&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:04 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 17) 03:09:04 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 564.809370] FAULT_INJECTION: forcing a failure. 03:09:04 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000e40)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x11, 0x0, 0x1000002) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r1, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x301080, 0x1e8) openat(r0, &(0x7f0000000080)='./file1\x00', 0x460000, 0x0) openat(r3, &(0x7f00000001c0)='./file1\x00', 0x2200, 0x117ebdaa0bc75793) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000200)='./file1\x00', 0x12000400) inotify_add_watch(r4, &(0x7f0000000040)='.\x00', 0x2000082) dup(0xffffffffffffffff) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE={0x7, 0x1, 0x0, 0x0, 0x0, 0x889c7cb2ceb4d95c, 0x0, 0x0, 0x1}, 0x101) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)={0x505200, 0x9b, 0x1}, &(0x7f0000000180)='./file1\x00', 0x18, 0x0, 0x23456}, 0x9) sendfile(r1, r2, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) 03:09:04 executing program 6: sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x40000) r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x58b340, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ppoll(&(0x7f0000000240)=[{0xffffffffffffffff, 0x19520}, {r4}, {0xffffffffffffffff, 0xa109}, {0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x1448d}], 0x5, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000440)={[0xb6]}, 0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000540)={{{@in=@private, @in=@private}}, {{@in=@loopback}, 0x0, @in6=@private1}}, &(0x7f00000001c0)=0xfffffffffffffd2b) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0), &(0x7f0000000180)='./file1\x00', 0x8, 0x3) sendfile(0xffffffffffffffff, r5, &(0x7f0000000140)=0x3fd, 0x1) lseek(r2, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x13e) fstat(r2, 0x0) sendfile(r2, r6, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) [ 564.809370] name failslab, interval 1, probability 0, space 0, times 0 [ 564.811369] CPU: 1 PID: 5988 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 564.812449] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 564.813762] Call Trace: [ 564.814182] dump_stack+0x107/0x167 [ 564.814753] should_fail.cold+0x5/0xa [ 564.815353] ? create_object.isra.0+0x3a/0xa30 [ 564.816070] should_failslab+0x5/0x20 [ 564.816669] kmem_cache_alloc+0x5b/0x310 [ 564.817323] create_object.isra.0+0x3a/0xa30 [ 564.817999] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 564.818798] kmem_cache_alloc_node+0x169/0x330 [ 564.819514] copy_process+0x3305/0x78b0 [ 564.820139] ? SOFTIRQ_verbose+0x10/0x10 [ 564.820774] ? stack_trace_save+0x8c/0xc0 [ 564.821449] ? lock_acquire+0x197/0x470 [ 564.822062] ? io_sq_thread_park+0x79/0xd0 [ 564.822724] ? lock_release+0x680/0x680 [ 564.823339] ? __cleanup_sighand+0xb0/0xb0 [ 564.823999] ? kernel_text_address+0xf2/0x120 [ 564.824705] ? find_held_lock+0x2c/0x110 [ 564.825342] ? io_uring_setup+0x1c23/0x2980 [ 564.826015] ? lock_downgrade+0x6d0/0x6d0 [ 564.826664] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 564.827438] create_io_thread+0xb6/0xf0 [ 564.828059] ? pidfd_prepare+0x80/0x80 [ 564.828676] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 564.829466] io_uring_setup+0x1d79/0x2980 [ 564.830120] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 564.830923] ? wait_for_completion_io+0x270/0x270 [ 564.831699] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 564.832507] ? syscall_enter_from_user_mode+0x1d/0x50 [ 564.833307] do_syscall_64+0x33/0x40 [ 564.833883] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 564.834674] RIP: 0033:0x7fca3e213b19 [ 564.835252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.838094] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 564.839264] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 564.840362] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 564.841477] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 564.842584] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 564.843693] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 564.847142] loop7: detected capacity change from 0 to 135266304 [ 564.859523] loop1: detected capacity change from 0 to 135266304 [ 564.868886] loop5: detected capacity change from 0 to 135266304 03:09:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0xf}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:09:04 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 18) 03:09:04 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd130, 0x0, @perf_config_ext, 0x1028, 0x0, 0x3fe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080), 0x4, 0x800) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f00000000c0)=0x10000, 0x4) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000780)=@IORING_OP_SENDMSG={0x9, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='task\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10080, 0x84) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_setup(0x32d0, &(0x7f00000002c0)={0x0, 0x624f, 0x0, 0x0, 0x3}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, &(0x7f0000000480)) socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000000800)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000001800)={r5, 0x20}) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x80000, 0x303, 0x14}, 0x18) [ 564.987452] FAULT_INJECTION: forcing a failure. [ 564.987452] name failslab, interval 1, probability 0, space 0, times 0 [ 564.988802] CPU: 0 PID: 6003 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 564.989590] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 564.990535] Call Trace: [ 564.990847] dump_stack+0x107/0x167 [ 564.991262] should_fail.cold+0x5/0xa [ 564.991697] ? create_object.isra.0+0x3a/0xa30 [ 564.992211] should_failslab+0x5/0x20 [ 564.992648] kmem_cache_alloc+0x5b/0x310 [ 564.993117] create_object.isra.0+0x3a/0xa30 [ 564.993621] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 564.994201] kmem_cache_alloc_node+0x169/0x330 [ 564.994728] copy_process+0x3305/0x78b0 [ 564.995176] ? SOFTIRQ_verbose+0x10/0x10 [ 564.995647] ? stack_trace_save+0x8c/0xc0 [ 564.996119] ? lock_acquire+0x197/0x470 [ 564.996573] ? io_sq_thread_park+0x79/0xd0 [ 564.997059] ? lock_release+0x680/0x680 [ 564.997520] ? __cleanup_sighand+0xb0/0xb0 [ 564.998000] ? kernel_text_address+0xf2/0x120 [ 564.998517] ? find_held_lock+0x2c/0x110 [ 564.998981] ? io_uring_setup+0x1c23/0x2980 [ 564.999474] ? lock_downgrade+0x6d0/0x6d0 [ 564.999947] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 565.000508] create_io_thread+0xb6/0xf0 [ 565.000964] ? pidfd_prepare+0x80/0x80 [ 565.001454] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 565.002021] io_uring_setup+0x1d79/0x2980 [ 565.002498] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 565.003072] ? wait_for_completion_io+0x270/0x270 [ 565.003635] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 565.004233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 565.004823] do_syscall_64+0x33/0x40 [ 565.005254] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 565.005842] RIP: 0033:0x7fca3e213b19 [ 565.006264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 565.008326] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 565.009191] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 565.010007] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 565.010813] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 565.011618] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 565.012418] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x10}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:09:20 executing program 6: socketpair$nbd(0x1, 0x1, 0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) io_uring_setup(0x10006a32, &(0x7f0000000300)={0x0, 0x0, 0x8, 0x2}) epoll_create1(0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_STATX={0x15, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000240)='./file0\x00', 0x4, 0x2000}, 0x8) ioctl$FIOCLEX(r0, 0x5451) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000001a40)) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000001280)=ANY=[@ANYBLOB="080500988400014637b5e6a174b7b2b3179c044a94da343dd489e684a04f4ca90665864272f2fedc47a9342fef8ad1fc88337e6391545bf80b8ea61a907e1120dcdd2930f3eaba765860d93659a6dc77d049d1d90bf956808d12c853d595ab7ea7e76402b517c198dc7ffbdbb38ab65f84f5242824efb291f523ece2d8e79434f9fe77da5ead57c56fed9a43b14e466358a6b4c3a1a8361e8199db7e4116e6031e72ada1c25a85ea221f56", @ANYRES16, @ANYBLOB="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"], 0x508}, 0x1, 0x0, 0x0, 0x40000}, 0x48804) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x181a80, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80202, 0x100) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 03:09:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:20 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, {}, 0x1, {0x0, r4}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5}, 0x80000001) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = getuid() r8 = socket$unix(0x1, 0x5, 0x0) close_range(r8, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0x2, &(0x7f0000000300)=[{&(0x7f0000000780)="4534600cd3dde663a2dfd2ffd25ee6373ad422c63139ac96fe4e023a5a20be7e584578937142e77e330cdd117545a96d8a2bba8f8d64da8289b99c21a3b98d7f7872718b3015729bc53b961ba5f58e1ec3ab5af76a2d2b04ed3c095863128bd3e5c57ea2b6ff9892554044e78a4495836c6244cbf258a4a8effbd2c438817b04f5d55d2dff5a1dadcb5236976a17ea5f9651a6bbaf687d0fe6cec629f9", 0x9d, 0x9}, {&(0x7f00000005c0)="979afcae0d667a506eccc86a32738b810e4e24109d423db16597324107075a2909b081080507f6715bfc12003c4bdc761199924ae5407c58b208491e0fadfbe7a88ab2bf2b75e855b1923a965ba23a77c840407d54d7c43b8682058c6bf77c382f5cacb69829b938734b2c323255288a2b13bc171a49935b212ac75cb2dcb0bb3d0977d17e8efaeff54b7f239cc1", 0x8e, 0x3}], 0xb05128, &(0x7f0000000680)=ANY=[@ANYBLOB="6e6f696e69745f697461626c652c6e6f696e69746f72733d636f6e74696e75652c6f6c64616c6c6f632c7589155e6e6f74612c646f6e745f6d6561737572652c7569643c", @ANYRESDEC=r7, @ANYBLOB=',permit_directio,fscontext=staff_u,fsname=.&-,smackfshat=\x00,smackfshat=}\\},euid=', @ANYRESDEC=r5, @ANYRES16, @ANYRES16=r8]) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:09:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:20 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 19) 03:09:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', r0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 581.007163] loop5: detected capacity change from 0 to 135266304 [ 581.028186] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 581.052880] loop7: detected capacity change from 0 to 135266304 [ 581.058437] FAULT_INJECTION: forcing a failure. 