2529.724772] CPU: 0 PID: 11166 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2529.724791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2529.724797] Call Trace: [ 2529.724823] dump_stack+0x107/0x167 [ 2529.724849] should_fail.cold+0x5/0xa [ 2529.724879] _copy_from_user+0x2e/0x1b0 [ 2529.724909] move_addr_to_kernel.part.0+0x31/0x110 [ 2529.724934] move_addr_to_kernel+0x4f/0x70 [ 2529.724958] io_connect+0x47a/0x610 [ 2529.724983] ? io_prep_rw+0x1050/0x1050 00:23:57 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x2000) [ 2529.725029] ? __lock_acquire+0xbb1/0x5b00 [ 2529.725057] io_issue_sqe+0x1611/0x77d0 [ 2529.725090] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.725132] ? lock_chain_count+0x20/0x20 [ 2529.725161] ? __is_insn_slot_addr+0x14c/0x290 [ 2529.725195] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.725223] ? io_connect+0x610/0x610 [ 2529.725252] ? lock_acquire+0x197/0x470 [ 2529.725271] ? find_held_lock+0x2c/0x110 [ 2529.725300] ? __fget_files+0x2cf/0x520 [ 2529.725322] ? lock_downgrade+0x6d0/0x6d0 [ 2529.725350] __io_queue_sqe+0x90/0x9d0 [ 2529.725379] ? io_issue_sqe+0x77d0/0x77d0 [ 2529.725397] ? __fget_files+0x2f8/0x520 [ 2529.725437] io_submit_sqes+0x44ab/0x8610 [ 2529.725492] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2529.725512] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2529.725538] ? find_held_lock+0x2c/0x110 [ 2529.725566] ? io_submit_sqes+0x8610/0x8610 [ 2529.725595] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2529.725619] ? wait_for_completion_io+0x270/0x270 [ 2529.725645] ? rcu_read_lock_any_held+0x75/0xa0 00:23:57 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c463e00000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:23:57 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460018000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2529.725665] ? vfs_write+0x354/0xb10 [ 2529.725687] ? fput_many+0x2f/0x1a0 [ 2529.725711] ? ksys_write+0x1a9/0x260 [ 2529.725732] ? __ia32_sys_read+0xb0/0xb0 [ 2529.725754] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2529.725774] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2529.725795] do_syscall_64+0x33/0x40 [ 2529.725814] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2529.725827] RIP: 0033:0x7fa5a9c0bb19 [ 2529.725844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2529.725854] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2529.725873] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2529.725883] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2529.725893] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2529.725903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2529.725913] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:23:57 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x4000) 00:23:57 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000e000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:23:57 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) (fail_nth: 1) 00:23:57 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:57 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) [ 2530.005177] FAULT_INJECTION: forcing a failure. [ 2530.005177] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2530.006584] CPU: 1 PID: 11206 Comm: syz-executor.1 Not tainted 5.10.244 #1 [ 2530.007381] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2530.008332] Call Trace: [ 2530.008635] dump_stack+0x107/0x167 [ 2530.009054] should_fail.cold+0x5/0xa [ 2530.009520] _copy_from_iter+0x202/0xe80 [ 2530.009989] ? __virt_addr_valid+0x170/0x5d0 [ 2530.010496] ? __check_object_size+0x319/0x440 [ 2530.011021] file_tty_write.constprop.0+0x4d5/0x910 [ 2530.011590] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 2530.012167] new_sync_write+0x42c/0x660 [ 2530.012620] ? new_sync_read+0x6f0/0x6f0 [ 2530.013091] ? avc_policy_seqno+0x9/0x70 [ 2530.013559] ? selinux_file_permission+0x92/0x520 [ 2530.014123] ? security_file_permission+0xb1/0xe0 [ 2530.014675] vfs_write+0x7c0/0xb10 [ 2530.015084] ksys_write+0x12d/0x260 [ 2530.015500] ? __ia32_sys_read+0xb0/0xb0 [ 2530.015965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2530.016564] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2530.017160] do_syscall_64+0x33/0x40 [ 2530.017586] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2530.018171] RIP: 0033:0x7f186467fb19 [ 2530.018595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2530.020701] RSP: 002b:00007f1861bf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2530.021572] RAX: ffffffffffffffda RBX: 00007f1864792f60 RCX: 00007f186467fb19 [ 2530.022383] RDX: 000000000000042a RSI: 0000000020000740 RDI: 0000000000000006 [ 2530.023196] RBP: 00007f1861bf51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2530.024004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2530.024815] R13: 00007ffe3ad52d9f R14: 00007f1861bf5300 R15: 0000000000022000 00:23:57 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:23:57 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2530.053501] FAULT_INJECTION: forcing a failure. [ 2530.053501] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2530.053513] CPU: 1 PID: 11212 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2530.053519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2530.053523] Call Trace: [ 2530.053535] dump_stack+0x107/0x167 [ 2530.053547] should_fail.cold+0x5/0xa [ 2530.053561] _copy_from_user+0x2e/0x1b0 [ 2530.053576] move_addr_to_kernel.part.0+0x31/0x110 [ 2530.053587] move_addr_to_kernel+0x4f/0x70 [ 2530.053598] io_connect+0x47a/0x610 [ 2530.053609] ? io_prep_rw+0x1050/0x1050 [ 2530.053630] ? __lock_acquire+0xbb1/0x5b00 [ 2530.053643] io_issue_sqe+0x1611/0x77d0 [ 2530.053658] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2530.053668] ? lock_chain_count+0x20/0x20 [ 2530.053679] ? __is_insn_slot_addr+0x14c/0x290 [ 2530.053690] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2530.053699] ? io_connect+0x610/0x610 [ 2530.053712] ? lock_acquire+0x197/0x470 [ 2530.053721] ? find_held_lock+0x2c/0x110 [ 2530.053735] ? __fget_files+0x2cf/0x520 [ 2530.053745] ? lock_downgrade+0x6d0/0x6d0 [ 2530.053758] __io_queue_sqe+0x90/0x9d0 [ 2530.053772] ? io_issue_sqe+0x77d0/0x77d0 [ 2530.053785] ? __fget_files+0x2f8/0x520 [ 2530.053803] io_submit_sqes+0x44ab/0x8610 [ 2530.053832] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2530.053842] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2530.053853] ? find_held_lock+0x2c/0x110 [ 2530.053866] ? io_submit_sqes+0x8610/0x8610 [ 2530.053880] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2530.053900] ? wait_for_completion_io+0x270/0x270 [ 2530.071871] ? rcu_read_lock_any_held+0x75/0xa0 [ 2530.071881] ? vfs_write+0x354/0xb10 [ 2530.071892] ? fput_many+0x2f/0x1a0 00:23:57 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2530.071902] ? ksys_write+0x1a9/0x260 [ 2530.071913] ? __ia32_sys_read+0xb0/0xb0 [ 2530.071925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2530.071936] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2530.071948] do_syscall_64+0x33/0x40 [ 2530.071959] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2530.071966] RIP: 0033:0x7fa5a9c0bb19 [ 2530.071975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:23:57 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) (fail_nth: 2) [ 2530.071981] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2530.071992] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2530.071998] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2530.072003] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2530.072009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2530.072015] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:23:57 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 00:23:57 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x400000) [ 2530.203387] FAULT_INJECTION: forcing a failure. [ 2530.203387] name failslab, interval 1, probability 0, space 0, times 0 [ 2530.204756] CPU: 1 PID: 11225 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2530.205561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2530.206520] Call Trace: [ 2530.206832] dump_stack+0x107/0x167 [ 2530.207255] should_fail.cold+0x5/0xa [ 2530.207699] ? create_object.isra.0+0x3a/0xa30 [ 2530.208222] should_failslab+0x5/0x20 [ 2530.208678] kmem_cache_alloc+0x5b/0x310 [ 2530.208690] ? mark_held_locks+0x9e/0xe0 [ 2530.208702] create_object.isra.0+0x3a/0xa30 [ 2530.208711] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2530.208724] kmem_cache_alloc_bulk+0x168/0x320 [ 2530.208740] io_submit_sqes+0x6fe7/0x8610 00:23:57 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2530.208765] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2530.208774] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2530.208786] ? find_held_lock+0x2c/0x110 [ 2530.208800] ? io_submit_sqes+0x8610/0x8610 [ 2530.208814] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2530.208825] ? wait_for_completion_io+0x270/0x270 [ 2530.208838] ? rcu_read_lock_any_held+0x75/0xa0 [ 2530.208847] ? vfs_write+0x354/0xb10 [ 2530.208857] ? fput_many+0x2f/0x1a0 [ 2530.208868] ? ksys_write+0x1a9/0x260 [ 2530.208878] ? __ia32_sys_read+0xb0/0xb0 [ 2530.208891] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2530.208902] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2530.208914] do_syscall_64+0x33/0x40 [ 2530.208924] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2530.208930] RIP: 0033:0x7fa5a9c0bb19 [ 2530.208940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2530.208945] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2530.208957] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2530.208963] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2530.208968] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2530.208974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2530.208980] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2530.349207] FAULT_INJECTION: forcing a failure. [ 2530.349207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2530.350648] CPU: 1 PID: 11220 Comm: syz-executor.1 Not tainted 5.10.244 #1 [ 2530.350655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2530.350659] Call Trace: [ 2530.350675] dump_stack+0x107/0x167 [ 2530.350687] should_fail.cold+0x5/0xa [ 2530.350702] _copy_to_user+0x2e/0x180 [ 2530.350717] simple_read_from_buffer+0xcc/0x160 [ 2530.350731] proc_fail_nth_read+0x198/0x230 [ 2530.350744] ? proc_sessionid_read+0x230/0x230 [ 2530.350754] ? security_file_permission+0xb1/0xe0 [ 2530.350769] ? proc_sessionid_read+0x230/0x230 [ 2530.350779] vfs_read+0x228/0x620 [ 2530.350793] ksys_read+0x12d/0x260 [ 2530.350804] ? vfs_write+0xb10/0xb10 [ 2530.350818] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2530.350830] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2530.350846] do_syscall_64+0x33/0x40 [ 2530.350856] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2530.350864] RIP: 0033:0x7f186463269c [ 2530.350874] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2530.350880] RSP: 002b:00007f1861bf5170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2530.350891] RAX: ffffffffffffffda RBX: 000000000000042a RCX: 00007f186463269c [ 2530.350897] RDX: 000000000000000f RSI: 00007f1861bf51e0 RDI: 0000000000000007 [ 2530.350903] RBP: 00007f1861bf51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2530.350908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2530.350915] R13: 00007ffe3ad52d9f R14: 00007f1861bf5300 R15: 0000000000022000 00:24:14 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x800000) 00:24:14 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:14 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:14 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:14 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:14 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 00:24:14 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:14 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46001a000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2546.839230] FAULT_INJECTION: forcing a failure. [ 2546.839230] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2546.839252] CPU: 0 PID: 11252 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2546.839262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 00:24:14 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2546.839268] Call Trace: [ 2546.839292] dump_stack+0x107/0x167 [ 2546.839313] should_fail.cold+0x5/0xa [ 2546.839339] _copy_from_user+0x2e/0x1b0 [ 2546.839365] move_addr_to_kernel.part.0+0x31/0x110 [ 2546.839387] move_addr_to_kernel+0x4f/0x70 [ 2546.839407] io_connect+0x47a/0x610 00:24:14 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2546.839428] ? io_prep_rw+0x1050/0x1050 [ 2546.839468] ? __lock_acquire+0xbb1/0x5b00 [ 2546.839492] io_issue_sqe+0x1611/0x77d0 [ 2546.839520] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2546.839539] ? lock_chain_count+0x20/0x20 [ 2546.839558] ? __is_insn_slot_addr+0x14c/0x290 [ 2546.839580] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2546.839597] ? io_connect+0x610/0x610 [ 2546.839621] ? lock_acquire+0x197/0x470 [ 2546.839638] ? find_held_lock+0x2c/0x110 [ 2546.839670] ? __fget_files+0x2cf/0x520 [ 2546.839689] ? lock_downgrade+0x6d0/0x6d0 [ 2546.839712] __io_queue_sqe+0x90/0x9d0 [ 2546.839737] ? io_issue_sqe+0x77d0/0x77d0 00:24:14 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x2000000) [ 2546.839753] ? __fget_files+0x2f8/0x520 [ 2546.839787] io_submit_sqes+0x44ab/0x8610 [ 2546.839834] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2546.839851] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2546.839873] ? find_held_lock+0x2c/0x110 [ 2546.839897] ? io_submit_sqes+0x8610/0x8610 [ 2546.839922] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2546.839943] ? wait_for_completion_io+0x270/0x270 [ 2546.839965] ? rcu_read_lock_any_held+0x75/0xa0 [ 2546.839983] ? vfs_write+0x354/0xb10 [ 2546.840002] ? fput_many+0x2f/0x1a0 00:24:14 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) [ 2546.840021] ? ksys_write+0x1a9/0x260 [ 2546.840041] ? __ia32_sys_read+0xb0/0xb0 [ 2546.840064] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2546.840083] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2546.840105] do_syscall_64+0x33/0x40 [ 2546.840124] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2546.840136] RIP: 0033:0x7fa5a9c0bb19 [ 2546.840154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2546.840164] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2546.840184] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2546.840195] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2546.840206] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2546.840216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2546.840227] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2547.007783] FAULT_INJECTION: forcing a failure. [ 2547.007783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2547.007816] CPU: 1 PID: 11264 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2547.007823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2547.007827] Call Trace: [ 2547.007844] dump_stack+0x107/0x167 [ 2547.007857] should_fail.cold+0x5/0xa [ 2547.007872] _copy_from_user+0x2e/0x1b0 [ 2547.007888] move_addr_to_kernel.part.0+0x31/0x110 [ 2547.007900] move_addr_to_kernel+0x4f/0x70 [ 2547.007912] io_connect+0x47a/0x610 [ 2547.007924] ? io_prep_rw+0x1050/0x1050 [ 2547.007950] ? __lock_acquire+0xbb1/0x5b00 [ 2547.007963] io_issue_sqe+0x1611/0x77d0 [ 2547.007983] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2547.007993] ? lock_chain_count+0x20/0x20 [ 2547.008005] ? __is_insn_slot_addr+0x14c/0x290 [ 2547.008016] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2547.008038] ? io_connect+0x610/0x610 [ 2547.018870] ? lock_acquire+0x197/0x470 [ 2547.018880] ? find_held_lock+0x2c/0x110 [ 2547.018895] ? __fget_files+0x2cf/0x520 [ 2547.018905] ? lock_downgrade+0x6d0/0x6d0 [ 2547.018918] __io_queue_sqe+0x90/0x9d0 [ 2547.018931] ? io_issue_sqe+0x77d0/0x77d0 [ 2547.018941] ? __fget_files+0x2f8/0x520 [ 2547.018959] io_submit_sqes+0x44ab/0x8610 [ 2547.018985] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2547.018994] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2547.019006] ? find_held_lock+0x2c/0x110 [ 2547.019019] ? io_submit_sqes+0x8610/0x8610 [ 2547.019034] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2547.019045] ? wait_for_completion_io+0x270/0x270 [ 2547.019058] ? rcu_read_lock_any_held+0x75/0xa0 [ 2547.019068] ? vfs_write+0x354/0xb10 [ 2547.019078] ? fput_many+0x2f/0x1a0 [ 2547.019089] ? ksys_write+0x1a9/0x260 [ 2547.019099] ? __ia32_sys_read+0xb0/0xb0 [ 2547.019112] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2547.019132] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2547.029482] do_syscall_64+0x33/0x40 [ 2547.029492] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2547.029500] RIP: 0033:0x7fa5a9c0bb19 [ 2547.029509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2547.029515] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2547.029526] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2547.029532] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2547.029538] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2547.029544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2547.029550] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:24:14 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c469b00000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:24:14 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x6000000) 00:24:14 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) [ 2547.208107] FAULT_INJECTION: forcing a failure. [ 2547.208107] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2547.211074] CPU: 0 PID: 11275 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2547.212549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2547.214318] Call Trace: [ 2547.214885] dump_stack+0x107/0x167 [ 2547.215648] should_fail.cold+0x5/0xa [ 2547.216465] _copy_from_user+0x2e/0x1b0 [ 2547.217317] move_addr_to_kernel.part.0+0x31/0x110 [ 2547.218361] move_addr_to_kernel+0x4f/0x70 [ 2547.219252] io_connect+0x47a/0x610 [ 2547.220022] ? io_prep_rw+0x1050/0x1050 [ 2547.220894] ? __lock_acquire+0xbb1/0x5b00 [ 2547.221797] io_issue_sqe+0x1611/0x77d0 [ 2547.222645] ? io_dismantle_req+0xdf/0x180 [ 2547.223551] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2547.224658] ? io_connect+0x610/0x610 [ 2547.225486] ? lock_acquire+0x197/0x470 [ 2547.226323] ? find_held_lock+0x2c/0x110 [ 2547.227183] ? __fget_files+0x2cf/0x520 [ 2547.228018] ? lock_downgrade+0x6d0/0x6d0 [ 2547.228901] __io_queue_sqe+0x90/0x9d0 [ 2547.229739] ? io_issue_sqe+0x77d0/0x77d0 [ 2547.230610] ? __fget_files+0x2f8/0x520 [ 2547.231466] io_submit_sqes+0x44ab/0x8610 [ 2547.232372] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2547.233444] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2547.234469] ? find_held_lock+0x2c/0x110 [ 2547.235344] ? io_submit_sqes+0x8610/0x8610 [ 2547.236282] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2547.237302] ? vfs_write+0x7f8/0xb10 [ 2547.238096] ? wait_for_completion_io+0x270/0x270 [ 2547.239117] ? rcu_read_lock_any_held+0x75/0xa0 [ 2547.240098] ? vfs_write+0x354/0xb10 [ 2547.240900] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 2547.241879] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2547.243015] ? ksys_write+0x1a9/0x260 [ 2547.243812] ? __ia32_sys_read+0xb0/0xb0 [ 2547.244687] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2547.245812] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2547.246903] do_syscall_64+0x33/0x40 [ 2547.247704] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2547.248792] RIP: 0033:0x7fa5a9c0bb19 [ 2547.249587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2547.253499] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2547.255116] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2547.256624] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2547.258124] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2547.259629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2547.261120] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:24:35 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 00:24:35 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:35 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x20000000) 00:24:35 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46001b000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:24:35 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c0d0000000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:24:35 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:35 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46001a000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:24:35 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="05454c460000000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2567.788459] FAULT_INJECTION: forcing a failure. [ 2567.788459] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2567.788473] CPU: 1 PID: 11288 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2567.788479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2567.788483] Call Trace: [ 2567.788499] dump_stack+0x107/0x167 [ 2567.788512] should_fail.cold+0x5/0xa [ 2567.788527] _copy_from_user+0x2e/0x1b0 [ 2567.788543] move_addr_to_kernel.part.0+0x31/0x110 [ 2567.788555] move_addr_to_kernel+0x4f/0x70 [ 2567.788568] io_connect+0x47a/0x610 [ 2567.788580] ? io_prep_rw+0x1050/0x1050 [ 2567.788603] ? __lock_acquire+0xbb1/0x5b00 [ 2567.788616] io_issue_sqe+0x1611/0x77d0 [ 2567.788628] ? io_dismantle_req+0xdf/0x180 [ 2567.788640] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2567.788654] ? io_connect+0x610/0x610 [ 2567.788668] ? lock_acquire+0x197/0x470 [ 2567.788677] ? find_held_lock+0x2c/0x110 [ 2567.788692] ? __fget_files+0x2cf/0x520 [ 2567.788703] ? lock_downgrade+0x6d0/0x6d0 [ 2567.788716] __io_queue_sqe+0x90/0x9d0 [ 2567.788730] ? io_issue_sqe+0x77d0/0x77d0 [ 2567.788739] ? __fget_files+0x2f8/0x520 [ 2567.788757] io_submit_sqes+0x44ab/0x8610 00:24:35 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) [ 2567.788788] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2567.788798] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2567.788810] ? find_held_lock+0x2c/0x110 [ 2567.788823] ? io_submit_sqes+0x8610/0x8610 [ 2567.788838] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2567.788849] ? wait_for_completion_io+0x270/0x270 [ 2567.788862] ? rcu_read_lock_any_held+0x75/0xa0 [ 2567.788873] ? vfs_write+0x354/0xb10 [ 2567.788884] ? fput_many+0x2f/0x1a0 [ 2567.788895] ? ksys_write+0x1a9/0x260 [ 2567.788906] ? __ia32_sys_read+0xb0/0xb0 [ 2567.788919] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2567.788931] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2567.788944] do_syscall_64+0x33/0x40 [ 2567.788955] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2567.788962] RIP: 0033:0x7fa5a9c0bb19 [ 2567.788972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2567.788977] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2567.788989] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2567.788995] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2567.789001] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2567.789007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2567.789013] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2567.869867] FAULT_INJECTION: forcing a failure. [ 2567.869867] name fail_usercopy, interval 1, probability 0, space 0, times 0 00:24:35 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x40000000) [ 2567.875447] CPU: 1 PID: 11301 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2567.875454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2567.875458] Call Trace: [ 2567.875475] dump_stack+0x107/0x167 [ 2567.875487] should_fail.cold+0x5/0xa [ 2567.875502] _copy_from_user+0x2e/0x1b0 [ 2567.875518] move_addr_to_kernel.part.0+0x31/0x110 [ 2567.875530] move_addr_to_kernel+0x4f/0x70 [ 2567.875542] io_connect+0x47a/0x610 [ 2567.875554] ? io_prep_rw+0x1050/0x1050 [ 2567.875577] ? __lock_acquire+0xbb1/0x5b00 [ 2567.875590] io_issue_sqe+0x1611/0x77d0 [ 2567.875601] ? io_dismantle_req+0xdf/0x180 [ 2567.875614] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2567.875628] ? io_connect+0x610/0x610 [ 2567.875642] ? lock_acquire+0x197/0x470 [ 2567.875651] ? find_held_lock+0x2c/0x110 [ 2567.875666] ? __fget_files+0x2cf/0x520 [ 2567.875677] ? lock_downgrade+0x6d0/0x6d0 [ 2567.875690] __io_queue_sqe+0x90/0x9d0 [ 2567.875703] ? io_issue_sqe+0x77d0/0x77d0 [ 2567.875712] ? __fget_files+0x2f8/0x520 [ 2567.875731] io_submit_sqes+0x44ab/0x8610 [ 2567.875757] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2567.875766] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2567.875782] ? find_held_lock+0x2c/0x110 [ 2567.875796] ? io_submit_sqes+0x8610/0x8610 [ 2567.875810] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2567.875822] ? wait_for_completion_io+0x270/0x270 [ 2567.875835] ? rcu_read_lock_any_held+0x75/0xa0 [ 2567.875845] ? vfs_write+0x354/0xb10 [ 2567.875856] ? fput_many+0x2f/0x1a0 [ 2567.875867] ? ksys_write+0x1a9/0x260 [ 2567.875878] ? __ia32_sys_read+0xb0/0xb0 [ 2567.875891] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2567.875902] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2567.875914] do_syscall_64+0x33/0x40 [ 2567.875925] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2567.875932] RIP: 0033:0x7fa5a9c0bb19 [ 2567.875942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2567.875947] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2567.875959] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2567.875965] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2567.875971] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2567.875977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2567.875983] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:24:48 