03:09:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 581.058437] name failslab, interval 1, probability 0, space 0, times 0 [ 581.061393] CPU: 0 PID: 6035 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 581.062992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 581.064911] Call Trace: [ 581.065539] dump_stack+0x107/0x167 [ 581.066375] should_fail.cold+0x5/0xa [ 581.067241] ? create_object.isra.0+0x3a/0xa30 [ 581.068269] should_failslab+0x5/0x20 [ 581.069127] kmem_cache_alloc+0x5b/0x310 [ 581.070064] create_object.isra.0+0x3a/0xa30 [ 581.071056] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 581.072206] kmem_cache_alloc_node+0x169/0x330 [ 581.073247] copy_process+0x3305/0x78b0 [ 581.074153] ? SOFTIRQ_verbose+0x10/0x10 [ 581.075080] ? stack_trace_save+0x8c/0xc0 [ 581.076039] ? lock_acquire+0x197/0x470 [ 581.076934] ? io_sq_thread_park+0x79/0xd0 [ 581.077916] ? lock_release+0x680/0x680 [ 581.078825] ? __cleanup_sighand+0xb0/0xb0 [ 581.079783] ? kernel_text_address+0xf2/0x120 [ 581.080804] ? find_held_lock+0x2c/0x110 [ 581.081746] ? io_uring_setup+0x1c23/0x2980 [ 581.082732] ? lock_downgrade+0x6d0/0x6d0 [ 581.083751] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 581.084925] create_io_thread+0xb6/0xf0 [ 581.085842] ? pidfd_prepare+0x80/0x80 [ 581.086716] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 581.087843] io_uring_setup+0x1d79/0x2980 [ 581.088788] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 581.089941] ? wait_for_completion_io+0x270/0x270 [ 581.091051] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 581.092240] ? syscall_enter_from_user_mode+0x1d/0x50 [ 581.093409] do_syscall_64+0x33/0x40 [ 581.094300] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 581.095465] RIP: 0033:0x7fca3e213b19 [ 581.096309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 581.100475] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 581.102234] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 581.103847] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 581.105474] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 581.107083] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 581.108693] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x14}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:09:21 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 20) [ 581.153081] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 581.154974] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 581.156593] loop1: detected capacity change from 0 to 135266304 [ 581.157054] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 581.183760] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 581.211284] FAULT_INJECTION: forcing a failure. [ 581.211284] name failslab, interval 1, probability 0, space 0, times 0 [ 581.212604] CPU: 1 PID: 6050 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 581.213396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 581.214352] Call Trace: [ 581.214653] dump_stack+0x107/0x167 [ 581.215079] should_fail.cold+0x5/0xa [ 581.215508] ? create_object.isra.0+0x3a/0xa30 [ 581.216031] should_failslab+0x5/0x20 [ 581.216463] kmem_cache_alloc+0x5b/0x310 [ 581.216934] create_object.isra.0+0x3a/0xa30 [ 581.217437] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 581.218017] kmem_cache_alloc+0x159/0x310 [ 581.218476] __delayacct_tsk_init+0x1b/0x80 [ 581.218966] copy_process+0x3399/0x78b0 [ 581.219414] ? SOFTIRQ_verbose+0x10/0x10 [ 581.219860] ? stack_trace_save+0x8c/0xc0 [ 581.220334] ? lock_acquire+0x197/0x470 [ 581.220771] ? io_sq_thread_park+0x79/0xd0 [ 581.221261] ? __cleanup_sighand+0xb0/0xb0 [ 581.221733] ? kernel_text_address+0xf2/0x120 [ 581.222252] ? find_held_lock+0x2c/0x110 [ 581.222701] ? io_uring_setup+0x1c23/0x2980 [ 581.223194] ? lock_downgrade+0x6d0/0x6d0 [ 581.223647] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 581.224206] create_io_thread+0xb6/0xf0 [ 581.224635] ? pidfd_prepare+0x80/0x80 [ 581.225089] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 581.225642] io_uring_setup+0x1d79/0x2980 [ 581.226120] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 581.226672] ? wait_for_completion_io+0x270/0x270 [ 581.227237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 581.227803] ? syscall_enter_from_user_mode+0x1d/0x50 [ 581.228391] do_syscall_64+0x33/0x40 [ 581.228816] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 581.229400] RIP: 0033:0x7fca3e213b19 [ 581.229834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 581.231924] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 581.232788] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 581.233613] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 581.234434] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 581.235248] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 581.236066] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x02U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:09:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', r0) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:21 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x14, 0x4, 0x1, 0x401}, 0x14}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 03:09:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', r0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:21 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x2000003) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x5, 0x6, 0x3, 0x7, 0x2, 0x3, 0x7fffffff, 0x14c, 0x40, 0x16b, 0x9, 0x0, 0x38, 0x2, 0x3, 0xb8c4, 0x40}, [{0x4, 0x7, 0x9, 0x6, 0x3, 0x400, 0x47a, 0x7}], "", ['\x00', '\x00', '\x00']}, 0x378) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0xffffffc1}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000540)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) write$bt_hci(r3, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0xfdef) [ 581.377839] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6065 comm=syz-executor.6 [ 581.398824] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6065 comm=syz-executor.6 03:09:21 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 21) [ 581.425491] FAULT_INJECTION: forcing a failure. [ 581.425491] name failslab, interval 1, probability 0, space 0, times 0 [ 581.428007] CPU: 0 PID: 6071 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 581.429473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 581.431236] Call Trace: [ 581.431802] dump_stack+0x107/0x167 [ 581.432602] should_fail.cold+0x5/0xa [ 581.433414] ? alloc_pid+0xd7/0xd30 [ 581.434202] should_failslab+0x5/0x20 [ 581.435010] kmem_cache_alloc+0x5b/0x310 [ 581.435876] alloc_pid+0xd7/0xd30 [ 581.436618] ? copy_namespaces+0x1ca/0x4f0 [ 581.437532] copy_process+0x3b8b/0x78b0 [ 581.438372] ? SOFTIRQ_verbose+0x10/0x10 [ 581.439241] ? stack_trace_save+0x8c/0xc0 [ 581.440139] ? __cleanup_sighand+0xb0/0xb0 [ 581.441050] ? kernel_text_address+0xf2/0x120 [ 581.442014] ? find_held_lock+0x2c/0x110 [ 581.442885] ? io_uring_setup+0x1c23/0x2980 [ 581.443804] ? lock_downgrade+0x6d0/0x6d0 [ 581.444687] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 581.445742] create_io_thread+0xb6/0xf0 [ 581.446593] ? pidfd_prepare+0x80/0x80 [ 581.447427] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 581.448477] io_uring_setup+0x1d79/0x2980 [ 581.449369] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 581.450444] ? wait_for_completion_io+0x270/0x270 [ 581.451488] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 581.452603] ? syscall_enter_from_user_mode+0x1d/0x50 [ 581.453716] do_syscall_64+0x33/0x40 [ 581.454508] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 581.455603] RIP: 0033:0x7fca3e213b19 [ 581.456393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 581.460310] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 581.461935] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 581.463453] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 581.464967] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 581.466496] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 581.468015] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:37 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 22) 03:09:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', r0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', r0) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:37 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$iso9660(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000001a40), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xf5}}, './file0\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x282020, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000001c0)=@v2={0x2, @aes256, 0x1, '\x00', @b}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001300"/20], 0x14}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x7, 0x100000000}) ioctl$SG_GET_NUM_WAITING(r5, 0x227d, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1f, 0x5, 0x5, 0x3, 0x0, 0xfff, 0x2280, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_config_ext={0x7, 0x1}, 0x20, 0x10000, 0xf5a, 0x9, 0x0, 0xf1a, 0x6, 0x0, 0xc18, 0x0, 0x101}, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xa) openat(r1, &(0x7f0000000000)='./file0\x00', 0x4a00, 0x4c) 03:09:37 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = getpid() r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, r3, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xf6, 0x80, 0x40, 0x7f, 0x0, 0xbe5, 0x80, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x6, 0x9}, 0xc0, 0x3, 0x10001, 0x2, 0x9, 0x6, 0x0, 0x0, 0x5648, 0x0, 0x4}, r1, 0x7, 0xffffffffffffffff, 0x8) getpgrp(r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ff8000/0x4000)=nil) 03:09:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x03U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:09:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 597.367427] FAULT_INJECTION: forcing a failure. [ 597.367427] name failslab, interval 1, probability 0, space 0, times 0 [ 597.368923] CPU: 0 PID: 6082 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 597.369807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 597.370880] Call Trace: [ 597.371223] dump_stack+0x107/0x167 [ 597.371696] should_fail.cold+0x5/0xa [ 597.372197] ? alloc_pid+0xd7/0xd30 [ 597.372672] should_failslab+0x5/0x20 [ 597.373158] kmem_cache_alloc+0x5b/0x310 [ 597.373696] alloc_pid+0xd7/0xd30 [ 597.374147] ? copy_namespaces+0x1ca/0x4f0 [ 597.374688] copy_process+0x3b8b/0x78b0 [ 597.375201] ? SOFTIRQ_verbose+0x10/0x10 [ 597.375730] ? stack_trace_save+0x8c/0xc0 [ 597.376284] ? __cleanup_sighand+0xb0/0xb0 [ 597.376824] ? kernel_text_address+0xf2/0x120 [ 597.377403] ? find_held_lock+0x2c/0x110 [ 597.377932] ? io_uring_setup+0x1c23/0x2980 [ 597.378489] ? lock_downgrade+0x6d0/0x6d0 [ 597.379023] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 597.379648] create_io_thread+0xb6/0xf0 [ 597.380157] ? pidfd_prepare+0x80/0x80 [ 597.380663] ? io_uring_cancel_generic+0x2b0/0x2b0 [ 597.381304] io_uring_setup+0x1d79/0x2980 [ 597.381858] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 597.382511] ? wait_for_completion_io+0x270/0x270 [ 597.383142] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 597.383821] ? syscall_enter_from_user_mode+0x1d/0x50 [ 597.384487] do_syscall_64+0x33/0x40 [ 597.384961] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 597.385625] RIP: 0033:0x7fca3e213b19 [ 597.386098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.388452] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 597.389414] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 597.390328] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 597.391236] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 597.392144] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 597.393046] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:37 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 23) [ 597.431008] FAULT_INJECTION: forcing a failure. [ 597.431008] name failslab, interval 1, probability 0, space 0, times 0 [ 597.432540] CPU: 0 PID: 6096 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 597.433405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 597.434452] Call Trace: [ 597.434787] dump_stack+0x107/0x167 [ 597.435247] should_fail.cold+0x5/0xa [ 597.435728] ? io_uring_alloc_task_context+0x99/0x6a0 [ 597.436378] should_failslab+0x5/0x20 [ 597.436871] kmem_cache_alloc_trace+0x55/0x320 [ 597.436952] loop7: detected capacity change from 0 to 135266304 [ 597.437443] io_uring_alloc_task_context+0x99/0x6a0 [ 597.437456] ? io_import_iovec+0x1120/0x1120 [ 597.437477] io_uring_setup+0x1dd1/0x2980 [ 597.437493] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 597.437504] ? wait_for_completion_io+0x270/0x270 [ 597.437530] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 597.437549] ? syscall_enter_from_user_mode+0x1d/0x50 [ 597.443065] do_syscall_64+0x33/0x40 [ 597.443537] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 597.444182] RIP: 0033:0x7fca3e213b19 [ 597.444650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.446968] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 597.447945] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 597.448842] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 597.449756] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 597.450657] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 597.451548] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 597.462650] loop1: detected capacity change from 0 to 135266304 03:09:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', r0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', r0) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:37 executing program 6: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000140)={r0, 0x7103bde9, 0x3, 0xcd}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x5, 0xfff, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) openat(0xffffffffffffffff, 0x0, 0x20200, 0x0) syz_io_uring_setup(0x76d8, &(0x7f0000000200)={0x0, 0x0, 0x20, 0x0, 0x3af, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00007a7000/0x1000)=nil, 0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x110) 03:09:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) socket$inet(0x2, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x20c, 0x1d, 0x20, 0x70bd29, 0x25dfdbfe, {0xb}, [@generic="2b1d7ad73a2e4adfe1daf88c6aed97756e1fa5f0819067ab80290abe886d01651f6f3c05f56ef2a0cc1a0f2780bc3eaef76c7f80bbc647419d6ffe88a04d412be84dd05218e28e7927bac8cacbf2124028fbbff7f84e1b258b5b8f9b8c47aac11f65d5759240c8af819d11b1d229c40540c2430697222adea522fa58a495ef9160c105f91169343879f23aec53f808c34f64feed9e62ea8a3cf1849e122561977c8b3c98c07aa88627bbc61539e9002602f845f806f7de809fbe9f5ee6bbd2ca7eb398d3e85307f308fca2447e0cd256", @typed={0xc, 0x95, 0x0, 0x0, @u64=0x2}, @generic="5eb3135e62883c5adb4691b8bb78e0ae9b2e8e64d7c88b21f797549854b2eec7a79cbba31af9d2766d14648bb23a3ecdb80485a1597b52fbf3a77f88801067098f03bc2654048834999996", @generic="d5dfa678dfbed64351c513bb5a4fb14cb9839b8cfc8ccc8a41421dc21ed55cce821f7b3c07f455d063434d68ed3500bcb7c9b07b6bb5221cbe6cc8a741c03c92c5701e2f9fc598a8aa57405aba4b75480483e279b4ca1d7ca44fb449280b0aa7815ae21f0fcd38f9e20c01c54c8a5884d37721626b7c7cc9043043f61ca6e2ad27b51f4a882d060f9e2a3f92603b73e5cc744a5d0b09914f65ad756c72852d64f47beca80a2cf0e2ee03ffa000c184603ae940fc2fb78388c2cf34c7d2d1e44bc3295b135b4b04b4dfd11a878e78ad"]}, 0x20c}, 0x1, 0x0, 0x0, 0xc5cb5f93016ba86d}, 0x4) sendmsg$OSF_MSG_ADD(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x12b4, 0x0, 0x5, 0x201, 0x0, 0x0, {0xa, 0x0, 0x4}, [{{0x254, 0x1, {{0x1, 0x1}, 0x8, 0x3, 0x1, 0x0, 0x7, 'syz0\x00', "42d55d310ef335ef007948595aa987e6d52fc8efad3a0062a42061a84a40e317", "7df436a8a6dfabcecb668d224092b3b7d1d7fc996943e1c7853fa8c0f6678d7a", [{0x0, 0x8f7, {0x1, 0x398}}, {0xe, 0x5, {0x1}}, {0x9, 0x3ff, {0x2, 0xffff}}, {0x101, 0xc000, {0x2}}, {0x1, 0x1ff, {0x1, 0x9}}, {0x8f, 0x100, {0x0, 0xfffffffe}}, {0xedb0, 0x6, {0x0, 0x7fffffff}}, {0x1, 0x0, {0x0, 0x37f}}, {0x0, 0xf8, {0x0, 0x5}}, {0x3, 0x1, {0x2, 0xfffffff9}}, {0x0, 0xc4, {0x2, 0x8}}, {0x895, 0x1f49, {0x0, 0x9}}, {0x7fff, 0x40, {0x0, 0x2}}, {0x3, 0x64f4, {0x3, 0x7}}, {0x3, 0x9, {0x1, 0x7}}, {0x245, 0x20, {0x0, 0x400}}, {0x3ff, 0x9, {0x3, 0xe0c}}, {0x0, 0x8, {0x0, 0x80000000}}, {0x1, 0xfff, {0x2, 0xb}}, {0x9, 0x4, {0x0, 0x2}}, {0x6, 0x3ff, {0x1, 0xc00}}, {0x0, 0x3, {0x3, 0xf64}}, {0x7ff, 0x101, {0x1, 0x8}}, {0x99, 0xff, {0x2, 0x4}}, {0x0, 0xfffa, {0x3, 0xe8cb}}, {0x7, 0x4, {0x1, 0x5}}, {0x7fff, 0x3, {0x3, 0x9}}, {0x8, 0x400, {0x0, 0x5}}, {0x8000, 0x9, {0x0, 0xfffffff7}}, {0x7, 0x4, {0x0, 0x8}}, {0x92cb, 0xbf, {0x1, 0x2f64c496}}, {0x3, 0x7, {0x2, 0x20}}, {0xf68d, 0x3ac7, {0x3, 0x6f85}}, {0x8000, 0x5, {0x1, 0x79}}, {0x2, 0x1ff, {0x0, 0x200}}, {0x0, 0x3, {0x3, 0x10001}}, {0x1ff, 0x8, {0x3, 0xffff8000}}, {0x75b, 0x4000, {0x2, 0x5}}, {0xb5f, 0x6, {0x2, 0x9}}, {0xfffa, 0x7, {0x3, 0x2}}]}}}, {{0x254, 0x1, {{0x1}, 0x9, 0x2, 0xffff, 0x7f, 0x8, 'syz1\x00', "110c969bdb239cbf6e9c610d196a955bc43a241adf15b39a657ae8ad9cd863b7", "d6f413d71635e99a374703777002d97af18034144b37cbbe7f70400d4b8d3d53", [{0x1, 0x0, {0x2, 0x7}}, {0x0, 0x7, {0x2}}, {0x80, 0x5, {0x1, 0x5}}, {0x1, 0x3, {0x3, 0xc3}}, {0x0, 0x6d, {0x2, 0x8}}, {0x6, 0x3, {0x2, 0x80000001}}, {0x2, 0x8, {0x1, 0x7}}, {0x2, 0x6, {0x0, 0x3}}, {0x9, 0x5, {0x2}}, {0x8, 0x0, {0x0, 0x8}}, {0x1, 0x8, {0x0, 0x8}}, {0x0, 0x7fd5, {0x2, 0x81}}, {0x20, 0x4, {0x0, 0x5}}, {0x6, 0x7, {0x1, 0x800}}, {0x5, 0x401, {0x1, 0x80000000}}, {0x6cf, 0x80, {0x3}}, {0x1000, 0x0, {0x2, 0x7000}}, {0x9, 0xad3, {0x2, 0x7}}, {0x9a, 0x4600, {0x2, 0x271f}}, {0x101, 0x8001, {0x1, 0x7}}, {0x5, 0x20, {0x0, 0x1f}}, {0x5, 0x3, {0x2, 0x9}}, {0x9, 0x4, {0x0, 0x7fffffff}}, {0x7, 0x5000, {0x1, 0x8}}, {0xf8, 0x2f, {0x1, 0x6b}}, {0x7, 0x5, {0x0, 0x9}}, {0x1, 0x3, {0x3, 0x87c5}}, {0x42d, 0x8001, {0x1, 0x9}}, {0xf001, 0x4, {0x1, 0x8}}, {0x3ff, 0x7, {0x3}}, {0x743b, 0x9, {0x1, 0x8000}}, {0x524, 0xfff8, {0x2, 0x6}}, {0x1000, 0x2e54, {0x0, 0x2}}, {0x9, 0x5, {0x0, 0x29e5}}, {0xff, 0x61d3, {0x2, 0x76311090}}, {0x4, 0x200, {0x1, 0xd3}}, {0x55, 0x80, {0x0, 0xfffffffc}}, {0x4, 0x3, {0x3, 0x7cdc6800}}, {0x2, 0x7, {0x2, 0x714}}, {0x7, 0x7, {0x1, 0x5}}]}}}, {{0x254, 0x1, {{0x1, 0x400}, 0xb0, 0x0, 0x1, 0x8, 0xb, 'syz1\x00', "beec430a1af4a6f22f8da03d4d1680a7d82eacba50ad4ccbe6bff747fefc9238", "5297daf915e1fbe6b1ea0fc4515e3fc16532dc00bcc3dfcb194caf057da15ff0", [{0x3, 0x2, {0x0, 0x40}}, {0x1000, 0x5, {0x1, 0x6}}, {0x9, 0x4, {0x1, 0x2}}, {0x643, 0x101, {0x3, 0x7}}, {0x1, 0x800, {0x0, 0x80000001}}, {0x260, 0x8, {0x2, 0x3}}, {0x5, 0x6, {0x2, 0x2}}, {0x8001, 0x4, {0x3, 0x4}}, {0xdaf8, 0x8, {0x3, 0x3}}, {0xfffd, 0x6, {0x3, 0x6bdf}}, {0xffc0, 0x4f5b, {0x3, 0x865}}, {0x7f, 0x1800, {0x2, 0x2}}, {0x6, 0xd6, {0x2}}, {0x8, 0x8, {0x2, 0x80000000}}, {0xd01, 0x7, {0x2, 0x8001}}, {0x6, 0x9, {0x3, 0x1ff}}, {0xeca, 0x7, {0x1, 0x8}}, {0x9f, 0x1, {0x3, 0xffffff81}}, {0x910a, 0x4, {0x1, 0x1c3}}, {0x4729, 0x1, {0x2, 0xdb}}, {0x2, 0x9c, {0x0, 0xbfc}}, {0x0, 0x0, {0x2, 0x9}}, {0xe0a, 0x4, {0x0, 0x80}}, {0x6, 0x0, {0x2, 0x10000}}, {0x800, 0x3ff, {0x3, 0x100}}, {0x3, 0x8, {0x0, 0x42400000}}, {0xfffe, 0x101, {0x2, 0x3ff}}, {0x3, 0x7ff, {0x1, 0x1}}, {0x4, 0x6, {0x3, 0x1}}, {0x101, 0x8, {0x2, 0x5}}, {0xff01, 0x7, {0x3, 0x5}}, {0x7f, 0x4, {0x1, 0x5}}, {0xdb, 0xd20, {0x1, 0x2}}, {0x16e5, 0xea6d, {0x0, 0x7a}}, {0x0, 0xfffe, {0x0, 0x1}}, {0x7fff, 0x401, {0x0, 0x8001}}, {0x401, 0x7fff, {0x3, 0xfffff5a7}}, {0x3f, 0x0, {0x1, 0x3}}, {0x9, 0xff7f, {0x3, 0x8}}, {0x1000, 0x0, {0x1, 0x20}}]}}}, {{0x254, 0x1, {{0x3, 0x8}, 0x8, 0x3f, 0x5cd6, 0xc000, 0x11, 'syz1\x00', "7e70de67f976612b28a4dd27de8b9e99369f629ee063bef95e112de77578c165", "4b91a4919fa821201af81288529391fc4a2d1ba33ce2f009a48c277186053e61", [{0x8, 0xffff, {0x3, 0x1}}, {0xa9ac, 0x9, {0x1, 0x6}}, {0x0, 0x0, {0x3, 0x59b}}, {0x40, 0x7, {0x3, 0x8001}}, {0x8000, 0x0, {0x0, 0x6}}, {0x5, 0xfe01, {0x3, 0xffff0000}}, {0x81, 0x1ff, {0x2, 0x7fffffff}}, {0x5, 0x40, {0xa03f3c38fbb4f69b, 0x4}}, {0x9, 0x6}, {0xb5e, 0x100, {0x0, 0x1}}, {0xa11, 0x3, {0x2, 0x2}}, {0x40, 0xfffb, {0x0, 0x47c}}, {0x6, 0x8000, {0x0, 0x80}}, {0x9, 0xfffa, {0x3, 0x4}}, {0x3ff, 0x5, {0x1, 0x1}}, {0x1196, 0x1, {0x0, 0xbd}}, {0x5, 0x8, {0x2, 0x9}}, {0x401, 0x8, {0x2, 0x9}}, {0x1, 0xfb3, {0x3, 0xc}}, {0xe13, 0x300, {0x1, 0x5}}, {0x5, 0xffff, {0x3, 0x1}}, {0x7f, 0x101, {0x1, 0x9}}, {0x2, 0x9, {0x2, 0xfff}}, {0x1, 0x200, {0x2, 0x7}}, {0x1fc, 0x0, {0x1, 0x6}}, {0x1, 0xd1, {0x0, 0xc2}}, {0x5, 0x20, {0x1, 0x1}}, {0x566, 0xc23, {0x1, 0x3f}}, {0x800, 0x1eb7, {0x1, 0x9}}, {0x200, 0x4, {0x3, 0xffff}}, {0x6, 0x7, {0x1}}, {0x5, 0x3, {0x3, 0x6}}, {0x7, 0x8, {0x0, 0x10000}}, {0x6, 0x3, {0x3, 0x3}}, {0x0, 0x5, {0x2, 0x4}}, {0x101, 0x9, {0x1, 0x4}}, {0x9, 0x400, {0x2, 0x2ee}}, {0x0, 0x6, {0x2, 0xc1c}}, {0x4, 0x400, {0x3, 0xfff}}, {0x8, 0x7fff, {0x0, 0x1f}}]}}}, {{0x254, 0x1, {{0x2, 0x2}, 0x6, 0x20, 0x2, 0x0, 0x1e, 'syz0\x00', "03dcf5141643ee59a4c4ed641a6e9be242cd40d4dc7588bf567425117f743201", "d18ce53e3c73b9b3a4159316a6c52c5738278123376db6bd0584400edfe28e85", [{0xf22, 0x0, {0x2, 0xffffffff}}, {0x80, 0x1ff, {0x1, 0x7}}, {0xff, 0x7, {0x3, 0x1ff}}, {0x4e26, 0x1, {0x2}}, {0x5, 0x5, {0x2, 0x7fffffff}}, {0x4, 0x605, {0x0, 0x81}}, {0x9, 0x3a, {0x1, 0x1}}, {0x800, 0x8e, {0x1, 0x3}}, {0xb4, 0x2, {0x1, 0x7}}, {0x2, 0x9, {0x0, 0x2}}, {0x8001, 0x8, {0x3, 0x2}}, {0x2b, 0x7fff, {0x0, 0x80000001}}, {0x7e00, 0x200, {0x2, 0x8}}, {0x6, 0x1, {0x3, 0x7f}}, {0x5, 0x400, {0x3, 0xe8}}, {0x3f, 0x3, {0x3, 0xfff}}, {0xf4c, 0x7, {0x1, 0x1f}}, {0x4, 0x7fff, {0x3, 0x1588000}}, {0x1, 0x7, {0x3, 0x10000}}, {0xc1b4, 0x2, {0x2, 0x9}}, {0x6, 0x100, {0x0, 0x80000001}}, {0xfc01, 0xa821, {0x3, 0x6}}, {0x7, 0x3, {0x1, 0x400}}, {0x20, 0x7, {0x1, 0xffff}}, {0x4, 0x8, {0x2, 0x5}}, {0x8, 0xfff8, {0x0, 0x3ff}}, {0xff, 0x81, {0x1, 0x3}}, {0x59e8, 0x101, {0x0, 0x65ee}}, {0x5, 0x9, {0x3, 0x8}}, {0x5, 0x400, {0x0, 0x51b8000}}, {0x9, 0xa469, {0x3, 0x5}}, {0x9, 0xffff, {0x1, 0x6}}, {0xec, 0x8, {0x2, 0x3}}, {0x9, 0x48b6, {0x0, 0x5}}, {0xffff, 0xff, {0x2, 0xaad1}}, {0x5, 0x400, {0x2, 0xf02}}, {0xff0, 0x8, {0x1, 0x80000000}}, {0xcf5, 0x1140, {0x3, 0x5}}, {0x3, 0x2, {0x3, 0x4}}, {0x731f, 0x2, {0x898f7e256549dcc3, 0x4}}]}}}, {{0x254, 0x1, {{0x1, 0xba}, 0x2, 0x1, 0x7, 0xa2, 0x22, 'syz0\x00', "484b4488bb3e34ddc6c0a8d6394e3025862065ba97afdb3ad143cb63544a0e98", "9341b27e22d22188625f561d44089563516767b32269a22f1eba2846b3d300d7", [{0x0, 0xffc0, {0x2, 0x8}}, {0x7, 0x7fcb, {0x0, 0x9}}, {0x5, 0x0, {0x1, 0x1f}}, {0x520, 0x3, {0x0, 0x3eda}}, {0x31b4, 0x200, {0x3, 0xffffffff}}, {0x4, 0x8, {0x1, 0x8000}}, {0x2, 0x9564, {0x0, 0x2}}, {0x7d, 0x4, {0x1, 0x6}}, {0x8, 0x9, {0x1, 0x3f}}, {0xa0, 0xc1, {0x2, 0x100}}, {0x7, 0x81, {0x2, 0x81}}, {0x8, 0x8, {0x2, 0x1}}, {0x9, 0x1, {0x2, 0xcdc2}}, {0x85d5, 0x0, {0x1, 0x1}}, {0x8, 0x8001, {0x0, 0xaf63}}, {0x57c, 0x401, {0x1, 0x8}}, {0x3d, 0x4, {0x2, 0x2}}, {0x2, 0x3, {0x3, 0x7ff}}, {0x3, 0x101, {0x1, 0x2500ed0e}}, {0x2, 0x8, {0x2, 0x4}}, {0x0, 0x4, {0x2, 0x2}}, {0xf661, 0x6, {0x1, 0x1}}, {0x7, 0x100, {0x2, 0x3f}}, {0x69, 0x1, {0x2}}, {0x4, 0xfff7, {0x3}}, {0x9, 0xfff9, {0x3, 0x9}}, {0x3, 0x7, {0x3, 0x8}}, {0x7, 0x3, {0x0, 0x101}}, {0x7, 0x6, {0x0, 0x9}}, {0x5, 0x7, {0x1, 0x3}}, {0x5, 0x91c, {0x3, 0x9}}, {0x8000, 0x81, {0x0, 0x5}}, {0x8, 0x6, {0x3, 0x6}}, {0x0, 0x7, {0x3, 0x1}}, {0x1, 0x6, {0x1, 0xc71}}, {0x200, 0x0, {0x3, 0x6}}, {0x5, 0x6, {0x3}}, {0x0, 0x1, {0x3}}, {0x0, 0x2, {0x3}}, {0x9, 0x9, {0x0, 0x1f}}]}}}, {{0x254, 0x1, {{0x3, 0x6}, 0x20, 0x5, 0x0, 0x7, 0x22, 'syz1\x00', "654ee88c23ce8661541cf9ee9060db1d003d15d4b437148b006b90d990992255", "73651a9c75c591db1d86ddfbf00bd853a373cd9ed946d2b41e214c9a4f8d2e61", [{0x3, 0x63f, {0x0, 0x33}}, {0xf801, 0x8, {0x1, 0x2b3}}, {0x5, 0x6, {0x0, 0xef}}, {0xfffe, 0x5, {0x1, 0x22b1eeb4}}, {0x5511, 0x8000, {0x3, 0x8}}, {0x7, 0x6, {0x3, 0x10001}}, {0x1ff, 0x1000, {0x1, 0x82}}, {0x0, 0x4, {0x2, 0x101}}, {0x976, 0x5, {0x0, 0x4}}, {0x3, 0x6, {0x2, 0x9}}, {0x2, 0x1, {0x1, 0x2}}, {0x7fff, 0x2, {0x0, 0x7}}, {0x4, 0xfffa, {0x1, 0x6}}, {0x4, 0x9, {0x3, 0x9}}, {0xdbfd, 0x200, {0x0, 0x7fff}}, {0x9, 0x7, {0x1, 0xfff}}, {0x2020, 0x0, {0x3, 0xffff}}, {0x7, 0x6b14, {0x2, 0x400}}, {0x1, 0x718, {0xfac5cfccaee1564c, 0x6}}, {0xc11, 0xfff8, {0x3, 0x80000000}}, {0x101, 0x8, {0x0, 0x5}}, {0x1, 0x8, {0x2, 0x4}}, {0xb6, 0x20, {0x3, 0xffff}}, {0x7ff, 0x9, {0x0, 0xfdc0}}, {0x5, 0x9, {0x2, 0x1a}}, {0x8000, 0x39e5, {0x2, 0x3de2}}, {0x2, 0x60, {0x2, 0x100}}, {0x40, 0x401, {0x3}}, {0x1, 0x0, {0x1, 0x8000}}, {0x9, 0x8, {0x1, 0x3}}, {0x1, 0x1, {0x3, 0x7ff}}, {0x8, 0x1, {0x1, 0x2}}, {0x9, 0x96dc, {0x1, 0x1}}, {0xffff, 0xf78e, {0x2, 0xffffffff}}, {0x81, 0x1, {0x1}}, {0x7, 0x7ff, {0x1, 0x6}}, {0x4, 0x5c35, {0x2, 0x7}}, {0xfff, 0x1862, {0x0, 0x9}}, {0xfffb, 0x400, {0x2, 0x6}}, {0x6, 0x0, {0x3, 0x3}}]}}}, {{0x254, 0x1, {{0x1, 0x2}, 0x80, 0x9, 0x8, 0x1, 0x11, 'syz0\x00', "e5d8d50a8acf257be05aa8032465861646f9293cf68a7a5669f4cdfdf287c99f", "e584095f39b4dc96c657e5483d33bca699761150393d54dbcf8277b82dd68c9c", [{0x3, 0xcc30, {0x2, 0x1}}, {0x3ff, 0x7, {0x2, 0x10000}}, {0xffff, 0x9, {0x2, 0xfffff000}}, {0x8, 0x2, {0x0, 0x4963}}, {0x7, 0x9, {0x3, 0x8}}, {0x4, 0x9, {0x3, 0x10000}}, {0x1ff, 0x9, {0x1, 0x4}}, {0x7, 0x8001, {0x1, 0x200}}, {0x0, 0x0, {0x1, 0x8}}, {0x81, 0x7, {0x3, 0x6}}, {0xfffd, 0x1f, {0x2, 0x2}}, {0x4, 0x5, {0x0, 0xb2}}, {0x1f, 0x6, {0x0, 0x9}}, {0x0, 0x4, {0x0, 0xe1}}, {0x1f, 0x8070, {0x2, 0x80000000}}, {0x7d, 0x40, {0x0, 0x68}}, {0x6984, 0x3ff, {0x1, 0x2}}, {0x0, 0xffff}, {0x2, 0x8, {0x3, 0x6}}, {0x0, 