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) 00:24:48 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:48 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:48 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46007f000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:24:48 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x40000000000000) 00:24:48 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:48 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:48 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2580.853148] FAULT_INJECTION: forcing a failure. [ 2580.853148] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2580.853163] CPU: 1 PID: 11324 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2580.853169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.853173] Call Trace: [ 2580.853189] dump_stack+0x107/0x167 [ 2580.853202] should_fail.cold+0x5/0xa [ 2580.853219] _copy_from_user+0x2e/0x1b0 [ 2580.853236] move_addr_to_kernel.part.0+0x31/0x110 [ 2580.853250] move_addr_to_kernel+0x4f/0x70 [ 2580.853263] io_connect+0x47a/0x610 [ 2580.853276] ? io_prep_rw+0x1050/0x1050 [ 2580.853301] ? __lock_acquire+0xbb1/0x5b00 [ 2580.853316] io_issue_sqe+0x1611/0x77d0 [ 2580.853329] ? io_dismantle_req+0xdf/0x180 [ 2580.853343] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2580.853359] ? io_connect+0x610/0x610 [ 2580.853379] ? lock_acquire+0x197/0x470 [ 2580.853390] ? find_held_lock+0x2c/0x110 [ 2580.853406] ? __fget_files+0x2cf/0x520 [ 2580.853418] ? lock_downgrade+0x6d0/0x6d0 [ 2580.853433] __io_queue_sqe+0x90/0x9d0 [ 2580.853448] ? io_issue_sqe+0x77d0/0x77d0 [ 2580.853458] ? __fget_files+0x2f8/0x520 [ 2580.853479] io_submit_sqes+0x44ab/0x8610 [ 2580.853508] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2580.853519] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2580.853533] ? find_held_lock+0x2c/0x110 [ 2580.853548] ? io_submit_sqes+0x8610/0x8610 00:24:48 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) [ 2580.853563] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2580.853577] ? wait_for_completion_io+0x270/0x270 [ 2580.853591] ? rcu_read_lock_any_held+0x75/0xa0 [ 2580.853602] ? vfs_write+0x354/0xb10 [ 2580.853614] ? fput_many+0x2f/0x1a0 [ 2580.853627] ? ksys_write+0x1a9/0x260 [ 2580.853639] ? __ia32_sys_read+0xb0/0xb0 [ 2580.853653] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2580.853665] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2580.853678] do_syscall_64+0x33/0x40 [ 2580.853690] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2580.853699] RIP: 0033:0x7fa5a9c0bb19 [ 2580.853709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.853716] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2580.853729] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2580.853735] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2580.853753] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.853760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2580.853766] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2580.929472] FAULT_INJECTION: forcing a failure. [ 2580.929472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2580.929486] CPU: 1 PID: 11334 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2580.929492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.929496] Call Trace: [ 2580.929511] dump_stack+0x107/0x167 [ 2580.929523] should_fail.cold+0x5/0xa [ 2580.929540] _copy_from_user+0x2e/0x1b0 [ 2580.929556] move_addr_to_kernel.part.0+0x31/0x110 [ 2580.929569] move_addr_to_kernel+0x4f/0x70 [ 2580.929583] io_connect+0x47a/0x610 [ 2580.929596] ? io_prep_rw+0x1050/0x1050 [ 2580.929620] ? __lock_acquire+0xbb1/0x5b00 [ 2580.929634] io_issue_sqe+0x1611/0x77d0 [ 2580.929647] ? io_dismantle_req+0xdf/0x180 [ 2580.929661] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2580.929676] ? io_connect+0x610/0x610 [ 2580.929691] ? lock_acquire+0x197/0x470 [ 2580.929702] ? find_held_lock+0x2c/0x110 00:24:48 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) [ 2580.929717] ? __fget_files+0x2cf/0x520 [ 2580.929728] ? lock_downgrade+0x6d0/0x6d0 [ 2580.929756] __io_queue_sqe+0x90/0x9d0 [ 2580.929771] ? io_issue_sqe+0x77d0/0x77d0 [ 2580.929780] ? __fget_files+0x2f8/0x520 [ 2580.929801] io_submit_sqes+0x44ab/0x8610 [ 2580.929829] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2580.929840] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2580.929853] ? find_held_lock+0x2c/0x110 [ 2580.929867] ? io_submit_sqes+0x8610/0x8610 [ 2580.929883] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2580.929896] ? wait_for_completion_io+0x270/0x270 [ 2580.929909] ? rcu_read_lock_any_held+0x75/0xa0 [ 2580.929920] ? vfs_write+0x354/0xb10 [ 2580.929932] ? fput_many+0x2f/0x1a0 [ 2580.929944] ? ksys_write+0x1a9/0x260 [ 2580.929955] ? __ia32_sys_read+0xb0/0xb0 [ 2580.929969] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2580.929981] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2580.929995] do_syscall_64+0x33/0x40 [ 2580.930007] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2580.930014] RIP: 0033:0x7fa5a9c0bb19 [ 2580.930025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.930032] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2580.930045] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2580.930051] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2580.930058] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.930065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2580.930072] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2580.994704] FAULT_INJECTION: forcing a failure. [ 2580.994704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2580.994718] CPU: 1 PID: 11336 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2580.994724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.994728] Call Trace: [ 2580.994741] dump_stack+0x107/0x167 [ 2580.994754] should_fail.cold+0x5/0xa [ 2580.994783] _copy_from_user+0x2e/0x1b0 [ 2581.013878] move_addr_to_kernel.part.0+0x31/0x110 [ 2581.013892] move_addr_to_kernel+0x4f/0x70 [ 2581.013904] io_connect+0x47a/0x610 [ 2581.013917] ? io_prep_rw+0x1050/0x1050 [ 2581.013940] ? __lock_acquire+0xbb1/0x5b00 [ 2581.013954] io_issue_sqe+0x1611/0x77d0 00:24:48 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x80000000000000) [ 2581.013966] ? io_dismantle_req+0xdf/0x180 [ 2581.013979] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 00:24:48 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) [ 2581.013994] ? io_connect+0x610/0x610 [ 2581.014008] ? lock_acquire+0x197/0x470 [ 2581.014018] ? find_held_lock+0x2c/0x110 [ 2581.014032] ? __fget_files+0x2cf/0x520 [ 2581.014043] ? lock_downgrade+0x6d0/0x6d0 [ 2581.014057] __io_queue_sqe+0x90/0x9d0 [ 2581.014071] ? io_issue_sqe+0x77d0/0x77d0 [ 2581.014080] ? __fget_files+0x2f8/0x520 [ 2581.014100] io_submit_sqes+0x44ab/0x8610 [ 2581.014127] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2581.014137] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2581.014150] ? find_held_lock+0x2c/0x110 [ 2581.014164] ? io_submit_sqes+0x8610/0x8610 [ 2581.014178] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2581.014194] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2581.014205] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2581.014215] ? trace_hardirqs_on+0x5b/0x180 [ 2581.014227] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2581.014242] ? __io_uring_cancel+0x20/0x20 [ 2581.014258] do_syscall_64+0x33/0x40 [ 2581.014269] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2581.014276] RIP: 0033:0x7fa5a9c0bb19 [ 2581.014286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2581.014293] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2581.014304] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2581.014311] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2581.014317] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2581.014323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2581.014330] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2581.065763] FAULT_INJECTION: forcing a failure. [ 2581.065763] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2581.065780] CPU: 1 PID: 11341 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2581.065786] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2581.065790] Call Trace: [ 2581.065804] dump_stack+0x107/0x167 [ 2581.065816] should_fail.cold+0x5/0xa [ 2581.065831] _copy_from_user+0x2e/0x1b0 [ 2581.065846] move_addr_to_kernel.part.0+0x31/0x110 [ 2581.065858] move_addr_to_kernel+0x4f/0x70 [ 2581.065871] io_connect+0x47a/0x610 [ 2581.065887] ? io_prep_rw+0x1050/0x1050 [ 2581.065909] ? __lock_acquire+0xbb1/0x5b00 [ 2581.065923] io_issue_sqe+0x1611/0x77d0 [ 2581.065939] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2581.065953] ? io_connect+0x610/0x610 [ 2581.065966] ? lock_acquire+0x197/0x470 [ 2581.065985] ? find_held_lock+0x2c/0x110 [ 2581.090715] ? __fget_files+0x2cf/0x520 [ 2581.090725] ? lock_downgrade+0x6d0/0x6d0 [ 2581.090739] __io_queue_sqe+0x90/0x9d0 [ 2581.090753] ? io_issue_sqe+0x77d0/0x77d0 [ 2581.090762] ? __fget_files+0x2f8/0x520 [ 2581.090780] io_submit_sqes+0x44ab/0x8610 [ 2581.090807] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2581.090816] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2581.090829] ? find_held_lock+0x2c/0x110 [ 2581.090842] ? io_submit_sqes+0x8610/0x8610 [ 2581.090857] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2581.090868] ? wait_for_completion_io+0x270/0x270 [ 2581.090881] ? rcu_read_lock_any_held+0x75/0xa0 [ 2581.090891] ? vfs_write+0x354/0xb10 [ 2581.090902] ? fput_many+0x2f/0x1a0 [ 2581.090913] ? ksys_write+0x1a9/0x260 [ 2581.090924] ? __ia32_sys_read+0xb0/0xb0 [ 2581.090937] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2581.090948] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2581.090961] do_syscall_64+0x33/0x40 [ 2581.090972] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2581.090979] RIP: 0033:0x7fa5a9c0bb19 [ 2581.090989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2581.090995] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2581.091006] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2581.091013] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2581.091028] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2581.108249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2581.108255] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:24:48 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) 00:24:48 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x200000000000000) 00:24:48 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46004f000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2581.258493] FAULT_INJECTION: forcing a failure. [ 2581.258493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2581.258514] CPU: 0 PID: 11350 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2581.258525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2581.258531] Call Trace: [ 2581.258556] dump_stack+0x107/0x167 00:24:48 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460003000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2581.258578] should_fail.cold+0x5/0xa [ 2581.258604] _copy_from_user+0x2e/0x1b0 00:24:48 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:24:48 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2581.258630] move_addr_to_kernel.part.0+0x31/0x110 [ 2581.258652] move_addr_to_kernel+0x4f/0x70 00:24:48 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2581.258673] io_connect+0x47a/0x610 [ 2581.258694] ? io_prep_rw+0x1050/0x1050 [ 2581.258734] ? __lock_acquire+0xbb1/0x5b00 [ 2581.258758] io_issue_sqe+0x1611/0x77d0 [ 2581.258785] ? io_dismantle_req+0xdf/0x180 [ 2581.258812] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2581.258837] ? io_connect+0x610/0x610 [ 2581.258861] ? lock_acquire+0x197/0x470 [ 2581.258878] ? find_held_lock+0x2c/0x110 [ 2581.258902] ? __fget_files+0x2cf/0x520 [ 2581.258921] ? lock_downgrade+0x6d0/0x6d0 [ 2581.258944] __io_queue_sqe+0x90/0x9d0 [ 2581.258969] ? io_issue_sqe+0x77d0/0x77d0 [ 2581.258985] ? __fget_files+0x2f8/0x520 [ 2581.259018] io_submit_sqes+0x44ab/0x8610 [ 2581.259065] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2581.259082] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2581.259103] ? find_held_lock+0x2c/0x110 [ 2581.259127] ? io_submit_sqes+0x8610/0x8610 [ 2581.259152] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2581.259172] ? wait_for_completion_io+0x270/0x270 [ 2581.259194] ? rcu_read_lock_any_held+0x75/0xa0 [ 2581.259211] ? vfs_write+0x354/0xb10 [ 2581.259230] ? fput_many+0x2f/0x1a0 [ 2581.259250] ? ksys_write+0x1a9/0x260 [ 2581.259270] ? __ia32_sys_read+0xb0/0xb0 [ 2581.259292] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2581.259313] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2581.259335] do_syscall_64+0x33/0x40 [ 2581.259354] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2581.259367] RIP: 0033:0x7fa5a9c0bb19 [ 2581.259385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2581.259396] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2581.259416] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2581.259427] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2581.259438] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2581.259448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2581.259459] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:25:01 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:01 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 00:25:01 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x600000000000000) 00:25:01 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:01 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:01 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460005000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:25:01 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:01 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2594.418257] FAULT_INJECTION: forcing a failure. [ 2594.418257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2594.419772] CPU: 1 PID: 11391 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2594.420630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.421658] Call Trace: [ 2594.421675] dump_stack+0x107/0x167 [ 2594.421689] should_fail.cold+0x5/0xa [ 2594.421705] _copy_from_user+0x2e/0x1b0 [ 2594.421720] move_addr_to_kernel.part.0+0x31/0x110 [ 2594.421733] move_addr_to_kernel+0x4f/0x70 [ 2594.421746] io_connect+0x47a/0x610 [ 2594.421758] ? io_prep_rw+0x1050/0x1050 [ 2594.421781] ? __lock_acquire+0xbb1/0x5b00 [ 2594.421795] io_issue_sqe+0x1611/0x77d0 [ 2594.421807] ? io_dismantle_req+0xdf/0x180 00:25:01 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) [ 2594.421820] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2594.421834] ? io_connect+0x610/0x610 [ 2594.421849] ? lock_acquire+0x197/0x470 [ 2594.421859] ? find_held_lock+0x2c/0x110 [ 2594.421874] ? __fget_files+0x2cf/0x520 [ 2594.421884] ? lock_downgrade+0x6d0/0x6d0 [ 2594.421898] __io_queue_sqe+0x90/0x9d0 [ 2594.421924] ? io_issue_sqe+0x77d0/0x77d0 [ 2594.421936] ? __fget_files+0x2f8/0x520 [ 2594.421962] io_submit_sqes+0x44ab/0x8610 [ 2594.421993] ? __do_sys_io_uring_enter+0x6b2/0x1890 00:25:01 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2594.422003] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2594.422016] ? find_held_lock+0x2c/0x110 [ 2594.422030] ? io_submit_sqes+0x8610/0x8610 [ 2594.422045] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2594.422058] ? wait_for_completion_io+0x270/0x270 [ 2594.422072] ? rcu_read_lock_any_held+0x75/0xa0 [ 2594.422083] ? vfs_write+0x354/0xb10 [ 2594.422094] ? fput_many+0x2f/0x1a0 [ 2594.422105] ? ksys_write+0x1a9/0x260 [ 2594.422117] ? __ia32_sys_read+0xb0/0xb0 [ 2594.422130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2594.422143] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2594.422156] do_syscall_64+0x33/0x40 [ 2594.422167] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2594.422175] RIP: 0033:0x7fa5a9c0bb19 [ 2594.422186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.422192] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2594.422204] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2594.422210] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2594.422217] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.422223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2594.422230] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2594.524517] FAULT_INJECTION: forcing a failure. [ 2594.524517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2594.524560] CPU: 0 PID: 11399 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2594.524571] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.524578] Call Trace: 00:25:02 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460006000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2594.524605] dump_stack+0x107/0x167 [ 2594.524627] should_fail.cold+0x5/0xa [ 2594.524655] _copy_from_user+0x2e/0x1b0 [ 2594.524684] move_addr_to_kernel.part.0+0x31/0x110 [ 2594.524709] move_addr_to_kernel+0x4f/0x70 [ 2594.524730] io_connect+0x47a/0x610 [ 2594.524753] ? io_prep_rw+0x1050/0x1050 00:25:02 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c4600f0000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2594.524801] ? __lock_acquire+0xbb1/0x5b00 [ 2594.524833] io_issue_sqe+0x1611/0x77d0 [ 2594.524855] ? io_dismantle_req+0xdf/0x180 [ 2594.524878] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2594.524906] ? io_connect+0x610/0x610 [ 2594.524931] ? lock_acquire+0x197/0x470 [ 2594.524950] ? find_held_lock+0x2c/0x110 [ 2594.524976] ? __fget_files+0x2cf/0x520 [ 2594.524995] ? lock_downgrade+0x6d0/0x6d0 [ 2594.525018] __io_queue_sqe+0x90/0x9d0 [ 2594.525044] ? io_issue_sqe+0x77d0/0x77d0 [ 2594.525061] ? __fget_files+0x2f8/0x520 [ 2594.525098] io_submit_sqes+0x44ab/0x8610 [ 2594.525150] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2594.525169] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2594.525192] ? find_held_lock+0x2c/0x110 [ 2594.525217] ? io_submit_sqes+0x8610/0x8610 [ 2594.525245] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2594.525268] ? wait_for_completion_io+0x270/0x270 [ 2594.525293] ? rcu_read_lock_any_held+0x75/0xa0 [ 2594.525312] ? vfs_write+0x354/0xb10 [ 2594.525332] ? fput_many+0x2f/0x1a0 [ 2594.525353] ? ksys_write+0x1a9/0x260 [ 2594.525376] ? __ia32_sys_read+0xb0/0xb0 [ 2594.525400] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2594.525424] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2594.525449] do_syscall_64+0x33/0x40 [ 2594.525472] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2594.525487] RIP: 0033:0x7fa5a9c0bb19 00:25:02 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x2000000000000000) 00:25:02 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) [ 2594.525511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.525524] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2594.525549] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2594.525564] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2594.525577] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.525588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2594.525601] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2594.704711] FAULT_INJECTION: forcing a failure. [ 2594.704711] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2594.704730] CPU: 1 PID: 11412 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2594.704738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.704744] Call Trace: [ 2594.704764] dump_stack+0x107/0x167 [ 2594.704785] should_fail.cold+0x5/0xa [ 2594.704808] _copy_from_user+0x2e/0x1b0 [ 2594.704830] move_addr_to_kernel.part.0+0x31/0x110 [ 2594.704851] move_addr_to_kernel+0x4f/0x70 [ 2594.704870] io_connect+0x47a/0x610 [ 2594.704890] ? io_prep_rw+0x1050/0x1050 00:25:02 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) [ 2594.704926] ? __lock_acquire+0xbb1/0x5b00 [ 2594.704950] io_issue_sqe+0x1611/0x77d0 [ 2594.704971] ? io_dismantle_req+0xdf/0x180 [ 2594.704994] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2594.705016] ? io_connect+0x610/0x610 [ 2594.705036] ? lock_acquire+0x197/0x470 [ 2594.705053] ? find_held_lock+0x2c/0x110 [ 2594.705077] ? __fget_files+0x2cf/0x520 [ 2594.705094] ? lock_downgrade+0x6d0/0x6d0 [ 2594.705115] __io_queue_sqe+0x90/0x9d0 [ 2594.705134] ? io_issue_sqe+0x77d0/0x77d0 [ 2594.705151] ? __fget_files+0x2f8/0x520 [ 2594.705183] io_submit_sqes+0x44ab/0x8610 [ 2594.705227] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2594.705247] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2594.705270] ? find_held_lock+0x2c/0x110 [ 2594.705291] ? io_submit_sqes+0x8610/0x8610 [ 2594.705314] ? __mutex_unlock_slowpath+0xe1/0x600 00:25:02 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) [ 2594.705335] ? wait_for_completion_io+0x270/0x270 [ 2594.705355] ? rcu_read_lock_any_held+0x75/0xa0 [ 2594.705372] ? vfs_write+0x354/0xb10 [ 2594.705385] ? fput_many+0x2f/0x1a0 [ 2594.705402] ? ksys_write+0x1a9/0x260 [ 2594.705420] ? __ia32_sys_read+0xb0/0xb0 [ 2594.705443] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2594.705462] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2594.705483] do_syscall_64+0x33/0x40 [ 2594.705504] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2594.705514] RIP: 0033:0x7fa5a9c0bb19 [ 2594.705533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.705543] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2594.705561] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2594.705571] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2594.705583] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.705595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2594.705607] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2594.756310] FAULT_INJECTION: forcing a failure. [ 2594.756310] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2594.756323] CPU: 1 PID: 11417 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2594.756328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.756332] Call Trace: [ 2594.756345] dump_stack+0x107/0x167 [ 2594.756357] should_fail.cold+0x5/0xa [ 2594.756372] _copy_from_user+0x2e/0x1b0 [ 2594.756386] move_addr_to_kernel.part.0+0x31/0x110 [ 2594.756398] move_addr_to_kernel+0x4f/0x70 [ 2594.756409] io_connect+0x47a/0x610 [ 2594.756420] ? io_prep_rw+0x1050/0x1050 [ 2594.756442] ? __lock_acquire+0xbb1/0x5b00 [ 2594.756455] io_issue_sqe+0x1611/0x77d0 [ 2594.756465] ? io_dismantle_req+0xdf/0x180 [ 2594.756477] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2594.756491] ? io_connect+0x610/0x610 [ 2594.756504] ? lock_acquire+0x197/0x470 [ 2594.756513] ? find_held_lock+0x2c/0x110 [ 2594.756526] ? __fget_files+0x2cf/0x520 [ 2594.756536] ? lock_downgrade+0x6d0/0x6d0 [ 2594.756549] __io_queue_sqe+0x90/0x9d0 [ 2594.756562] ? io_issue_sqe+0x77d0/0x77d0 [ 2594.756571] ? __fget_files+0x2f8/0x520 [ 2594.756588] io_submit_sqes+0x44ab/0x8610 [ 2594.756614] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2594.756623] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2594.756635] ? find_held_lock+0x2c/0x110 [ 2594.756648] ? io_submit_sqes+0x8610/0x8610 [ 2594.756662] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2594.756673] ? wait_for_completion_io+0x270/0x270 [ 2594.756685] ? rcu_read_lock_any_held+0x75/0xa0 [ 2594.756695] ? vfs_write+0x354/0xb10 [ 2594.756705] ? fput_many+0x2f/0x1a0 [ 2594.756716] ? ksys_write+0x1a9/0x260 [ 2594.756726] ? __ia32_sys_read+0xb0/0xb0 [ 2594.756739] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2594.756750] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2594.756762] do_syscall_64+0x33/0x40 [ 2594.756776] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2594.756783] RIP: 0033:0x7fa5a9c0bb19 [ 2594.756793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.756799] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2594.756810] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2594.756816] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2594.756821] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.756827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2594.756833] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2594.850529] FAULT_INJECTION: forcing a failure. [ 2594.850529] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2594.897894] CPU: 0 PID: 11419 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2594.897907] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.897925] Call Trace: [ 2594.897953] dump_stack+0x107/0x167 [ 2594.897977] should_fail.cold+0x5/0xa [ 2594.902737] _copy_from_user+0x2e/0x1b0 [ 2594.902766] move_addr_to_kernel.part.0+0x31/0x110 [ 2594.902793] move_addr_to_kernel+0x4f/0x70 [ 2594.902814] io_connect+0x47a/0x610 [ 2594.902835] ? io_prep_rw+0x1050/0x1050 [ 2594.902880] ? __lock_acquire+0xbb1/0x5b00 [ 2594.902905] io_issue_sqe+0x1611/0x77d0 [ 2594.902927] ? io_dismantle_req+0xdf/0x180 [ 2594.909625] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2594.909653] ? io_connect+0x610/0x610 [ 2594.909678] ? lock_acquire+0x197/0x470 [ 2594.909697] ? find_held_lock+0x2c/0x110 [ 2594.909724] ? __fget_files+0x2cf/0x520 [ 2594.909744] ? lock_downgrade+0x6d0/0x6d0 [ 2594.909768] __io_queue_sqe+0x90/0x9d0 [ 2594.909794] ? io_issue_sqe+0x77d0/0x77d0 [ 2594.909810] ? __fget_files+0x2f8/0x520 [ 2594.909844] io_submit_sqes+0x44ab/0x8610 [ 2594.909895] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2594.909913] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2594.909945] ? find_held_lock+0x2c/0x110 [ 2594.909969] ? io_submit_sqes+0x8610/0x8610 [ 2594.909995] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2594.910016] ? wait_for_completion_io+0x270/0x270 [ 2594.910038] ? rcu_read_lock_any_held+0x75/0xa0 [ 2594.910056] ? vfs_write+0x354/0xb10 [ 2594.910075] ? fput_many+0x2f/0x1a0 [ 2594.910095] ? ksys_write+0x1a9/0x260 [ 2594.910115] ? __ia32_sys_read+0xb0/0xb0 [ 2594.910138] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2594.910159] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2594.910181] do_syscall_64+0x33/0x40 [ 2594.910200] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2594.910213] RIP: 0033:0x7fa5a9c0bb19 [ 2594.910232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.910242] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2594.910262] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2594.910274] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2594.910285] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.910297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2594.910308] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2606.813350] FAULT_INJECTION: forcing a failure. [ 2606.813350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2606.813363] CPU: 1 PID: 11439 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2606.813369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 00:25:14 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x4000000000000000) 00:25:14 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000707000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:25:14 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) 00:25:14 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:14 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:14 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) [ 2606.813373] Call Trace: [ 2606.813388] dump_stack+0x107/0x167 [ 2606.813399] should_fail.cold+0x5/0xa [ 2606.813414] _copy_from_user+0x2e/0x1b0 [ 2606.813428] move_addr_to_kernel.part.0+0x31/0x110 [ 2606.813440] move_addr_to_kernel+0x4f/0x70 [ 2606.813452] io_connect+0x47a/0x610 write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:14 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:14 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2606.813463] ? io_prep_rw+0x1050/0x1050 [ 2606.813485] ? __lock_acquire+0xbb1/0x5b00 [ 2606.813498] io_issue_sqe+0x1611/0x77d0 [ 2606.813509] ? io_dismantle_req+0xdf/0x180 [ 2606.813521] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2606.813534] ? io_connect+0x610/0x610 [ 2606.813547] ? lock_acquire+0x197/0x470 [ 2606.813557] ? find_held_lock+0x2c/0x110 [ 2606.813571] ? __fget_files+0x2cf/0x520 [ 2606.813581] ? lock_downgrade+0x6d0/0x6d0 [ 2606.813594] __io_queue_sqe+0x90/0x9d0 [ 2606.813608] ? io_issue_sqe+0x77d0/0x77d0 [ 2606.813616] ? __fget_files+0x2f8/0x520 [ 2606.813634] io_submit_sqes+0x44ab/0x8610 [ 2606.813659] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2606.813669] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2606.813680] ? find_held_lock+0x2c/0x110 [ 2606.813693] ? io_submit_sqes+0x8610/0x8610 [ 2606.813707] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2606.813719] ? wait_for_completion_io+0x270/0x270 [ 2606.813731] ? rcu_read_lock_any_held+0x75/0xa0 [ 2606.813742] ? vfs_write+0x354/0xb10 [ 2606.813752] ? fput_many+0x2f/0x1a0 [ 2606.813763] ? ksys_write+0x1a9/0x260 [ 2606.813778] ? __ia32_sys_read+0xb0/0xb0 [ 2606.813791] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2606.813802] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2606.813814] do_syscall_64+0x33/0x40 [ 2606.813824] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2606.813831] RIP: 0033:0x7fa5a9c0bb19 [ 2606.813841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2606.813846] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2606.813858] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2606.813863] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2606.813869] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2606.813875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2606.813880] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:25:14 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 00:25:14 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46039f000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:25:14 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0xffffffff00000000) 00:25:14 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:14 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:14 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460050000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2607.037563] FAULT_INJECTION: forcing a failure. [ 2607.037563] name fail_usercopy, interval 1, probability 0, space 0, times 0 00:25:14 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2607.037586] CPU: 0 PID: 11458 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2607.037596] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2607.037602] Call Trace: 00:25:14 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000807000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2607.037629] dump_stack+0x107/0x167 [ 2607.037651] should_fail.cold+0x5/0xa [ 2607.037679] _copy_from_user+0x2e/0x1b0 [ 2607.037707] move_addr_to_kernel.part.0+0x31/0x110 [ 2607.037731] move_addr_to_kernel+0x4f/0x70 [ 2607.037753] io_connect+0x47a/0x610 [ 2607.037782] ? io_prep_rw+0x1050/0x1050 [ 2607.037824] ? __lock_acquire+0xbb1/0x5b00 [ 2607.037850] io_issue_sqe+0x1611/0x77d0 [ 2607.037872] ? io_dismantle_req+0xdf/0x180 [ 2607.037896] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2607.037923] ? io_connect+0x610/0x610 [ 2607.037949] ? lock_acquire+0x197/0x470 [ 2607.037968] ? find_held_lock+0x2c/0x110 [ 2607.037994] ? __fget_files+0x2cf/0x520 [ 2607.038015] ? lock_downgrade+0x6d0/0x6d0 [ 2607.038040] __io_queue_sqe+0x90/0x9d0 [ 2607.038077] ? io_issue_sqe+0x77d0/0x77d0 00:25:14 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2607.038094] ? __fget_files+0x2f8/0x520 [ 2607.038130] io_submit_sqes+0x44ab/0x8610 [ 2607.038180] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2607.038199] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2607.038222] ? find_held_lock+0x2c/0x110 [ 2607.038248] ? io_submit_sqes+0x8610/0x8610 [ 2607.038274] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2607.038297] ? wait_for_completion_io+0x270/0x270 [ 2607.038320] ? rcu_read_lock_any_held+0x75/0xa0 [ 2607.038340] ? vfs_write+0x354/0xb10 [ 2607.038360] ? fput_many+0x2f/0x1a0 [ 2607.038381] ? ksys_write+0x1a9/0x260 [ 2607.038402] ? __ia32_sys_read+0xb0/0xb0 [ 2607.038427] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2607.038448] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2607.038472] do_syscall_64+0x33/0x40 [ 2607.038493] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2607.038506] RIP: 0033:0x7fa5a9c0bb19 [ 2607.038525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:25:14 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r2, &(0x7f0000000140)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1, {0x0, r7}}, 0xfa) r8 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r8, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r9, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r10, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2607.038536] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2607.038557] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2607.038569] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 00:25:14 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) [ 2607.038580] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2607.038592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2607.038603] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:25:14 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="0c454c460000000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2607.266111] FAULT_INJECTION: forcing a failure. [ 2607.266111] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2607.266134] CPU: 0 PID: 11483 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2607.266145] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2607.266151] Call Trace: [ 2607.266178] dump_stack+0x107/0x167 [ 2607.266201] should_fail.cold+0x5/0xa [ 2607.266229] _copy_from_user+0x2e/0x1b0 [ 2607.266257] move_addr_to_kernel.part.0+0x31/0x110 [ 2607.266280] move_addr_to_kernel+0x4f/0x70 [ 2607.266303] io_connect+0x47a/0x610 [ 2607.266325] ? io_prep_rw+0x1050/0x1050 [ 2607.266368] ? __lock_acquire+0xbb1/0x5b00 [ 2607.266398] io_issue_sqe+0x1611/0x77d0 [ 2607.266420] ? io_dismantle_req+0xdf/0x180 [ 2607.266449] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2607.266476] ? io_connect+0x610/0x610 [ 2607.266503] ? lock_acquire+0x197/0x470 [ 2607.266525] ? find_held_lock+0x2c/0x110 [ 2607.284668] ? __fget_files+0x2cf/0x520 [ 2607.284689] ? lock_downgrade+0x6d0/0x6d0 [ 2607.284715] __io_queue_sqe+0x90/0x9d0 [ 2607.284742] ? io_issue_sqe+0x77d0/0x77d0 [ 2607.284759] ? __fget_files+0x2f8/0x520 [ 2607.284795] io_submit_sqes+0x44ab/0x8610 [ 2607.284846] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2607.284868] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2607.292077] ? find_held_lock+0x2c/0x110 [ 2607.292103] ? io_submit_sqes+0x8610/0x8610 [ 2607.292131] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2607.292153] ? wait_for_completion_io+0x270/0x270 [ 2607.292176] ? rcu_read_lock_any_held+0x75/0xa0 [ 2607.292196] ? vfs_write+0x354/0xb10 [ 2607.292216] ? fput_many+0x2f/0x1a0 [ 2607.292238] ? ksys_write+0x1a9/0x260 [ 2607.299418] ? __ia32_sys_read+0xb0/0xb0 [ 2607.299443] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2607.299464] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2607.299487] do_syscall_64+0x33/0x40 [ 2607.299508] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2607.299522] RIP: 0033:0x7fa5a9c0bb19 [ 2607.299542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2607.299553] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2607.299574] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2607.299586] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 00:25:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.sectors\x00', 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f00000001c0)={0x6, 0xfd2, 0x983e7945bafbc6e2, 0x2, 0x1, [{0x3, 0x8, 0x5, '\x00', 0x200}]}) openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x131800, 0x0) r2 = syz_io_uring_setup(0x3862, &(0x7f00000003c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f0000000340)=@nfc_llcp={0x27, 0x0, 0x0, 0x2, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r6, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = getpgid(0x0) getpgid(r7) fcntl$lock(r5, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x1, 0x0, r7}) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r8, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2607.299597] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2607.299609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2607.299620] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:25:14 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:14 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:14 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000907000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:25:14 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:14 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r5 = openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r6 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r6, {0xee01, 0xee00}}, './file0\x00'}) io_uring_enter(r8, 0x841, 0x7fe3, 0x0, 0x0, 0x2b) 00:25:26 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:26 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:26 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000a000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:25:26 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:26 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) 00:25:26 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:26 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:26 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4}, &(0x7f00004d7000/0x1000)=nil, &(0x7f0000707000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r5 = openat(0xffffffffffffff9c, 0x0, 0x5855e2, 0x5) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0xb51, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r7, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r5, &(0x7f0000000140)={0x561000, 0x4, 0x2}, &(0x7f00000001c0)='./file0\x00', 0x18, 0x0, 0x23456}, 0x7f) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r6, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2619.468712] FAULT_INJECTION: forcing a failure. [ 2619.468712] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2619.468734] CPU: 0 PID: 11531 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2619.468745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2619.468751] Call Trace: [ 2619.468781] dump_stack+0x107/0x167 [ 