0xcb, {0x0, 0x1}}, {0x4, 0x4, {0x0, 0x800}}, {0x100, 0x8, {0x0, 0x8}}, {0x20, 0x6, {0x2, 0x10000}}, {0x2, 0x0, {0x0, 0xc8}}, {0x9, 0x8, {0x2, 0x3}}, {0x9, 0x8001, {0x0, 0x1}}, {0x8, 0x95d6, {0x1, 0xffffffff}}, {0x5, 0x8, {0x0, 0x7}}, {0x20, 0x101, {0x1, 0x7}}, {0x4dce, 0x0, {0x3, 0x7fffffff}}, {0x3, 0x5, {0x1, 0x401}}, {0x1e, 0x7, {0x1, 0xa1a}}, {0x0, 0x6, {0x2, 0x6}}, {0x9, 0x5, {0x1, 0x86}}, {0x20, 0xffff, {0x2, 0x100}}, {0x5d9, 0x0, {0x0, 0x4}}, {0x401, 0x8, {0x2, 0x6}}, {0x8001, 0xfffd, {0x3, 0xfff}}, {0x6, 0x400, {0x3}}, {0x2f, 0x1ff, {0x0, 0x2}}]}}}]}, 0x12b4}, 0x1, 0x0, 0x0, 0x4005}, 0x4000000) 03:09:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x04U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 597.622712] loop5: detected capacity change from 0 to 135266304 [ 597.631868] blktrace: Concurrent blktraces are not allowed on loop12 [ 597.666429] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=6129 comm=syz-executor.4 03:09:37 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 24) [ 597.714549] FAULT_INJECTION: forcing a failure. [ 597.714549] name failslab, interval 1, probability 0, space 0, times 0 [ 597.715956] CPU: 0 PID: 6136 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 597.716742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 597.717695] Call Trace: [ 597.718003] dump_stack+0x107/0x167 [ 597.718423] should_fail.cold+0x5/0xa [ 597.718857] ? create_object.isra.0+0x3a/0xa30 [ 597.719376] should_failslab+0x5/0x20 [ 597.719808] kmem_cache_alloc+0x5b/0x310 [ 597.720275] create_object.isra.0+0x3a/0xa30 [ 597.720774] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 597.721364] kmem_cache_alloc_trace+0x151/0x320 [ 597.721908] io_uring_alloc_task_context+0x99/0x6a0 [ 597.722475] ? io_import_iovec+0x1120/0x1120 [ 597.722984] io_uring_setup+0x1dd1/0x2980 [ 597.723464] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 597.724043] ? wait_for_completion_io+0x270/0x270 [ 597.724607] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 597.725207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 597.725802] do_syscall_64+0x33/0x40 [ 597.726227] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 597.726814] RIP: 0033:0x7fca3e213b19 [ 597.727245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.729336] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 597.730227] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 597.731046] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 597.731858] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 597.732671] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 597.733494] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x05U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:09:37 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000a80)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r5) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x28, r6, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xfffffffffffffe28, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x81}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x4}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x2}]}, 0xfffffffffffffdea}}, 0x8005) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x24}}, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="1c0327bd7000fedbdf25050000000c000600020000000000000008000300", @ANYRES32=r3, @ANYBLOB="0c0006000300f7ff0300352c"], 0x34}, 0x1, 0x0, 0x0, 0x20008050}, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000440), r9) sendmsg$NL802154_CMD_SET_TX_POWER(r7, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x28, r8, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r7, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r6, 0x220, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 03:09:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', r0) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x127800, 0x1e, &(0x7f0000000200)=[{&(0x7f0000010000)="00000000000000000000000000000000000000000000000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000055aa", 0x60, 0x1a0}, {&(0x7f0000010100)="4244db8cf0c2db8cf0c2818000060003003501b800000800000020000004000000180000054344524f4d000000000000000000000000000000000000000000000000000000000000006b000060000000c00000010000000700000001000000000000000000000000000000000000000000000000000000000000000000000000000000006000018f000c00000000000000000000c000019b0018000000000000", 0xa0, 0x400}, {&(0x7f0000010200)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0x600}, {&(0x7f0000010400)="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"/1408, 0x580, 0x8000}, {&(0x7f0000010a00)="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"/1408, 0x580, 0x10001}, {&(0x7f0000011000)="ff43443030310100"/32, 0x20, 0x9000}, {&(0x7f0000011100)="01001c0000000100000005001d000000010046494c4530000000000000000000", 0x20, 0xa000}, {&(0x7f0000011200)="01000000001c0001000005000000001d000146494c4530000000000000000000", 0x20, 0xb000}, {&(0x7f0000011300)="01001e000000010000000a001f000000010000660069006c0065003000000000", 0x20, 0xc000}, {&(0x7f0000011400)="01000000001e000100000a000000001f000100660069006c0065003000000000", 0x20, 0xd000}, {&(0x7f0000011500)="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"/288, 0x120, 0xe000}, {&(0x7f0000011700)="22001d0000000000001d00080000000008007809140b2a3a0802000001000001010022001c0000000000001c00080000000008007809140b2a3a080200000100000101012a002c0000000000002c1a0400000000041a7809140b2a3a08000000010000010846494c45302e3b3100"/128, 0x80, 0xe800}, {&(0x7f0000011800)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030002c0021000000000000210a0000000000000a7809140b2a3a08000000010000010a00660069006c00650031002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c00650032002c00270000000000002728230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0xf000}, {&(0x7f0000011a00)="22001f0000000000001f00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101012c002c0000000000002c1a0400000000041a7809140b2a3a08000000010000010a00660069006c0065003000"/128, 0x80, 0xf800}, {&(0x7f0000011b00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x10000}, {&(0x7f0000011c00)='syzkallers\x00'/32, 0x20, 0x10800}, {&(0x7f0000011d00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x16000}, {&(0x7f0000012200)="000000000000000001000003000000000000000000000000000000000000000002000007000000300000002f00"/64, 0x40, 0xc8000}, {&(0x7f0000012300)="0000000000000000000000000000000000000000000000008000000000000000", 0x20, 0xc80e0}, {&(0x7f0000012400)="00000000000000000000000000000000000000000000000001f800f80078000e", 0x20, 0xc81e0}, {&(0x7f0000012500)="00000000000000000100000300000002000000030000000b000000010000000402000025000000600000005b00"/64, 0x40, 0xce000}, {&(0x7f0000012600)="000000000000000000000000000000000000000000000000f800000000000000", 0x20, 0xce0e0}, {&(0x7f0000012700)="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"/1216, 0x4c0, 0xce1e0}, {&(0x7f0000012c00)="000000000000000000000000000000000000000000000000008c00620038000e0000000000000002ff01000400000b00000000020566696c65320200000054455854756e69780000000000000000000000120021000023280000280000000000000000000000db8cf0c2db8cf0c27c25cca0000000000000000000000000000000000000002100050000000000000000000000000000000000000000000000000b00000000020566696c65330200000054455854756e69780000000000000000000000130026000023280000280000000000000000000000db8cf0c2db8cf0c27c25cca000000000000000000000000000000000000000260005000000000000000000000000000000000000000000000000070000000014000003000000000000000000000000020566696c653000000000000000000000000000000000000000000000000000000b00000000140566696c65300200000054455854756e6978000000000000000000000015002b0000041a0000080000000000000000000000db8cf0c2db8cf0c27c25cca0000000000000000000000000000000000000002b0001000000000000000000000000000000000000000000000000000000000000db8cf0c2db8cf0c27c25cca000000000000000000000000000000000000000260005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0019a012800f20080000e", 0x220, 0xce7e0}, {&(0x7f0000012f00)="00000000000000000000000000000000000000000000000041e1000000000000", 0x20, 0xcfbc0}, {&(0x7f0000013000)="000000000000000001000003000000000000000000000000000000000000000002000025000000100000000f00000000200000ff00"/64, 0x40, 0xda000}, {&(0x7f0000013100)="000000000000000000000000000000000000000000000000020a010000000000", 0x20, 0xda060}, {&(0x7f0000013200)="0000000000000000000000000000000000000000000000008000000000000000", 0x20, 0xda0e0}, {&(0x7f0000013300)="00000000000000000000000000000000000000000000000001f800f80078000e", 0x20, 0xda1e0}, {&(0x7f0000013400)="4244db8cf0c2db8cf0c2010000000003002401b800000800000020000004000000100194054344524f4d0000000000000000000000000000000000000000000000000000000000000005000060000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000c00000000000000000000c000000c0018000000000000", 0xa0, 0xdc000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="005a8f65683c4125894b571860c3b029f2ff72532c0d24ec137f6851ed36684b060cf95ab1f5f97ab1fbc0d1683568254180cd50e905013b24084fd3674ea3d9184c3565c6ab55ac0978678154e923af3ceaaf1cbf7c9cec03184ef2a6d6b42f1f85c13a298dee88389773ef35e1c41d277b9a206e9166e30a3c7fb157e8c2da855f8eab987473ba0a6175e87368adbc551b3833d66df06d367f2fcedff1fa8e44a9180beabda9cc957746758d491d3b86"]) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0/file0\x00', 0x2, 0x7, &(0x7f0000001800)=[{&(0x7f00000001c0)="5f70e713d5bfb8ad04546c6d03a0957a331776", 0x13, 0x5}, {&(0x7f0000000500)="a76db984ab7bb86a33a419ff7c7ae192", 0x10, 0x2}, {&(0x7f0000000540)="e8df7e33099a3c7d2ea01c343af3051ca729b709734fe7efae7ea9bbaf483775e60df69b7e1d53b66437ca92bc8b3df1233185b12223790fd1a5e437547191cda5626e5e61d7310947dfcbf3fbb4a8195ae7bbad8faa6929164214d1a9e0aabcbe739b0b6ebfd6d13543b8804890baf4283579b044cf5537ab1861e96f419bf68b6ee58203ff471d446fa6f7f5627b796d82bd57f7b07c479a2b96f3fa20a0e445bff9ea402b6e3e7f62b606e1336fda024dbed9f1bad03a98a79bac245b80533c2e7bf39ee6353d69abffce1d5c", 0xce, 0x6}, {&(0x7f0000000640)="c7d67a736f1f93257442825651cb98697bf7a1b48eadbea153fcd4a74beacd588e223105e577c99bee39a3909cb08ce2268a1da709c9e3bdb99406ca93fe4207a75cafb063a5f98e771a65e032aeaf557ce09d43a615aee02b7850acfc056c162ffee22e17ce0eb7f0b52d57176305bf20f1d3e523ccca805682e60c85f72056c4010c8b5e0966982e9aa90f3641", 0x8e, 0x8}, {&(0x7f0000000700)="8e6ce90aa45be6b1720d5e9accfabe49c320d135c6233f2e42730bf6c54fb25d1421bbd876041bccefb2d2ed0448586978f6cb5cb01f5285cff2bcbe5bd2f3a3a4fd754f0ac49381aaa80600a70a2a827b05f98709230921d37f131b47bfc3d03e0e9b593c451517b4da81497fa9b024b6614406d0cea2f207dcc4c29d436be0a69ec2f353347ce49574b17566b44b8123250517e145f2e3d2f28b072d3f5981", 0xa0, 0x7fff}, {&(0x7f00000007c0)="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", 0x1000, 0x8001}, {&(0x7f00000017c0)="8b39e32db2a783115467f6b9a794f2a342120c3fbdd975eed1b77542c66b2ebb8bce2c47196b9a36f85bbc493b886dc55f20acbd6de9140ab11fb2", 0x3b, 0x1ff}], 0x0, &(0x7f00000018c0)={[{@uni_xlateno}], [{@smackfsdef={'smackfsdef', 0x3d, '\''}}, {@smackfshat={'smackfshat', 0x3d, '-$!