2619.468802] should_fail.cold+0x5/0xa [ 2619.468829] _copy_from_user+0x2e/0x1b0 [ 2619.468854] move_addr_to_kernel.part.0+0x31/0x110 [ 2619.468876] move_addr_to_kernel+0x4f/0x70 [ 2619.468897] io_connect+0x47a/0x610 [ 2619.468918] ? io_prep_rw+0x1050/0x1050 [ 2619.468958] ? __lock_acquire+0xbb1/0x5b00 [ 2619.468982] io_issue_sqe+0x1611/0x77d0 [ 2619.469003] ? io_dismantle_req+0xdf/0x180 [ 2619.469025] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2619.469050] ? io_connect+0x610/0x610 [ 2619.469075] ? lock_acquire+0x197/0x470 [ 2619.469093] ? find_held_lock+0x2c/0x110 [ 2619.469118] ? __fget_files+0x2cf/0x520 [ 2619.469137] ? lock_downgrade+0x6d0/0x6d0 [ 2619.469161] __io_queue_sqe+0x90/0x9d0 [ 2619.488591] ? io_issue_sqe+0x77d0/0x77d0 [ 2619.488607] ? __fget_files+0x2f8/0x520 [ 2619.488641] io_submit_sqes+0x44ab/0x8610 [ 2619.488688] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2619.491848] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2619.491871] ? find_held_lock+0x2c/0x110 [ 2619.491895] ? io_submit_sqes+0x8610/0x8610 [ 2619.491921] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2619.491942] ? wait_for_completion_io+0x270/0x270 [ 2619.496217] ? rcu_read_lock_any_held+0x75/0xa0 [ 2619.496235] ? vfs_write+0x354/0xb10 [ 2619.496254] ? fput_many+0x2f/0x1a0 [ 2619.496275] ? ksys_write+0x1a9/0x260 [ 2619.496294] ? __ia32_sys_read+0xb0/0xb0 [ 2619.496317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2619.496337] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2619.496359] do_syscall_64+0x33/0x40 [ 2619.496377] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2619.496390] RIP: 0033:0x7fa5a9c0bb19 [ 2619.496408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2619.496418] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2619.496438] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2619.496449] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2619.496459] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2619.496470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2619.496481] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:25:42 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:42 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:42 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 87) 00:25:42 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:42 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46009b000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) 00:25:42 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r5 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r5, 0x4f, 0x0, 0x5, 0x3, 0x0, {0x0, r6}}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r6}}, 0x3) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r7, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r8 = socket$inet(0xa, 0x3, 0xff) r9 = dup(r8) setsockopt$inet6_int(r9, 0x29, 0x16, &(0x7f0000000180), 0x4) write$binfmt_script(r9, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n'}, {0x20, '&#%'}, {}, {}, {0x20, '\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n'}], 0xa, "a99525d11749aec1084ddfec4f865eb6b0f82780d1a8757c4acc28f340b36cd31cbbba06adc9f3eb279d6a62966e5e61c0968febb9bfcbe738ea96f3b20f3fc83ebdc1406b89ca98c0481f16ed712b3e0d8a34844caa10b5db7e9f5b093c3f1f2373f358e6d68b665852"}, 0xc9) 00:25:42 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:42 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2634.813790] FAULT_INJECTION: forcing a failure. [ 2634.813790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2634.813845] CPU: 1 PID: 11554 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2634.813855] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2634.813861] Call Trace: [ 2634.813885] dump_stack+0x107/0x167 [ 2634.813907] should_fail.cold+0x5/0xa [ 2634.813933] _copy_from_user+0x2e/0x1b0 [ 2634.813959] move_addr_to_kernel.part.0+0x31/0x110 [ 2634.813982] move_addr_to_kernel+0x4f/0x70 [ 2634.814004] io_connect+0x47a/0x610 [ 2634.814025] ? io_prep_rw+0x1050/0x1050 [ 2634.814065] ? __lock_acquire+0xbb1/0x5b00 [ 2634.814089] io_issue_sqe+0x1611/0x77d0 00:25:42 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\x05\x00\x00I\xb30WG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0xa08800, 0x0) r7 = socket$inet(0xa, 0x3, 0xff) r8 = dup(r7) write$binfmt_script(r8, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530202425275b24762000200020792f2c2029202dea260ac7aa149249221e44d53b349cae27aa9d7ce63a5b91122f335ed7565f1f45b82b2a0400000000000000"], 0x49) syz_io_uring_submit(r4, r2, &(0x7f00000001c0)=@IORING_OP_SPLICE={0x1e, 0x5, 0x0, @fd_index=0x9, 0x200, {0x0, r6}, 0x3, 0x8, 0x1, {0x0, 0x0, r7}}, 0xc7) [ 2634.814110] ? io_dismantle_req+0xdf/0x180 [ 2634.814133] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2634.814159] ? io_connect+0x610/0x610 [ 2634.814184] ? lock_acquire+0x197/0x470 [ 2634.814201] ? find_held_lock+0x2c/0x110 [ 2634.814227] ? __fget_files+0x2cf/0x520 [ 2634.814246] ? lock_downgrade+0x6d0/0x6d0 [ 2634.814270] __io_queue_sqe+0x90/0x9d0 [ 2634.814296] ? io_issue_sqe+0x77d0/0x77d0 [ 2634.814312] ? __fget_files+0x2f8/0x520 00:25:42 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454cff1000000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2634.814346] io_submit_sqes+0x44ab/0x8610 [ 2634.814395] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2634.814423] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2634.814445] ? find_held_lock+0x2c/0x110 [ 2634.814470] ? io_submit_sqes+0x8610/0x8610 [ 2634.814495] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2634.814516] ? wait_for_completion_io+0x270/0x270 [ 2634.814538] ? rcu_read_lock_any_held+0x75/0xa0 [ 2634.814556] ? vfs_write+0x354/0xb10 [ 2634.814575] ? fput_many+0x2f/0x1a0 [ 2634.814596] ? ksys_write+0x1a9/0x260 [ 2634.814615] ? __ia32_sys_read+0xb0/0xb0 [ 2634.814639] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 00:25:42 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 88) [ 2634.814660] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2634.814682] do_syscall_64+0x33/0x40 [ 2634.814701] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2634.814714] RIP: 0033:0x7fa5a9c0bb19 [ 2634.814731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2634.814741] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2634.814762] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2634.814779] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2634.814790] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2634.814801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2634.814813] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2634.962507] FAULT_INJECTION: forcing a failure. [ 2634.962507] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2634.962535] CPU: 0 PID: 11569 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2634.962542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2634.962547] Call Trace: [ 2634.962565] dump_stack+0x107/0x167 [ 2634.962580] should_fail.cold+0x5/0xa [ 2634.962598] _copy_from_user+0x2e/0x1b0 [ 2634.962615] move_addr_to_kernel.part.0+0x31/0x110 [ 2634.962630] move_addr_to_kernel+0x4f/0x70 [ 2634.962644] io_connect+0x47a/0x610 [ 2634.962658] ? io_prep_rw+0x1050/0x1050 00:25:42 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000002, 0x40010, r5, 0x24c56000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r6, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2634.962684] ? __lock_acquire+0xbb1/0x5b00 [ 2634.962700] io_issue_sqe+0x1611/0x77d0 [ 2634.962713] ? io_dismantle_req+0xdf/0x180 [ 2634.962728] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2634.962744] ? io_connect+0x610/0x610 [ 2634.962760] ? lock_acquire+0x197/0x470 [ 2634.962772] ? find_held_lock+0x2c/0x110 [ 2634.962789] ? __fget_files+0x2cf/0x520 [ 2634.962801] ? lock_downgrade+0x6d0/0x6d0 [ 2634.962816] __io_queue_sqe+0x90/0x9d0 [ 2634.962832] ? io_issue_sqe+0x77d0/0x77d0 [ 2634.962843] ? __fget_files+0x2f8/0x520 [ 2634.962865] io_submit_sqes+0x44ab/0x8610 [ 2634.962896] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2634.962907] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2634.962921] ? find_held_lock+0x2c/0x110 [ 2634.962937] ? io_submit_sqes+0x8610/0x8610 [ 2634.962955] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2634.962968] ? wait_for_completion_io+0x270/0x270 [ 2634.962983] ? rcu_read_lock_any_held+0x75/0xa0 [ 2634.962995] ? vfs_write+0x354/0xb10 [ 2634.963007] ? fput_many+0x2f/0x1a0 [ 2634.963020] ? ksys_write+0x1a9/0x260 [ 2634.963032] ? __ia32_sys_read+0xb0/0xb0 [ 2634.963047] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2634.963061] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2634.963075] do_syscall_64+0x33/0x40 [ 2634.963088] entry_SYSCALL_64_after_hwframe+0x67/0xd1 00:25:42 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 89) [ 2634.963096] RIP: 0033:0x7fa5a9c0bb19 [ 2634.963108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2634.963114] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2634.963128] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2634.963135] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2634.963142] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2634.963150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2634.963157] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2635.067603] FAULT_INJECTION: forcing a failure. [ 2635.067603] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2635.067617] CPU: 0 PID: 11573 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2635.067623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2635.067627] Call Trace: [ 2635.067644] dump_stack+0x107/0x167 [ 2635.067658] should_fail.cold+0x5/0xa [ 2635.067675] _copy_from_user+0x2e/0x1b0 [ 2635.067696] move_addr_to_kernel.part.0+0x31/0x110 [ 2635.067710] move_addr_to_kernel+0x4f/0x70 [ 2635.067723] io_connect+0x47a/0x610 [ 2635.067736] ? io_prep_rw+0x1050/0x1050 [ 2635.067761] ? __lock_acquire+0xbb1/0x5b00 [ 2635.067775] io_issue_sqe+0x1611/0x77d0 [ 2635.067788] ? io_dismantle_req+0xdf/0x180 [ 2635.067801] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2635.067817] ? io_connect+0x610/0x610 [ 2635.067832] ? lock_acquire+0x197/0x470 [ 2635.067842] ? find_held_lock+0x2c/0x110 [ 2635.067858] ? __fget_files+0x2cf/0x520 [ 2635.067870] ? lock_downgrade+0x6d0/0x6d0 00:25:42 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x400, 0x0) io_uring_enter(r3, 0x3bd, 0xfb82, 0x3, &(0x7f00000001c0)={[0x3]}, 0x8) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r6 = socket$inet(0xa, 0x3, 0xff) r7 = dup(r6) setsockopt$inet6_int(r7, 0x29, 0x16, &(0x7f0000000180), 0x4) accept4$bt_l2cap(r7, 0x0, &(0x7f0000000200), 0x80000) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r8, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2635.067884] __io_queue_sqe+0x90/0x9d0 [ 2635.067899] ? io_issue_sqe+0x77d0/0x77d0 [ 2635.067909] ? __fget_files+0x2f8/0x520 [ 2635.067929] io_submit_sqes+0x44ab/0x8610 [ 2635.067958] ? __do_sys_io_uring_enter+0x6b2/0x1890 00:25:42 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 90) [ 2635.067968] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2635.067982] ? find_held_lock+0x2c/0x110 [ 2635.067996] ? io_submit_sqes+0x8610/0x8610 [ 2635.068012] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2635.068025] ? wait_for_completion_io+0x270/0x270 [ 2635.068039] ? rcu_read_lock_any_held+0x75/0xa0 [ 2635.068051] ? vfs_write+0x354/0xb10 [ 2635.068063] ? fput_many+0x2f/0x1a0 00:25:42 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) [ 2635.068075] ? ksys_write+0x1a9/0x260 [ 2635.068087] ? __ia32_sys_read+0xb0/0xb0 [ 2635.068101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2635.068114] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2635.068127] do_syscall_64+0x33/0x40 [ 2635.068139] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2635.068148] RIP: 0033:0x7fa5a9c0bb19 [ 2635.068159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2635.068166] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2635.068179] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2635.068186] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2635.068193] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2635.068199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2635.068206] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2635.181066] FAULT_INJECTION: forcing a failure. [ 2635.181066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2635.181087] CPU: 1 PID: 11579 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2635.181098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2635.181104] Call Trace: [ 2635.181136] dump_stack+0x107/0x167 [ 2635.181159] should_fail.cold+0x5/0xa [ 2635.181185] _copy_from_user+0x2e/0x1b0 [ 2635.181211] move_addr_to_kernel.part.0+0x31/0x110 [ 2635.181233] move_addr_to_kernel+0x4f/0x70 [ 2635.181255] io_connect+0x47a/0x610 [ 2635.181276] ? io_prep_rw+0x1050/0x1050 [ 2635.181316] ? __lock_acquire+0xbb1/0x5b00 [ 2635.181340] io_issue_sqe+0x1611/0x77d0 [ 2635.181361] ? io_dismantle_req+0xdf/0x180 [ 2635.181383] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2635.181408] ? io_connect+0x610/0x610 [ 2635.181437] ? lock_acquire+0x197/0x470 [ 2635.181455] ? find_held_lock+0x2c/0x110 [ 2635.181480] ? __fget_files+0x2cf/0x520 [ 2635.181499] ? lock_downgrade+0x6d0/0x6d0 [ 2635.181524] __io_queue_sqe+0x90/0x9d0 [ 2635.181549] ? io_issue_sqe+0x77d0/0x77d0 [ 2635.181565] ? __fget_files+0x2f8/0x520 [ 2635.181598] io_submit_sqes+0x44ab/0x8610 [ 2635.181645] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2635.181662] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2635.181684] ? find_held_lock+0x2c/0x110 [ 2635.181708] ? io_submit_sqes+0x8610/0x8610 [ 2635.181733] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2635.181754] ? wait_for_completion_io+0x270/0x270 [ 2635.181776] ? rcu_read_lock_any_held+0x75/0xa0 [ 2635.181794] ? vfs_write+0x354/0xb10 [ 2635.181813] ? fput_many+0x2f/0x1a0 [ 2635.181832] ? ksys_write+0x1a9/0x260 [ 2635.181852] ? __ia32_sys_read+0xb0/0xb0 [ 2635.181875] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2635.181895] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2635.181917] do_syscall_64+0x33/0x40 [ 2635.181936] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2635.181949] RIP: 0033:0x7fa5a9c0bb19 [ 2635.181967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2635.181978] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2635.181998] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2635.182009] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2635.182020] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2635.182031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2635.182042] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 00:25:58 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 91) 00:25:58 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:58 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000340)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r1, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:58 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) readahead(r0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:58 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:58 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0)={0x0, 0xfec0, 0x31, 0x4}, &(0x7f00004d7000/0x1000)=nil, &(0x7f000050d000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x81) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r4 = openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) r5 = syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r6, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x4400, 0x0) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$RTC_SET_TIME(r8, 0x4024700a, &(0x7f0000000000)={0xc, 0x0, 0x0, 0x0, 0xb, 0x0, 0x1, 0xae}) ioctl$RTC_AIE_ON(r8, 0x7001) ioctl$BTRFS_IOC_WAIT_SYNC(r8, 0x40089416, &(0x7f0000000080)=r9) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f0000000340)={"2de61568c4e3232dbf7b35971fa3834f", 0x0, 0x0, {0x6}, {0x75, 0xb9}, 0x80, [0x8, 0x10007fffffff, 0x20, 0x2, 0x10001, 0x8, 0xfffffffffffffff8, 0x7f, 0x4, 0x10001, 0x3ff, 0x8, 0x0, 0xff, 0xc4f9, 0x7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r7, 0xc0c89425, &(0x7f0000000500)={"440beec68495872dc649b28b0f588e0c", r9, r10, {0x5, 0x8000}, {0x339, 0x800}, 0x1000, [0x3, 0x1ff, 0x5, 0x7, 0x3348, 0xfffffffffffffffe, 0xffffffff, 0x4, 0x7, 0x2, 0x4, 0x9, 0x2, 0x4, 0x80, 0x7fff]}) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 00:25:58 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) 00:25:58 executing program 7: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000040ff0f000018000000a35cdb56715c87048e6093b231465a608b265e949a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91a2c91a4544874bf681a4a6d58d2e64bdd02a210c1a45dbafa32cfcef6bc9748000d522a278db7b1687d88000000", @ANYRES32=r0, @ANYBLOB="0000d7cd8fafe74b00c00000000054397ad6f5f7e595acf85ffbf81ea5e16038b0477a4aa0d4f9cf3b3db8f471d6105bcd2e95ef85943bd62001119ee06f50aa9dda5f7c"]) openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000707000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db"], 0x42a) [ 2651.326654] FAULT_INJECTION: forcing a failure. [ 2651.326654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2651.326677] CPU: 0 PID: 11603 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2651.326688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2651.326694] Call Trace: [ 2651.326721] dump_stack+0x107/0x167 [ 2651.326743] should_fail.cold+0x5/0xa [ 2651.326775] _copy_from_user+0x2e/0x1b0 [ 2651.326802] move_addr_to_kernel.part.0+0x31/0x110 [ 2651.326825] move_addr_to_kernel+0x4f/0x70 [ 2651.326846] io_connect+0x47a/0x610 [ 2651.326867] ? io_prep_rw+0x1050/0x1050 [ 2651.326906] ? __lock_acquire+0xbb1/0x5b00 [ 2651.326930] io_issue_sqe+0x1611/0x77d0 [ 2651.326950] ? io_dismantle_req+0xdf/0x180 [ 2651.326972] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2651.326997] ? io_connect+0x610/0x610 [ 2651.327021] ? lock_acquire+0x197/0x470 [ 2651.327038] ? find_held_lock+0x2c/0x110 [ 2651.327064] ? __fget_files+0x2cf/0x520 [ 2651.327082] ? lock_downgrade+0x6d0/0x6d0 [ 2651.327106] __io_queue_sqe+0x90/0x9d0 [ 2651.327131] ? io_issue_sqe+0x77d0/0x77d0 [ 2651.327147] ? __fget_files+0x2f8/0x520 [ 2651.327180] io_submit_sqes+0x44ab/0x8610 [ 2651.327227] ? __do_sys_io_uring_enter+0x6b2/0x1890 00:25:58 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2651.327244] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2651.327265] ? find_held_lock+0x2c/0x110 [ 2651.327289] ? io_submit_sqes+0x8610/0x8610 [ 2651.327314] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2651.327335] ? wait_for_completion_io+0x270/0x270 [ 2651.327357] ? rcu_read_lock_any_held+0x75/0xa0 00:25:58 executing program 6: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 92) [ 2651.327375] ? vfs_write+0x354/0xb10 [ 2651.327394] ? fput_many+0x2f/0x1a0 [ 2651.327414] ? ksys_write+0x1a9/0x260 [ 2651.327433] ? __ia32_sys_read+0xb0/0xb0 [ 2651.327457] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2651.327477] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2651.327499] do_syscall_64+0x33/0x40 [ 2651.327518] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2651.327531] RIP: 0033:0x7fa5a9c0bb19 [ 2651.327549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.327559] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2651.327580] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2651.327591] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2651.327601] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2651.327612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2651.327623] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2651.479281] FAULT_INJECTION: forcing a failure. [ 2651.479281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2651.479303] CPU: 0 PID: 11617 Comm: syz-executor.6 Not tainted 5.10.244 #1 [ 2651.479313] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2651.479320] Call Trace: [ 2651.479347] dump_stack+0x107/0x167 [ 2651.479369] should_fail.cold+0x5/0xa [ 2651.479396] _copy_from_user+0x2e/0x1b0 [ 2651.479422] move_addr_to_kernel.part.0+0x31/0x110 [ 2651.479444] move_addr_to_kernel+0x4f/0x70 [ 2651.479465] io_connect+0x47a/0x610 [ 2651.479486] ? io_prep_rw+0x1050/0x1050 [ 2651.479525] ? __lock_acquire+0xbb1/0x5b00 [ 2651.479549] io_issue_sqe+0x1611/0x77d0 [ 2651.479569] ? io_dismantle_req+0xdf/0x180 [ 2651.479591] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2651.479616] ? io_connect+0x610/0x610 [ 2651.479641] ? lock_acquire+0x197/0x470 [ 2651.479658] ? find_held_lock+0x2c/0x110 [ 2651.479683] ? __fget_files+0x2cf/0x520 00:25:59 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x8) r5 = syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f0000000140)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r7 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r10 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r7, 0x0) syz_io_uring_submit(r10, r9, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f00000001c0)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index=0x4, 0x3, 0x0, 0x8, 0x4, 0x0, {0x0, r11}}, 0x91) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r6, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2651.479701] ? lock_downgrade+0x6d0/0x6d0 [ 2651.479732] __io_queue_sqe+0x90/0x9d0 [ 2651.479757] ? io_issue_sqe+0x77d0/0x77d0 [ 2651.479773] ? __fget_files+0x2f8/0x520 [ 2651.479806] io_submit_sqes+0x44ab/0x8610 [ 2651.479853] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 2651.479870] __do_sys_io_uring_enter+0x6b2/0x1890 [ 2651.479892] ? find_held_lock+0x2c/0x110 [ 2651.479916] ? io_submit_sqes+0x8610/0x8610 [ 2651.479942] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2651.479962] ? wait_for_completion_io+0x270/0x270 [ 2651.479984] ? rcu_read_lock_any_held+0x75/0xa0 [ 2651.480002] ? vfs_write+0x354/0xb10 [ 2651.480021] ? fput_many+0x2f/0x1a0 [ 2651.480041] ? ksys_write+0x1a9/0x260 [ 2651.480061] ? __ia32_sys_read+0xb0/0xb0 00:25:59 executing program 5: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00004d7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r5 = openat(0xffffffffffffff9c, 0x0, 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r6, 0x0) r7 = shmget$private(0x0, 0x1000, 0x1c10, &(0x7f0000ffd000/0x1000)=nil) r8 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="e385fb4d91132f46f706d85b2559e7343c2549d2ff28bd19a3890f6f1b5253a091a566f98eedd115eac7d4ebe4be42699eec6ce503a31844e674d2bb7bfe16ecfb76f25518e5fd3b", 0x48, 0x8f}, {&(0x7f0000000500)="83b0f521f8818213d477e65df3193a328ead359cf571f89a15898f909a3b2ee49c463420c65aa52f1096e9610785f8b16ee345057e84436d9982f9d5950dac4ed77fc587a2176cefe49a5bd17a49dea610da3911c73ef095dff43e145cb0731a66352e116c6025b6ab414c9f557bd0b86fa1230b50a7189988aa2a32e67fad91dca4e20137cb1bdcc23ddda26dcdb493dda2239fbde62eb03dea9fb5b866002ae74d0d3c76928d6b40c25df4a16127c7ce25ec2891d43bcccbb5b94252169721b01e03122398f469bd8df83d3bd05b23c1f5b1d688da9907e2cbf534fd9e6f90", 0xe0, 0xa205}], 0x1020000, &(0x7f0000000600)={[{'%]('}, {'^}'}, {'){\'}\'/!'}, {'&$\xc9&{\''}, {'\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n'}, {}, {'\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n'}], [{@dont_hash}, {@obj_type={'obj_type', 0x3d, '\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fsname}, {@dont_hash}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x39, 0x30, 0x39, 0x20, 0x62, 0x61], 0x2d, [0x64, 0x37, 0x39, 0x66], 0x2d, [0x35, 0x8, 0x31, 0x63], 0x2d, [0x65, 0xa5b6e4090e8a506b, 0x64, 0x62], 0x2d, [0x38, 0x30, 0x66, 0x36, 0x38, 0x63, 0x37, 0x61]}}}]}) sendfile(r8, r5, &(0x7f0000000280)=0x40, 0x2) shmat(r7, &(0x7f0000800000/0x800000)=nil, 0xc000) shmat(r7, &(0x7f00000fb000/0x4000)=nil, 0x2000) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2651.480085] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2651.480105] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2651.480127] do_syscall_64+0x33/0x40 [ 2651.480146] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2651.480159] RIP: 0033:0x7fa5a9c0bb19 [ 2651.480177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.480188] RSP: 002b:00007fa5a7181188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 2651.480208] RAX: ffffffffffffffda RBX: 00007fa5a9d1ef60 RCX: 00007fa5a9c0bb19 [ 2651.480219] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 2651.480230] RBP: 00007fa5a71811d0 R08: 0000000000000000 R09: 0000000000000000 [ 2651.480241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2651.480252] R13: 00007ffc709cf95f R14: 00007fa5a7181300 R15: 0000000000022000 [ 2651.585650] ------------[ cut here ]------------ [ 2651.585718] WARNING: CPU: 1 PID: 11623 at include/linux/fs.h:525 hugetlb_split+0x320/0xc50 [ 2651.585722] Modules linked in: [ 2651.585738] CPU: 1 PID: 11623 Comm: syz-executor.5 Not tainted 5.10.244 #1 [ 2651.585745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2651.585757] RIP: 0010:hugetlb_split+0x320/0xc50 [ 2651.585769] Code: 00 00 31 f6 48 81 c7 e0 00 00 00 e8 8a fb 7c 02 31 ff 41 89 c6 89 c6 e8 0e d4 d5 ff 45 85 f6 0f 85 5e fe ff ff e8 b0 da d5 ff <0f> 0b e9 52 fe ff ff e8 a4 da d5 ff 48 8d 43 50 48 89 c2 48 89 44 [ 2651.585912] RSP: 0018:ffff88800fe079c0 EFLAGS: 00010216 [ 2651.585937] RAX: 00000000000003a4 RBX: ffff8880094dcb00 RCX: ffffc90006214000 [ 2651.585951] RDX: 0000000000040000 RSI: ffffffff816af780 RDI: 0000000000000005 [ 2651.585965] RBP: 0000000020000000 R08: 0000000000000000 R09: ffff888046d7b8bf [ 2651.585980] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11001fc0f41 [ 2651.585994] R13: ffffffff8567ae3c R14: 0000000000000000 R15: 0000000000000001 [ 2651.586010] FS: 00007fa482505700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 2651.586025] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2651.586038] CR2: 0000000020000280 CR3: 0000000020292000 CR4: 0000000000350ee0 [ 2651.586078] Call Trace: [ 2651.586101] ? follow_hugetlb_page+0x10c0/0x10c0 [ 2651.586134] ? vm_area_alloc+0x110/0x110 [ 2651.586148] __vma_adjust+0xbe8/0x2510 [ 2651.586170] ? anon_vma_clone+0x3d0/0x590 [ 2651.586192] __split_vma+0x2be/0x4e0 [ 2651.586206] __do_munmap+0x365/0x1260 [ 2651.586217] ? pud_huge+0xd0/0xd0 [ 2651.586236] mmap_region+0x7cc/0x1500 [ 2651.586261] do_mmap+0x868/0x1370 [ 2651.586282] do_shmat+0xe99/0x1160 [ 2651.586302] ? __ia32_compat_sys_old_shmctl+0xb0/0xb0 [ 2651.586321] ? io_schedule_timeout+0x140/0x140 [ 2651.586342] __x64_sys_shmat+0xcc/0x160 [ 2651.586362] ? do_shmat+0x1160/0x1160 [ 2651.586383] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2651.586402] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2651.586420] ? trace_hardirqs_on+0x5b/0x180 [ 2651.586437] do_syscall_64+0x33/0x40 [ 2651.586456] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2651.586471] RIP: 0033:0x7fa484f8fb19 [ 2651.586489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.586503] RSP: 002b:00007fa482505188 EFLAGS: 00000246 ORIG_RAX: 000000000000001e [ 2651.586529] RAX: ffffffffffffffda RBX: 00007fa4850a2f60 RCX: 00007fa484f8fb19 [ 2651.586543] RDX: 000000000000c000 RSI: 0000000020800000 RDI: 0000000000000000 [ 2651.586559] RBP: 00007fa484fe9f6d R08: 0000000000000000 R09: 0000000000000000 [ 2651.586573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2651.586588] R13: 00007ffce91ab5cf R14: 00007fa482505300 R15: 0000000000022000 [ 2651.586609] irq event stamp: 1559 [ 2651.586642] hardirqs last enabled at (1565): [] vprintk_emit+0x490/0x4e0 [ 2651.586664] hardirqs last disabled at (1570): [] vprintk_emit+0x422/0x4e0 [ 2651.586684] softirqs last enabled at (1316): [] asm_call_irq_on_stack+0x12/0x20 [ 2651.586706] softirqs last disabled at (1253): [] asm_call_irq_on_stack+0x12/0x20 [ 2651.586718] ---[ end trace 4710dbd0bc95f118 ]--- [ 2651.586775] ------------[ cut here ]------------ [ 2651.586815] WARNING: CPU: 1 PID: 11623 at include/linux/fs.h:525 hugetlb_split+0x320/0xc50 [ 2651.586824] Modules linked in: [ 2651.586839] CPU: 1 PID: 11623 Comm: syz-executor.5 Tainted: G W 5.10.244 #1 [ 2651.586846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2651.586855] RIP: 0010:hugetlb_split+0x320/0xc50 [ 2651.586866] Code: 00 00 31 f6 48 81 c7 e0 00 00 00 e8 8a fb 7c 02 31 ff 41 89 c6 89 c6 e8 0e d4 d5 ff 45 85 f6 0f 85 5e fe ff ff e8 b0 da d5 ff <0f> 0b e9 52 fe ff ff e8 a4 da d5 ff 48 8d 43 50 48 89 c2 48 89 44 [ 2651.586880] RSP: 0018:ffff88800fe079c0 EFLAGS: 00010212 [ 2651.586892] RAX: 000000000000dd11 RBX: ffff8880094dcb00 RCX: ffffc90006214000 [ 2651.586906] RDX: 0000000000040000 RSI: ffffffff816af780 RDI: 0000000000000005 [ 2651.586913] RBP: 0000000020800000 R08: 0000000000000000 R09: ffff888046d7b8bf [ 2651.586920] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11001fc0f41 [ 2651.586927] R13: ffffffff8567ae3c R14: 0000000000000000 R15: 0000000000000001 [ 2651.586943] FS: 00007fa482505700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 2651.586958] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2651.586972] CR2: 0000000020000280 CR3: 0000000020292000 CR4: 0000000000350ee0 [ 2651.586983] Call Trace: [ 2651.587002] ? follow_hugetlb_page+0x10c0/0x10c0 [ 2651.587028] ? vm_area_alloc+0x110/0x110 [ 2651.587044] __vma_adjust+0xbf3/0x2510 [ 2651.587070] ? anon_vma_clone+0x3d0/0x590 [ 2651.587087] __split_vma+0x2be/0x4e0 [ 2651.587104] __do_munmap+0x365/0x1260 [ 2651.587119] ? pud_huge+0xd0/0xd0 [ 2651.587136] mmap_region+0x7cc/0x1500 [ 2651.587161] do_mmap+0x868/0x1370 [ 2651.587180] do_shmat+0xe99/0x1160 [ 2651.587201] ? __ia32_compat_sys_old_shmctl+0xb0/0xb0 [ 2651.587217] ? io_schedule_timeout+0x140/0x140 [ 2651.587234] __x64_sys_shmat+0xcc/0x160 [ 2651.587252] ? do_shmat+0x1160/0x1160 [ 2651.587271] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2651.587289] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2651.587307] ? trace_hardirqs_on+0x5b/0x180 [ 2651.587323] do_syscall_64+0x33/0x40 [ 2651.587346] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2651.587362] RIP: 0033:0x7fa484f8fb19 [ 2651.587383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.587400] RSP: 002b:00007fa482505188 EFLAGS: 00000246 ORIG_RAX: 000000000000001e [ 2651.587426] RAX: ffffffffffffffda RBX: 00007fa4850a2f60 RCX: 00007fa484f8fb19 [ 2651.587440] RDX: 000000000000c000 RSI: 0000000020800000 RDI: 0000000000000000 [ 2651.587454] RBP: 00007fa484fe9f6d R08: 0000000000000000 R09: 0000000000000000 [ 2651.587468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2651.587482] R13: 00007ffce91ab5cf R14: 00007fa482505300 R15: 0000000000022000 [ 2651.587503] irq event stamp: 1881 [ 2651.587524] hardirqs last enabled at (1887): [] vprintk_emit+0x490/0x4e0 [ 2651.587545] hardirqs last disabled at (1892): [] vprintk_emit+0x422/0x4e0 [ 2651.587565] softirqs last enabled at (1316): [] asm_call_irq_on_stack+0x12/0x20 [ 2651.587584] softirqs last disabled at (1253): [] asm_call_irq_on_stack+0x12/0x20 [ 2651.587596] ---[ end trace 4710dbd0bc95f119 ]--- [ 2651.600503] ------------[ cut here ]------------ [ 2651.683318] WARNING: CPU: 1 PID: 11623 at include/linux/fs.h:525 hugetlb_split+0x320/0xc50 [ 2651.683323] Modules linked in: [ 2651.683341] CPU: 1 PID: 11623 Comm: syz-executor.5 Tainted: G W 5.10.244 #1 [ 2651.683350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2651.683365] RIP: 0010:hugetlb_split+0x320/0xc50 [ 2651.683378] Code: 00 00 31 f6 48 81 c7 e0 00 00 00 e8 8a fb 7c 02 31 ff 41 89 c6 89 c6 e8 0e d4 d5 ff 45 85 f6 0f 85 5e fe ff ff e8 b0 da d5 ff <0f> 0b e9 52 fe ff ff e8 a4 da d5 ff 48 8d 43 50 48 89 c2 48 89 44 [ 2651.683385] RSP: 0018:ffff88800fe079c0 EFLAGS: 00010216 [ 2651.683396] RAX: 000000000001a619 RBX: ffff8880094dc000 RCX: ffffc90006214000 [ 2651.683403] RDX: 0000000000040000 RSI: ffffffff816af780 RDI: 0000000000000005 [ 2651.683410] RBP: 0000000020a00000 R08: 0000000000000000 R09: ffff888046d7b8bf [ 2651.683417] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11001fc0f41 [ 2651.683424] R13: ffffffff8567ae3c R14: 0000000000000000 R15: 0000000000000001 [ 2651.683436] FS: 00007fa482505700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 2651.683446] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2651.683453] CR2: 00007f19229d0bf8 CR3: 0000000020292000 CR4: 0000000000350ee0 [ 2651.683456] Call Trace: [ 2651.683474] ? follow_hugetlb_page+0x10c0/0x10c0 [ 2651.683495] ? vm_area_alloc+0x110/0x110 [ 2651.683507] __vma_adjust+0xbe8/0x2510 [ 2651.683526] ? anon_vma_clone+0x3d0/0x590 [ 2651.683542] __split_vma+0x41a/0x4e0 [ 2651.683556] __do_munmap+0xf40/0x1260 [ 2651.683567] ? pud_huge+0xd0/0xd0 [ 2651.683582] mmap_region+0x7cc/0x1500 [ 2651.683601] do_mmap+0x868/0x1370 [ 2651.701837] do_shmat+0xe99/0x1160 [ 2651.701856] ? __ia32_compat_sys_old_shmctl+0xb0/0xb0 [ 2651.701869] ? io_schedule_timeout+0x140/0x140 [ 2651.701882] __x64_sys_shmat+0xcc/0x160 [ 2651.701893] ? do_shmat+0x1160/0x1160 [ 2651.701905] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2651.701917] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2651.701926] ? trace_hardirqs_on+0x5b/0x180 [ 2651.701938] do_syscall_64+0x33/0x40 [ 2651.701949] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2651.701956] RIP: 0033:0x7fa484f8fb19 [ 2651.701967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.701973] RSP: 002b:00007fa482505188 EFLAGS: 00000246 ORIG_RAX: 000000000000001e [ 2651.701984] RAX: ffffffffffffffda RBX: 00007fa4850a2f60 RCX: 00007fa484f8fb19 [ 2651.701991] RDX: 000000000000c000 RSI: 0000000020800000 RDI: 0000000000000000 [ 2651.701997] RBP: 00007fa484fe9f6d R08: 0000000000000000 R09: 0000000000000000 [ 2651.702004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2651.702011] R13: 00007ffce91ab5cf R14: 00007fa482505300 R15: 0000000000022000 [ 2651.702026] irq event stamp: 3163 [ 2651.702039] hardirqs last enabled at (3169): [] vprintk_emit+0x490/0x4e0 [ 2651.702051] hardirqs last disabled at (3174): [] vprintk_emit+0x422/0x4e0 [ 2651.702064] softirqs last enabled at (2514): [] asm_call_irq_on_stack+0x12/0x20 [ 2651.702076] softirqs last disabled at (2413): [] asm_call_irq_on_stack+0x12/0x20 [ 2651.702081] ---[ end trace 4710dbd0bc95f11a ]--- [ 2651.702127] ------------[ cut here ]------------ [ 2651.702139] WARNING: CPU: 1 PID: 11623 at include/linux/fs.h:525 hugetlb_split+0x320/0xc50 [ 2651.702142] Modules linked in: [ 2651.702155] CPU: 1 PID: 11623 Comm: syz-executor.5 Tainted: G W 5.10.244 #1 [ 2651.702161] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2651.702170] RIP: 0010:hugetlb_split+0x320/0xc50 [ 2651.702179] Code: 00 00 31 f6 48 81 c7 e0 00 00 00 e8 8a fb 7c 02 31 ff 41 89 c6 89 c6 e8 0e d4 d5 ff 45 85 f6 0f 85 5e fe ff ff e8 b0 da d5 ff <0f> 0b e9 52 fe ff ff e8 a4 da d5 ff 48 8d 43 50 48 89 c2 48 89 44 [ 2651.702186] RSP: 0018:ffff88800fe079c0 EFLAGS: 00010246 [ 2651.702195] RAX: 0000000000040000 RBX: ffff8880094dc000 RCX: ffffc90006214000 [ 2651.702202] RDX: 0000000000040000 RSI: ffffffff816af780 RDI: 0000000000000005 [ 2651.702208] RBP: 0000000020c00000 R08: 0000000000000000 R09: ffff888046d7b8bf [ 2651.702215] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11001fc0f41 [ 2651.702222] R13: ffffffff8567ae3c R14: 0000000000000000 R15: 0000000000000003 [ 2651.702239] FS: 00007fa482505700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 2651.732060] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2651.732067] CR2: 00007f19229d0bf8 CR3: 0000000020292000 CR4: 0000000000350ee0 [ 2651.732071] Call Trace: [ 2651.732087] ? follow_hugetlb_page+0x10c0/0x10c0 [ 2651.732106] ? vm_area_alloc+0x110/0x110 [ 2651.732118] __vma_adjust+0xbf3/0x2510 [ 2651.732135] ? anon_vma_clone+0x3d0/0x590 [ 2651.732150] __split_vma+0x41a/0x4e0 [ 2651.732162] __do_munmap+0xf40/0x1260 [ 2651.732172] ? pud_huge+0xd0/0xd0 [ 2651.732186] mmap_region+0x7cc/0x1500 [ 2651.732204] do_mmap+0x868/0x1370 [ 2651.732220] do_shmat+0xe99/0x1160 [ 2651.732237] ? __ia32_compat_sys_old_shmctl+0xb0/0xb0 [ 2651.732249] ? io_schedule_timeout+0x140/0x140 [ 2651.732262] __x64_sys_shmat+0xcc/0x160 [ 2651.732273] ? do_shmat+0x1160/0x1160 [ 2651.732285] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2651.732296] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2651.732305] ? trace_hardirqs_on+0x5b/0x180 [ 2651.732316] do_syscall_64+0x33/0x40 [ 2651.732327] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2651.732335] RIP: 0033:0x7fa484f8fb19 [ 2651.732349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.732358] RSP: 002b:00007fa482505188 EFLAGS: 00000246 ORIG_RAX: 000000000000001e [ 2651.732373] RAX: ffffffffffffffda RBX: 00007fa4850a2f60 RCX: 00007fa484f8fb19 [ 2651.732379] RDX: 000000000000c000 RSI: 0000000020800000 RDI: 0000000000000000 [ 2651.732386] RBP: 00007fa484fe9f6d R08: 0000000000000000 R09: 0000000000000000 [ 2651.732392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2651.732399] R13: 00007ffce91ab5cf R14: 00007fa482505300 R15: 0000000000022000 [ 2651.732414] irq event stamp: 3613 [ 2651.732427] hardirqs last enabled at (3619): [] vprintk_emit+0x490/0x4e0 [ 2651.732439] hardirqs last disabled at (3624): [] vprintk_emit+0x422/0x4e0 [ 2651.732451] softirqs last enabled at (2514): [] asm_call_irq_on_stack+0x12/0x20 [ 2651.732462] softirqs last disabled at (2413): [] asm_call_irq_on_stack+0x12/0x20 [ 2651.732467] ---[ end trace 4710dbd0bc95f11b ]--- VM DIAGNOSIS: 00:25:59 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff88800fe87b40 RCX=ffffffff8200d9b1 RDX=0000000000000063 RSI=ffff888009281a40 RDI=0000000000000001 RBP=ffffffff8447722e RSP=ffff88800fe87a20 R8 =0000000000000001 R9 =ffff88800feb8109 R10=0000000000000030 R11=0000000000000001 R12=ffffffff8447722d R13=1ffff11001fd0f48 R14=0000000000000063 R15=ffffffff8447722d RIP=ffffffff8140d230 RFL=00000006 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f19235c9900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f19229cc460 CR3=000000000cff4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=95d5d30eae53cd98454a8b17cb7ee2f7 XMM02=6b1e99b806172e3b00000000000aea08 XMM03=ac8bc31478ec851100000000000aef80 XMM04=d8f928da5fab84ed0000000000524ee8 XMM05=d3fdd5f48436fbd700000000000aeab0 XMM06=59226f21b063147a00000000000ae968 XMM07=a1fcdcf819d7e1e500000000000ae728 XMM08=44495f474f4c5359530069253d595449 XMM09=00000000000000000000000000000000 XMM10=00000000000020000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000035 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822e3e01 RDI=ffffffff879f71c0 RBP=ffffffff879f7180 RSP=ffff88800fe07488 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000035 R13=0000000000000035 R14=ffffffff879f7180 R15=dffffc0000000000 RIP=ffffffff822e3e58 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa482505700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f19229d0bf8 CR3=0000000020292000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000