*}%'}}]}) 03:09:37 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 25) [ 597.911754] loop7: detected capacity change from 0 to 135266304 [ 597.946963] FAULT_INJECTION: forcing a failure. [ 597.946963] name failslab, interval 1, probability 0, space 0, times 0 [ 597.948388] CPU: 0 PID: 6158 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 597.949170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 597.950137] Call Trace: [ 597.950444] dump_stack+0x107/0x167 [ 597.950869] should_fail.cold+0x5/0xa [ 597.951307] ? create_object.isra.0+0x3a/0xa30 [ 597.951829] should_failslab+0x5/0x20 [ 597.952261] kmem_cache_alloc+0x5b/0x310 [ 597.952726] create_object.isra.0+0x3a/0xa30 [ 597.953238] kmemleak_alloc_percpu+0xa0/0x100 [ 597.953769] pcpu_alloc+0x4e2/0x1240 [ 597.954207] __percpu_counter_init+0x10d/0x2d0 [ 597.954736] io_uring_alloc_task_context+0xcc/0x6a0 [ 597.955303] ? io_import_iovec+0x1120/0x1120 [ 597.955816] io_uring_setup+0x1dd1/0x2980 [ 597.956290] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 597.956866] ? wait_for_completion_io+0x270/0x270 [ 597.957428] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 597.958039] ? syscall_enter_from_user_mode+0x1d/0x50 [ 597.958635] do_syscall_64+0x33/0x40 [ 597.959064] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 597.959648] RIP: 0033:0x7fca3e213b19 [ 597.960073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.962184] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 597.963053] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 597.963868] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 597.964677] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 597.965493] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 597.966316] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x06U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:09:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:38 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x93b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000800)=ANY=[]) r1 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x301000, 0x0) openat(r2, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) read(0xffffffffffffffff, &(0x7f00000006c0)=""/135, 0x87) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) syz_io_uring_setup(0x1f90, &(0x7f0000000480)={0x0, 0x5ec7, 0x0, 0x3, 0x2dc}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYRES64=r1], 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x240041c0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000640)={&(0x7f0000000200)=ANY=[@ANYBLOB="ad33878e392e6d6cb99b2e170310ab", @ANYRES16=0x0, @ANYBLOB="010028bd7000fadbdf25010000000c000300fdffffffffffffff080001000000000008000100000000000c00030001000080000000000c0005000b000000000000000c0003000900000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x91}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/184, 0xfffffffffffffec0}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000500)=""/114, 0xaa}], 0x3, 0x16, 0x4) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000800)={0x0, 0x0, "17f042"}) fallocate(0xffffffffffffffff, 0x52, 0x2, 0x10000000fdffffff) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 598.008533] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:09:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x3, 0x0, 0x3, 0x0, 0x5, 0x102, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1a7, 0x5, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x4, 0xfffffffe, 0x5, 0x1, 0xfff, 0x5, 0x0, 0x3, 0x0, 0x840e}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r2 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000014c0)='./file0\x00', 0x4000a, 0x3, &(0x7f0000000500)=[{&(0x7f0000000480)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="0863fced410000009300dff4655fe0f4650400", 0x13, 0x2100}], 0x4000, &(0x7f0000000580)=ANY=[@ANYRES16, @ANYRES32, @ANYBLOB="0ed5c458c41ca6d49e4a91301ff92c709e6aa14f03345daa52b131948390ec97b6702150810b916936427d8e66b1b717070d867f7967e237e62f27a6cd4c1a1c872ccd33c07ee48166dd8c334821eeeebd69fad68fe27606d60f3a5aa486bb01ab0a4fba404b8f81c2201e72c9e3a1782b307872a9b0e9f4a5c4828127fe5b9b9b7503b175c828ba1e8376b168f2ab721404a23b193d1f018c49e8facc9e7a82e817343474455c9d441d4d026565474b83f5c2048c8fb5499ef06d7141e888cc64472101476ef68c8f9d6191fe803c9c728ce2066b94db0ee0d8f980276fd8e73b432665"]) socket$nl_xfrm(0x10, 0x3, 0x6) preadv(r2, &(0x7f0000000940), 0x0, 0x8001f, 0x400) [ 598.073811] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 598.075540] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 598.078103] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 598.091102] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 598.099761] tmpfs: Unknown parameter 'À' [ 598.120807] loop6: detected capacity change from 0 to 135266304 03:09:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:51 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x3af}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$inet(0x2, 0xa, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000080)="601c6d6b646f736661e36600080820000400008000f800002000400003000000000000000100", 0x26}, {&(0x7f0000010400), 0x0, 0x10000}], 0x0, &(0x7f0000011200)) 03:09:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000040)={0x0, 0xea60}, 0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000900)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x33, 0x0, "4fb2386f65a856b6930930052d7d4e52fc4032fe98f268baabdf34269819ec36e44c87f906b59567acb1dd5aa5ba7be8ecc7069f172fddc076e97b1bb7ad34493270d4dbba4a2ca52cc13ca18e08c805"}, 0xd8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) sendmsg$inet6(r2, &(0x7f0000000480)={&(0x7f0000000180)={0xa, 0x4e22, 0x5, @private2, 0x3}, 0x1c, &(0x7f00000002c0)=[{&(0x7f00000001c0)="46dadce1ae371a72da80e5d6d781f552c5e01f53d28af8a3ddc401cbb9c4325bd452a97edc5fdd00478c56489f04ff559daf977e7360583ed52fb760930c8f23f05429f35bce234f50a8614db9823bd0e2bab093a600bdf10f588beef3bc4243e1f4bec5ba6fdc49cc0f9c57606cb6829ee2770b2142e0932a6957e6d2080b5df83bfe6e88c148ced0660aefe1d67c86948a7e93f721d7b372f0025b06e83bc75532f5c2cbf5b1fca0e1b2c431dc12c4e3317d754e72e63910ed45e541610feded9a9d81a2acb100f004324a8043443f2a7cc36b751ed17df38609407c5a68bfe231d461dfe2784fbf4011a55f88c1f0d6be62569082c6", 0xf7}], 0x1, &(0x7f0000000300)=[@rthdr_2292={{0x58, 0x29, 0x39, {0x84, 0x8, 0x2, 0x9, 0x0, [@private1, @mcast2, @mcast2, @empty]}}}, @hopopts_2292={{0x48, 0x29, 0x36, {0x29, 0x5, '\x00', [@padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x28, {0x3, 0x8, 0xff, 0x7fff, [0xedb0, 0xffffffff80000000, 0xc69, 0xf18]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}, @rthdr={{0x28, 0x29, 0x39, {0x0, 0x2, 0x2, 0xff, 0x0, [@ipv4={'\x00', '\xff\xff', @local}]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x87, 0x0, '\x00', [@padn={0x1, 0x1, [0x0]}]}}}, @tclass={{0x14}}, @flowinfo={{0x14, 0x29, 0xb, 0x20}}, @dontfrag={{0x14, 0x29, 0x3e, 0x9bf3}}], 0x158}, 0x814) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044001) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, &(0x7f00000004c0)=0x7, 0x4) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000500)={0xa, 0x4e24, 0x1, @empty, 0x9}, 0x1c, &(0x7f0000001b00)=[{&(0x7f0000000580)="d355eddf22ed145c671f9359ada307097741e6789a97d4d20f08a855c69a3862710c75e86fdc7cef3db74451be8f04e1df39e507d7117df08071e4a021ea87ca91cad7f5ed97d2407da15a9e5adc6839683defe399e072108de0fb7c0d6c0d6e46db5c1e7f6ad530099e61639b9e16be8d8bf40e4125a15740dcac04d2b7ef7659a5a762301dfd08d2dc842210ee45bcc8727863ad976403eab8aac7cfb57f50bd2a98738047f97679640c2d9ace6807df883e5728c4e33c30df453c4d", 0xbd}, {&(0x7f0000000700)="e45811d5eb62cbd6bfe25f2b89c94a48e6b132698e583272de235135c1c1949cee5905a7a3511969d8f44bbf6e745fa83e840a7947e4ca64affc25ccedc12cc4ea970896a1d3fbb74993f461cf8932e5a2af454c66e7a01a79f151a22abc345b2fbb2982ce82e592de8d5f5a1fc4750f019d5f8789de7d95f948ca7079c332d69830e4547118bf280ff228a912111e0c8b5e0eeda7edb7e7687b91c20351e4b873b1de96304bc2cb4f95992514b7c80cb3ce06e0122a67452ba0a7342a18982a3336e544fe4565d03a38655eb8654d8da4a0e8429f91a2b0bb316e396116b8e0f041c125d6e7b882ede07e", 0xeb}, {&(0x7f0000000800)="6cd7f965803af09bbbd37347d65924256264a0461e72a36896c196609b2fc57758386652b27d4e95fe78ddcb4e7f7d07cf98490f450bd8031261379793f1988c6f9c0f4770c906f26fc40afd15df5885388ca0967fa567d919e1823a65b51f99f4252440b6a8b611721303cf36a380591e6c685d783b7b8c0a99e0bdc926346185737cd891797fe27d6ce924da977ff245c42df30805b8737e5ae0e11161e26b3aaaa1470e81266897d9ab4d27310cd5cff162783e30dbbc491e06fbd53e650b5a5cfa5929782d051dd1d4f7eb60bf4c193a1829b776bc8f1aa5fd6ff165c42ef97763193d", 0xe5}, {&(0x7f0000000640)="36e6421ed886483f30de577c96d6d971d2205215d0c915c950211edf255a0548f74563e85c8b799b54b2b25584ffa5c6cbc471d4ab71f83ae3f0f09454609745c0d79d43656ee6b4eeb1de0eb4e39a4b9ed15562ed5e6dc2c3970ac272f3a23d06fd19e15e62a617dc2cc7a8baf0110068e829162bafadc18d1715df", 0x7c}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000001a00)="d256f4c2dd7f008e4104f04f4aa26346ac0d0bad48807774b9f558571d61205143ca45a20567ff6b34866cdb3ed845b9f300c5adef50c1fada9e202b24fb6575d2eaaf30b441623dee97502f00a202e542a82dacdb97c7fbcaff9c1cc90473e2e3d92b03b5d855988561ff320ab969b71451fd4fe07d756f0f959e4498935a0bbb2ad977c2", 0x85}, {&(0x7f0000001ac0)}], 0x7, &(0x7f0000001b80)=[@flowinfo={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x8}}, @flowinfo={{0x14, 0x29, 0xb, 0x8}}, @tclass={{0x14, 0x29, 0x43, 0x8}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @dstopts_2292={{0x98, 0x29, 0x4, {0x87, 0xf, '\x00', [@calipso={0x7, 0x38, {0x3, 0xc, 0x2, 0xf9f3, [0x5, 0x8, 0x4, 0x3, 0x10000, 0x100000000]}}, @hao={0xc9, 0x10, @mcast2}, @generic={0x1, 0x2d, "100c6eb7e82a18b0b1ca094fe1484266f15f63f9e68a8dc55d7b81ef7bd61ea82c1a53c4c29d7789a3e09b9ea9"}]}}}], 0x120}, 0x1) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 03:09:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:09:51 executing program 0: modify_ldt$write(0x1, &(0x7f0000000000), 0x10) modify_ldt$write(0x1, &(0x7f0000000040)={0x4, 0x1000, 0x400, 0x1, 0x1, 0x1}, 0x10) fork() 03:09:51 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 26) 03:09:51 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1}, 0x2}, 0x1c) r1 = syz_io_uring_complete(0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xa06e3, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffd, 0x133}) fcntl$setflags(r1, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) writev(r2, &(0x7f00000002c0)=[{&(0x7f0000000500)='z', 0x1}, {&(0x7f0000000040)='Z', 0x1}], 0x2) creat(&(0x7f0000000200)='./file0\x00', 0x1d8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000400)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x16, r3}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 03:09:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\aU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 611.093393] FAULT_INJECTION: forcing a failure. [ 611.093393] name failslab, interval 1, probability 0, space 0, times 0 [ 611.094888] CPU: 1 PID: 6197 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 611.095780] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 611.096796] Call Trace: [ 611.097153] dump_stack+0x107/0x167 [ 611.097602] should_fail.cold+0x5/0xa [ 611.098126] ? create_object.isra.0+0x3a/0xa30 [ 611.098717] should_failslab+0x5/0x20 [ 611.099229] kmem_cache_alloc+0x5b/0x310 [ 611.099775] create_object.isra.0+0x3a/0xa30 [ 611.100387] kmemleak_alloc_percpu+0xa0/0x100 [ 611.100968] pcpu_alloc+0x4e2/0x1240 [ 611.101451] __percpu_counter_init+0x10d/0x2d0 [ 611.102092] io_uring_alloc_task_context+0xcc/0x6a0 [ 611.102702] ? io_import_iovec+0x1120/0x1120 [ 611.103298] io_uring_setup+0x1dd1/0x2980 [ 611.103812] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 611.104497] ? wait_for_completion_io+0x270/0x270 [ 611.105110] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 611.105806] ? syscall_enter_from_user_mode+0x1d/0x50 [ 611.106445] do_syscall_64+0x33/0x40 [ 611.106950] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 611.107578] RIP: 0033:0x7fca3e213b19 [ 611.108077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.110329] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 611.111339] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 611.112211] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 611.113084] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 611.114032] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 611.114908] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\nU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 611.160569] loop5: detected capacity change from 0 to 131072 03:09:51 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 27) [ 611.182603] loop7: detected capacity change from 0 to 135266304 [ 611.197635] loop1: detected capacity change from 0 to 135266304 [ 611.215134] FAULT_INJECTION: forcing a failure. [ 611.215134] name failslab, interval 1, probability 0, space 0, times 0 [ 611.216743] CPU: 1 PID: 6222 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 611.217549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 611.218534] Call Trace: [ 611.218849] dump_stack+0x107/0x167 [ 611.219277] should_fail.cold+0x5/0xa [ 611.219728] ? io_uring_alloc_task_context+0x4a3/0x6a0 [ 611.220342] should_failslab+0x5/0x20 [ 611.220814] kmem_cache_alloc_trace+0x55/0x320 [ 611.221357] io_uring_alloc_task_context+0x4a3/0x6a0 [ 611.221962] ? io_import_iovec+0x1120/0x1120 [ 611.222525] io_uring_setup+0x1dd1/0x2980 [ 611.223018] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 611.223658] ? wait_for_completion_io+0x270/0x270 [ 611.224238] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 611.224885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 611.225492] do_syscall_64+0x33/0x40 [ 611.225959] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 611.226557] RIP: 0033:0x7fca3e213b19 [ 611.227014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.229222] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 611.230125] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 611.230954] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 611.231783] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 611.232611] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 611.233438] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:51 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 28) [ 611.262985] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:09:51 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8971, &(0x7f0000000a40)={'ip6_vti0\x00', 0x0}) [ 611.351470] FAULT_INJECTION: forcing a failure. [ 611.351470] name failslab, interval 1, probability 0, space 0, times 0 [ 611.354270] CPU: 0 PID: 6236 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 611.355871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 611.357855] Call Trace: [ 611.358484] dump_stack+0x107/0x167 [ 611.359353] should_fail.cold+0x5/0xa [ 611.360261] ? create_object.isra.0+0x3a/0xa30 [ 611.361335] should_failslab+0x5/0x20 [ 611.362250] kmem_cache_alloc+0x5b/0x310 [ 611.363286] create_object.isra.0+0x3a/0xa30 [ 611.364332] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 611.365789] kmem_cache_alloc_trace+0x151/0x320 [ 611.367000] io_uring_alloc_task_context+0x4a3/0x6a0 [ 611.368338] ? io_import_iovec+0x1120/0x1120 [ 611.369553] io_uring_setup+0x1dd1/0x2980 [ 611.370657] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 611.372062] ? wait_for_completion_io+0x270/0x270 [ 611.373267] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 611.374766] ? syscall_enter_from_user_mode+0x1d/0x50 [ 611.376009] do_syscall_64+0x33/0x40 [ 611.376964] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 611.378372] RIP: 0033:0x7fca3e213b19 [ 611.379245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.384073] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 611.385986] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 611.387866] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 611.389795] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 611.391470] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 611.393136] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:09:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x2) ftruncate(r0, 0x1000003) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x401001a}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x64, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0xc090) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netlink\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = dup2(r1, r1) write$binfmt_elf64(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x3c7) ioctl$BTRFS_IOC_SCRUB_CANCEL(r3, 0x941c, 0x0) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x266d40) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000040)=[r2, r3, r1, r4, 0xffffffffffffffff, r5, r1], 0x7) fcntl$addseals(r2, 0x409, 0x8) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x39, 0x1, 0x8}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) close(r1) lseek(r6, 0x0, 0x2) r7 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0) copy_file_range(r7, 0x0, r6, 0x0, 0x200f5ef, 0x0) 03:09:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x0fU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:09:51 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 29) [ 611.485442] FAULT_INJECTION: forcing a failure. [ 611.485442] name failslab, interval 1, probability 0, space 0, times 0 [ 611.488043] CPU: 0 PID: 6248 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 611.489588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 611.491491] Call Trace: [ 611.492092] dump_stack+0x107/0x167 [ 611.492937] should_fail.cold+0x5/0xa [ 611.493813] ? io_wq_create+0xeb/0xc00 [ 611.494712] should_failslab+0x5/0x20 [ 611.495582] __kmalloc+0x72/0x390 [ 611.496393] io_wq_create+0xeb/0xc00 [ 611.497249] io_uring_alloc_task_context+0x1f1/0x6a0 [ 611.498415] ? io_import_iovec+0x1120/0x1120 [ 611.499419] ? io_apoll_task_func+0x2d0/0x2d0 [ 611.500438] ? __io_req_find_next+0x300/0x300 [ 611.501469] io_uring_setup+0x1dd1/0x2980 [ 611.502432] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 611.503579] ? wait_for_completion_io+0x270/0x270 [ 611.504703] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 611.505909] ? syscall_enter_from_user_mode+0x1d/0x50 [ 611.507051] do_syscall_64+0x33/0x40 [ 611.507897] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 611.509067] RIP: 0033:0x7fca3e213b19 [ 611.509918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.514104] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 611.515830] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 611.517455] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 611.519090] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 611.520716] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 611.522345] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:10:05 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 30) 03:10:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15HU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:10:05 executing program 6: syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIOCLEX(r0, 0x5451) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x24}}, 0x24000800) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0xfdef) openat(r2, &(0x7f0000000100)='\x00', 0x2, 0x100) fallocate(r2, 0x3, 0x0, 0x8003) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)=':\\,^\x00') r3 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4305, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0xffffffff, 0x4, 0x7, 0x0, 0x7, 0x0, 0x40, 0x0, 0xffff}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000001a80)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xa002, 0x141) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) syz_io_uring_setup(0x6df8, &(0x7f00000003c0)={0x0, 0x34f2, 0x4, 0x3, 0x8000be}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80202, 0x100) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB="5cef00eb", @ANYRES16=0x0, @ANYBLOB="040827bd7000fedbdf0062620000080001006000000008009a00020000006004768fbbcfffad4753aaec984b455e7b7a"], 0x34}, 0x1, 0x0, 0x0, 0x40040}, 0x2005c804) 03:10:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1f7) r1 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x4, 0x0, @fd=r1}, 0x0) io_uring_enter(r1, 0x42b6, 0x6f76, 0x0, &(0x7f0000000280)={[0x3]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {r1}}, './file1\x00'}) name_to_handle_at(r4, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)=@orangefs_parent={0x28, 0x2, {{"080eec843ba5be3b0d1c96448a2f4a73", 0x4}, {"adb7ace6e6cd64659614aeb49226970f", 0x3}}}, &(0x7f00000002c0), 0x400) close(r0) clone3(&(0x7f00000008c0)={0x23040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x10000, 0xc4) 03:10:05 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) stat(0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) faccessat2(r0, &(0x7f0000000140)='./file0/file0\x00', 0x100, 0x300) 03:10:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x28, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x34, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r3, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x24b4832df5e4b564}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x200008c0}, 0x820) r5 = memfd_create(&(0x7f0000000000)='\x00', 0x7) fcntl$addseals(r5, 0x40a, 0x0) 03:10:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000200)=0x6) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000280)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r0, r0], 0x7, 0x0, 0x1}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r5, 0x11, 0xa, &(0x7f0000000000)=0xf95b, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r5, &(0x7f0000000080)={0x2002}) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f0000000340)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40012103, 0x1}, 0x80000001) io_uring_enter(r1, 0x58a7, 0xf6f4, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000001, 0x810, r1, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) [ 625.529711] FAULT_INJECTION: forcing a failure. [ 625.529711] name failslab, interval 1, probability 0, space 0, times 0 [ 625.531283] CPU: 0 PID: 6278 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 625.532219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 625.533347] Call Trace: [ 625.533717] dump_stack+0x107/0x167 [ 625.534227] should_fail.cold+0x5/0xa [ 625.534752] ? create_object.isra.0+0x3a/0xa30 [ 625.535376] should_failslab+0x5/0x20 [ 625.535902] kmem_cache_alloc+0x5b/0x310 [ 625.536457] create_object.isra.0+0x3a/0xa30 [ 625.537054] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 625.537748] __kmalloc+0x16e/0x390 [ 625.538257] io_wq_create+0xeb/0xc00 [ 625.538768] io_uring_alloc_task_context+0x1f1/0x6a0 [ 625.539466] ? io_import_iovec+0x1120/0x1120 [ 625.540080] ? io_apoll_task_func+0x2d0/0x2d0 [ 625.540686] ? __io_req_find_next+0x300/0x300 [ 625.541311] io_uring_setup+0x1dd1/0x2980 [ 625.541877] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 625.542575] ? wait_for_completion_io+0x270/0x270 [ 625.543250] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 625.543972] ? syscall_enter_from_user_mode+0x1d/0x50 [ 625.544675] do_syscall_64+0x33/0x40 [ 625.545198] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 625.545910] RIP: 0033:0x7fca3e213b19 [ 625.546413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 625.548908] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 625.549952] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 625.550920] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 625.551894] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 625.552867] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 625.553835] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 625.556523] loop1: detected capacity change from 0 to 135266304 [ 625.563693] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 625.603085] loop7: detected capacity change from 0 to 135266304 03:10:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg$inet(r0, &(0x7f0000006540)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10, &(0x7f0000000600)=[{&(0x7f0000002740)="eed15c822f086368e41db5bf5c69a2c22bdbc1f5d02615ca2ed6f4b9ae510ea111c856749e2034d953b13dad0f60bae09c39d7f74cf5e96f4ed9d9619da2241a5494829404332248abebecf6635b917a8a7da7680df00f57fea471167796d8f825752e2c81266210c7ea700d657049f23fdeadeb959a6510555e4549fc4189ec20c5a77dadc1699167e18694335b38b9a7ae2688a3c3d2440a42cc4a78a6ae0b9daed119ffe7132226e4ef8849ce7d21788fab8fe7855ac8923e953530080654fbf0950fa91163b8a4ce1e0bce4ba1d43b7fcd2f2b30c347ba94900a626b50d51ed7d8d323ca09e4906ca07d4f379b78e780e7f0743e9b1c7083b6238a8ac8ea0fc2b67cb2877155ec0aedb6e0b7b583212842a09f74648b3b0e3f50bb98570ddbc4105d39646ebb68a07a907e31c3a9db2ba5b34e329ab1033842fef466572042a3100bff12aa2b1913f672d7a9102d81af8eae7595c357e3a6f6e9272a5f146c77d5dd7af4e55e863f131acd5a44f165490cc4915666836c6a05c99896e41f4f22ca73d9bbff84b3d53e807928550326fedb68bca22a3083a28a0c9183717f9bf382989edd9291c206281eff4a2e6a4364fa3f3c28af5e7d8e2f2851a90b96e536c4bb3ace962cdfb7a6a4d623f7436f8e3b726cfca50e8850b3da283c9098222190d3be9990c52d023f0f0f4289fab184d314869ff803c5a1d6dc2e75495cac07a24785c119dc4b8804a04b5eb733c29248a116344ca7f45e0da8357375a349617b5b14b9d0343c14638e9e7bdacfdb8f7b4e1c539ee66731dfa458c04a09a144e20929785e2bddcecf62a26972b99d4c211a06e6f1ea3fbdde5440e3e8fefedd31beb7d8fea87598655253c9ed8af02e6da60490be14357af8c26bdbfc55babbbdabe5c530b935a918142a52768059271a1668c22b4e5e8d37dc229e43a998a892e09bdfebd61b7099ee6822fefcfc425b8f88ae359036331ca0b4d84353e072917b659e397749ee9c94989a9c4b7493225a569fdfeb8b2400a2e660101809170ce833d58d0df00ee5e63561f6384749a9339691de9b07fa4db8b5be4e27a8829dd3fb9ac21fe7b42920aaac97c1eb589789cce089ab1ae0be35a852b3b22357a2f2b37aedf1751269dcf3d648b1221791a78bd7008ac8cc1fc6faef51f9a7b3629e1925372f5308ae2edbf438318989355747c495cfaf94f159ed6a53817c54c8d4a2783bdef52d74be0bf5660a27407ed1331c633ab7b4e921ebabd7c94f018ba60a724b27b4af0b77f42e84d7805f6f0cdd7f7733f278a80d7a8272b9236a32192813ed446154ff0e8633cbc459265707765f36ce7c1159c018c7376b73d120d6836e0cbcd04a4ee9faf9c9a89ded3722d2cc22a5e14eb7342b7cbaeb6d3e06fb16562492c1c9a47acb3b633616e57fc88b5e0511b07a1b766aa7e0912bc9e247112923a0a22f184c02e429928ca2c1d9fbaaf940ad17dd7bcab6427cf8b013d157630d6862c0859558a09622415fca0eee5989754128ed9218836f6bd2b3ea50411c9c2e8c08dc2f0884e9027d7bc8e93e1129fdd02ae4dda42550e5392bd0bb1861a1e058b4343db8a59d1613c4f6df08ee1f2f3c02d5a9328199b06ba39b928a03509f4f1b43889cc67ab258ca50a8f9a959b358945364373e37261c636999843cab5401c2db4a76ec3c1005458439ff1afd2d023fa940f26e31c9a28be50ee07408ab67e264ad8a05522899e077246742824137c90dbac5f74e83645a981de80286584ffa63e287a1fd141288556fbe41a4821ff8a6c7180ee5fbdea8c51ba7763521814968849968a3dcd487596af547b95ad4becfcd24453809041d1e27783421422e49ab76166601b70f1a0a6a71364f988d63636bf568b89f394d48fde47c677984260f23f30fbbb6b47ce780e11fb8a428d9c092ed56ab92851b4ec384003111b2fa4a8f8a3be73c3ed0b59d9ba10cbbc117e9dd8f6b57c16db6b7aa59f5e09542a5dec8807a32bcc7fc4a276a8b8e196c6ee13d77eebf2266", 0x5a1}], 0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="1c000001a898eeb17926d31a9a00000000ec853a"], 0x20}}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) sendmmsg$inet(r1, &(0x7f0000000380)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)="68adf85fa9ccfd9d5e6510af636f866ce5c70334b333dadd3aadeacc6b65c39d7aa390cdc8924dccddf8f5fbd40911788e4c78dd347123eb506a6c3bdc6770484bdeaa5c50e0e1ed590eae8a2e8f5581100e1b8ddfce3012ba6f", 0x5a}, {&(0x7f0000000140)="5be7d28d0269731875b82284e72643d06860a9d0b2cc210a6debb5b2684d2ed6a75611c7148132", 0x27}, {&(0x7f0000000180)="2a771fdc83c00c8f8c3cb03bc4da8acf5a68d19f7949dffb5424c88ad7f4e8c93106f4ccc329cf90752cbce5bb73492178e543df2fe71d57f5829689c8315de058de8797dd30a8ffdb57dfff9dcacaa59a28235b09c1e554043d8583195678265e557b67c1d20c0dba19791f26ffb3edfdf9dc7bad8a6051f84e04223f02fabb74742c43b3de3b31d08ed5cabfc815bb1fe19a4865c77b6fcad4781c", 0x9c}, {&(0x7f0000000240)="af2170c58af7813fcb0664a1ed370d01e564e4789a661e9d3b9df5fece6f522e27ee3e0f14da6cb61c72e12d3d25e50c74b35242c103342be5a349fe200971f2aefe3b866e9626958e319cc86c922d1513e4e1efbffb5844576ae9e55232ce6bf6ce4481485a04edc961b0e4aa2c74c24b8996bbc26814e9975e84278248093137d8bbbabb921d711fe368e54c14ab4aee4e1d0edb70d3e073feeec171ec5f0d7e944327a56b271f689395a948518eab91e9f4a8ace48e00151bc9cf79fc8c11a50ab2d90764a32dcdfe9c667214190d9d88ff15949006", 0xd7}], 0x4}}], 0x1, 0x20000000) 03:10:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15LU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:10:05 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fdinfo\x00') getdents64(r0, &(0x7f00000007c0)=""/180, 0x200007d8) lseek(0xffffffffffffffff, 0xfffffffeffffffff, 0x4) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, 0x0, 0x200049c4) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000000)={0x0, 0x8, 0x401}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0x1277, 0x0) r1 = mq_open(&(0x7f0000000040)='nl80211\x00', 0x80, 0x100, &(0x7f0000000180)={0x10001, 0x7, 0x7, 0xfffffffffffffff8}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f00000001c0)={0x0, 0x80, 0x1}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYRES32, @ANYRES16], 0x1c}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) unshare(0x48020200) [ 625.750239] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 03:10:20 executing program 4: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000000)={r1, 0x3, 0xf8, 0xffffffffffffffcb}) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000080)) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r3) 03:10:20 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000700)=""/222, 0xde}], 0x2}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) connect(0xffffffffffffffff, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) setfsuid(0x0) r7 = openat$cgroup_subtree(r3, &(0x7f0000001bc0), 0x2, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001c00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$unix(r4, &(0x7f0000001d00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000000480)="696740c865eb4ad370517e26ef69e2d94240b0a0c5f59f8e99eab2ace29243d049d57da9d5d31d4534a4adab9d84a78f55ed47876b156597ebf9f0a8dab55ab54155b914485961395a8fd83c1bb04d491693a2f9e4b7f383921d316f7564ab4a7f9c87aa9fea47b10a56c54fbc060f0dffbed1706f55a605b559f7228114f13b3e664d275910b1b6482a001bf10ca29b44db", 0x92}, {&(0x7f0000000040)="c5e88fa71618c4ddf425762d2c98ccbf369dac3e4ba5aeee9f230e217e51ed6633346d4db6eb7bdf5421203cc068", 0x2e}, {&(0x7f0000000540)="8bc66f29c5b3c3b673fe5f45a24ac43038479dd36097024d08630ef6a097d1a5d29e502c0906137ba279f8851e72f5bb47b429c540601b21039e397aec5dc6527467aa38d25a7848eea460ea4744fe23c4ce9ae736d1b55f89a418b01e8113794a7aaafea0da578721566c653ce0e3c8ec1222bacb1ad7ef7e8aecbbb62490f4a71cc7079c3271fe3741c400be04e6a3ad7d323e7670606a6b70a385929bac999f0946d94967e8fb96a8d20ebac623cf041fe2838c57da88ebaba0fb71b91cfbfa814355d7815b2e51f073072fdf68d32f9b5f583ece88ef0557cadd8b2ea1696f19f5f27a846023aa35679be1cb62a4d551c75f62a1", 0xf6}, {&(0x7f0000000800)="559d819e2dea0a31bf70715d3e4f7e46e5eaf42a05032d4c1b5a131856733ba8680542afd85b7743fe38802a75df229b42a75ed1736864921d89ac6a4076059232eeceeef133f91e227c80d77945c01b495f3f6284565076a71931ddf0e2f1fb9efd2a25be529057cb8df01e3127454d8d37b113494f18d19abd2b558a890e89fedac6f778dfe070abdd06502d48e8f691bd534915506195867a04b53ce6f990a0a805c824ef30761eceb16566d94243adb0542658904b2838f4f9862cfa2cccdf7e4fb88f99411439c38f2e29dc", 0xce}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="7dee92b2267a027004e4cf2b9db499c2e2154d877acebcf03fb6a086ab2d86d4d8f0353dd2206a65540087065a8297fced59546cf569ad26a95263ca92a2465032e82819c90f91b18ffab18a27aa501f15ed4a8594d56623c5a480e3b7f86dd54f750c37a8a6361b779585fbdf35b4320703d8fee37b76aaeeafea4a1b7d1c8435534a12dbf446f654a5266160ce3ea73fc077de61", 0x95}, {&(0x7f00000019c0)="657c0686bb71211fb5de56290680d55b89696f02c5e3616513b24f92f4e43b93fb516e77e6b3ac49f9f2176041f9de3837f3363e90887bc9d77ca446231be13cdbc7dd992f749fbeb162e485aa1258cae22c04fee125572c87432dde6d7a3fddee95745f02c2eb9d0cce699b374769c4bf3cfac768bd7f507bb04e30bcbe99a7c8857d0b366845bb4a83e553dbe78a9d50cd0bd37c9b522851da0391a9b87d68165cb2d99d4b034a8450709df5810d1ff800", 0xb2}, {&(0x7f00000003c0)="9a80fb73b5a5f58a59964fd04dd22091e1d7f986b3bfa64df5eb808e5e88cd9a122a4b6f69e862f525bdcf64c60e719c292a10c6b06b011573744f1c2e2503876a54aa8a7309fcd9c96854e9076bf0aa5e8c83273df26f0bfc45", 0x5a}], 0x8, &(0x7f0000001c40)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r4, 0xffffffffffffffff, r6, r4, 0xffffffffffffffff, r6]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r7, r0, r8, r9, r3]}}], 0x98, 0x10}, 0x800) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:10:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15hU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:10:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:20 executing program 0: prlimit64(0x0, 0x6, &(0x7f0000000080), 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, 0x0) syz_io_uring_setup(0x3560, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000002c0)) 03:10:20 executing program 6: r0 = memfd_create(&(0x7f0000000040)='\x00\'\fx\xe0\x1c\xaa\x00t\x88\xc4p\xb0\x89A`\xe4\xc6O\xca\x1d\x006\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc7\x0fG/\xf9', 0x40fe85b1e33da40) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) r1 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, r1) 03:10:20 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 31) 03:10:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 640.309908] FAULT_INJECTION: forcing a failure. [ 640.309908] name failslab, interval 1, probability 0, space 0, times 0 [ 640.312358] CPU: 1 PID: 6324 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 640.313802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 640.315569] Call Trace: [ 640.316132] dump_stack+0x107/0x167 [ 640.316902] should_fail.cold+0x5/0xa [ 640.317704] ? io_wq_create+0x6ef/0xc00 [ 640.318554] should_failslab+0x5/0x20 [ 640.319416] kmem_cache_alloc_node_trace+0x59/0x340 [ 640.320774] io_wq_create+0x6ef/0xc00 [ 640.321809] io_uring_alloc_task_context+0x1f1/0x6a0 [ 640.323141] ? io_import_iovec+0x1120/0x1120 [ 640.324319] ? io_apoll_task_func+0x2d0/0x2d0 [ 640.325516] ? __io_req_find_next+0x300/0x300 [ 640.326762] io_uring_setup+0x1dd1/0x2980 [ 640.327896] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 640.329070] ? wait_for_completion_io+0x270/0x270 [ 640.330150] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 640.331487] ? syscall_enter_from_user_mode+0x1d/0x50 [ 640.332575] do_syscall_64+0x33/0x40 [ 640.333356] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 640.334449] RIP: 0033:0x7fca3e213b19 [ 640.335220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 640.339099] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 640.340707] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 640.342215] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 640.343714] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 640.345205] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 640.346706] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 640.373697] loop1: detected capacity change from 0 to 135266304 [ 640.417918] loop7: detected capacity change from 0 to 135266304 03:10:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15lU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:10:34 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000700)=""/222, 0xde}], 0x2}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) connect(0xffffffffffffffff, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) setfsuid(0x0) r7 = openat$cgroup_subtree(r3, &(0x7f0000001bc0), 0x2, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001c00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$unix(r4, &(0x7f0000001d00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000000480)="696740c865eb4ad370517e26ef69e2d94240b0a0c5f59f8e99eab2ace29243d049d57da9d5d31d4534a4adab9d84a78f55ed47876b156597ebf9f0a8dab55ab54155b914485961395a8fd83c1bb04d491693a2f9e4b7f383921d316f7564ab4a7f9c87aa9fea47b10a56c54fbc060f0dffbed1706f55a605b559f7228114f13b3e664d275910b1b6482a001bf10ca29b44db", 0x92}, {&(0x7f0000000040)="c5e88fa71618c4ddf425762d2c98ccbf369dac3e4ba5aeee9f230e217e51ed6633346d4db6eb7bdf5421203cc068", 0x2e}, {&(0x7f0000000540)="8bc66f29c5b3c3b673fe5f45a24ac43038479dd36097024d08630ef6a097d1a5d29e502c0906137ba279f8851e72f5bb47b429c540601b21039e397aec5dc6527467aa38d25a7848eea460ea4744fe23c4ce9ae736d1b55f89a418b01e8113794a7aaafea0da578721566c653ce0e3c8ec1222bacb1ad7ef7e8aecbbb62490f4a71cc7079c3271fe3741c400be04e6a3ad7d323e7670606a6b70a385929bac999f0946d94967e8fb96a8d20ebac623cf041fe2838c57da88ebaba0fb71b91cfbfa814355d7815b2e51f073072fdf68d32f9b5f583ece88ef0557cadd8b2ea1696f19f5f27a846023aa35679be1cb62a4d551c75f62a1", 0xf6}, {&(0x7f0000000800)="559d819e2dea0a31bf70715d3e4f7e46e5eaf42a05032d4c1b5a131856733ba8680542afd85b7743fe38802a75df229b42a75ed1736864921d89ac6a4076059232eeceeef133f91e227c80d77945c01b495f3f6284565076a71931ddf0e2f1fb9efd2a25be529057cb8df01e3127454d8d37b113494f18d19abd2b558a890e89fedac6f778dfe070abdd06502d48e8f691bd534915506195867a04b53ce6f990a0a805c824ef30761eceb16566d94243adb0542658904b2838f4f9862cfa2cccdf7e4fb88f99411439c38f2e29dc", 0xce}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="7dee92b2267a027004e4cf2b9db499c2e2154d877acebcf03fb6a086ab2d86d4d8f0353dd2206a65540087065a8297fced59546cf569ad26a95263ca92a2465032e82819c90f91b18ffab18a27aa501f15ed4a8594d56623c5a480e3b7f86dd54f750c37a8a6361b779585fbdf35b4320703d8fee37b76aaeeafea4a1b7d1c8435534a12dbf446f654a5266160ce3ea73fc077de61", 0x95}, {&(0x7f00000019c0)="657c0686bb71211fb5de56290680d55b89696f02c5e3616513b24f92f4e43b93fb516e77e6b3ac49f9f2176041f9de3837f3363e90887bc9d77ca446231be13cdbc7dd992f749fbeb162e485aa1258cae22c04fee125572c87432dde6d7a3fddee95745f02c2eb9d0cce699b374769c4bf3cfac768bd7f507bb04e30bcbe99a7c8857d0b366845bb4a83e553dbe78a9d50cd0bd37c9b522851da0391a9b87d68165cb2d99d4b034a8450709df5810d1ff800", 0xb2}, {&(0x7f00000003c0)="9a80fb73b5a5f58a59964fd04dd22091e1d7f986b3bfa64df5eb808e5e88cd9a122a4b6f69e862f525bdcf64c60e719c292a10c6b06b011573744f1c2e2503876a54aa8a7309fcd9c96854e9076bf0aa5e8c83273df26f0bfc45", 0x5a}], 0x8, &(0x7f0000001c40)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r4, 0xffffffffffffffff, r6, r4, 0xffffffffffffffff, r6]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r7, r0, r8, r9, r3]}}], 0x98, 0x10}, 0x800) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:10:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:34 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 32) 03:10:34 executing program 7: keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:34 executing program 4: r0 = syz_io_uring_setup(0x68d2, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x1008, &(0x7f0000000740), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/locks\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r5, {0x5}}, './file0\x00'}) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:10:34 executing program 0: mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0x0, @perf_config_ext={0x100000001, 0x401}, 0xd885, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="200000f71300210c0000000000557c565ae4320000000af0000004005f8008000000", @ANYRES32=0x0, @ANYBLOB="c52002d2590abf0734cd98ac3b73accf7b10a847dc2f7f0a6fbf549451864bf1e843f1ee84f1aa8d46fc5f56c4ff2d2f9158974986dcb2c5168047493ce6a1dbcd00b2d3509dd9460fc6e40f0000728b7b842b6955543726ceaf34945983b1fb539e7eadc4a249307a23c43219361d100e139486fd022bee0b594b011dc5b9070f3e1e1f0deb6bb398bc8513594dbad25bfee1cd515a2e5e206cdbf83a5ba9ab16a4f3b9d64bd307ef5c8a155bae40a2b92446355a85d4fc709577c672aee09c1c5492abbbe1e5493e0f7433617db6735908"], 0x20}}, 0x0) syncfs(r2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x32100, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000140)=0xffffffffffff1894, 0xffffffffffffffff, &(0x7f00000000c0)=0x1e, 0x7, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)={0xfffffffe, 0x80}) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c00, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0xb, &(0x7f0000ffe000/0x2000)=nil) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) setresuid(0xffffffffffffffff, 0xffffffffffffffff, 0xee00) clock_gettime(0x4, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRESOCT=r1, @ANYBLOB='5\x00Q\x00', @ANYRES32=r2]) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0xef, 0x9, 0x12, 0x10, "89f5e098115db60136d1d378e45f29636f0a74d7fd2b954ac53340fa745e40721eec0c08b7d035177b2bf6830e4e381a21ec2040793bae1a3f3ff60b4feb9ee1", "bf1047a99b9c26db92c45dc422ff6a112317d290329812cbd09ae21835b7290d", [0x0, 0x8]}) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) [ 654.652004] FAULT_INJECTION: forcing a failure. [ 654.652004] name failslab, interval 1, probability 0, space 0, times 0 [ 654.654485] CPU: 0 PID: 6369 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 654.655915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 654.657668] Call Trace: [ 654.658247] dump_stack+0x107/0x167 [ 654.659022] should_fail.cold+0x5/0xa [ 654.659824] ? create_object.isra.0+0x3a/0xa30 [ 654.660778] should_failslab+0x5/0x20 [ 654.661569] kmem_cache_alloc+0x5b/0x310 [ 654.662436] ? io_wq_create+0x114/0xc00 [ 654.663263] create_object.isra.0+0x3a/0xa30 [ 654.664171] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 654.665244] kmem_cache_alloc_node_trace+0x16d/0x340 [ 654.666324] io_wq_create+0x6ef/0xc00 [ 654.667127] io_uring_alloc_task_context+0x1f1/0x6a0 [ 654.668194] ? io_import_iovec+0x1120/0x1120 [ 654.669117] ? io_apoll_task_func+0x2d0/0x2d0 [ 654.670054] ? __io_req_find_next+0x300/0x300 [ 654.670998] io_uring_setup+0x1dd1/0x2980 [ 654.671872] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 654.672923] ? wait_for_completion_io+0x270/0x270 [ 654.674015] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 654.675108] ? syscall_enter_from_user_mode+0x1d/0x50 [ 654.676181] do_syscall_64+0x33/0x40 [ 654.676956] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 654.678037] RIP: 0033:0x7fca3e213b19 [ 654.678814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 654.682644] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 654.684227] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 654.685703] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 654.687200] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 654.688702] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 654.690205] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 654.697586] loop7: detected capacity change from 0 to 135266304 [ 654.705617] loop6: detected capacity change from 0 to 135266304 03:10:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15tU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 654.772525] loop1: detected capacity change from 0 to 135266304 03:10:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15zU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:10:34 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 33) [ 654.934421] FAULT_INJECTION: forcing a failure. [ 654.934421] name failslab, interval 1, probability 0, space 0, times 0 [ 654.936943] CPU: 1 PID: 6407 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 654.938375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 654.940104] Call Trace: [ 654.940659] dump_stack+0x107/0x167 [ 654.941425] should_fail.cold+0x5/0xa [ 654.942230] ? io_rsrc_node_switch_start.part.0+0x43/0x250 [ 654.943389] should_failslab+0x5/0x20 [ 654.944184] kmem_cache_alloc_trace+0x55/0x320 [ 654.945135] io_rsrc_node_switch_start.part.0+0x43/0x250 [ 654.946273] io_uring_setup+0x14f6/0x2980 [ 654.947142] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 654.948192] ? wait_for_completion_io+0x270/0x270 [ 654.949220] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 654.950333] ? syscall_enter_from_user_mode+0x1d/0x50 [ 654.951415] do_syscall_64+0x33/0x40 [ 654.952191] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 654.953250] RIP: 0033:0x7fca3e213b19 [ 654.954039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 654.957880] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 654.959465] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 654.960946] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 654.962429] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 654.963924] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 654.965406] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:10:35 executing program 7: keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:35 executing program 4: r0 = syz_io_uring_setup(0x68d2, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x1008, &(0x7f0000000740), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/locks\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r5, {0x5}}, './file0\x00'}) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:10:35 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 34) [ 655.140097] FAULT_INJECTION: forcing a failure. [ 655.140097] name failslab, interval 1, probability 0, space 0, times 0 [ 655.142651] CPU: 0 PID: 6423 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 655.144120] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 655.145903] Call Trace: [ 655.146478] dump_stack+0x107/0x167 [ 655.147258] should_fail.cold+0x5/0xa [ 655.148075] ? io_wq_create+0x6ef/0xc00 [ 655.148919] should_failslab+0x5/0x20 [ 655.149731] kmem_cache_alloc_node_trace+0x59/0x340 [ 655.150808] io_wq_create+0x6ef/0xc00 [ 655.151630] io_uring_alloc_task_context+0x1f1/0x6a0 [ 655.152709] ? io_import_iovec+0x1120/0x1120 [ 655.153644] ? io_apoll_task_func+0x2d0/0x2d0 [ 655.154596] ? __io_req_find_next+0x300/0x300 [ 655.155565] io_uring_setup+0x1dd1/0x2980 [ 655.156459] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 655.157539] ? wait_for_completion_io+0x270/0x270 [ 655.158607] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 655.159728] ? syscall_enter_from_user_mode+0x1d/0x50 [ 655.160832] do_syscall_64+0x33/0x40 [ 655.161630] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 655.162732] RIP: 0033:0x7fca3e213b19 [ 655.163525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 655.167471] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 655.169097] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 655.170631] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 655.172151] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 655.173674] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 655.175201] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:10:35 executing program 7: keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa\t\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:10:35 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 670.718170] FAULT_INJECTION: forcing a failure. [ 670.718170] name failslab, interval 1, probability 0, space 0, times 0 [ 670.719756] CPU: 1 PID: 6446 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 670.720655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 03:10:50 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 35) 03:10:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15tU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:10:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9a#\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 670.722059] Call Trace: [ 670.722527] dump_stack+0x107/0x167 [ 670.723006] should_fail.cold+0x5/0xa [ 670.723519] ? io_wq_create+0x6ef/0xc00 [ 670.724047] should_failslab+0x5/0x20 [ 670.724553] kmem_cache_alloc_node_trace+0x59/0x340 [ 670.725211] io_wq_create+0x6ef/0xc00 [ 670.725718] io_uring_alloc_task_context+0x1f1/0x6a0 [ 670.726403] ? io_import_iovec+0x1120/0x1120 [ 670.726979] ? io_apoll_task_func+0x2d0/0x2d0 [ 670.727560] ? __io_req_find_next+0x300/0x300 [ 670.728155] io_uring_setup+0x1dd1/0x2980 [ 670.728696] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 670.729346] ? wait_for_completion_io+0x270/0x270 [ 670.729996] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 670.730679] ? syscall_enter_from_user_mode+0x1d/0x50 [ 670.731354] do_syscall_64+0x33/0x40 [ 670.731845] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 670.732522] RIP: 0033:0x7fca3e213b19 [ 670.733011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 670.735408] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 670.736399] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 670.737629] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb 03:10:50 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:50 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000700)=""/222, 0xde}], 0x2}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) connect(0xffffffffffffffff, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) setfsuid(0x0) r7 = openat$cgroup_subtree(r3, &(0x7f0000001bc0), 0x2, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001c00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$unix(r4, &(0x7f0000001d00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000000480)="696740c865eb4ad370517e26ef69e2d94240b0a0c5f59f8e99eab2ace29243d049d57da9d5d31d4534a4adab9d84a78f55ed47876b156597ebf9f0a8dab55ab54155b914485961395a8fd83c1bb04d491693a2f9e4b7f383921d316f7564ab4a7f9c87aa9fea47b10a56c54fbc060f0dffbed1706f55a605b559f7228114f13b3e664d275910b1b6482a001bf10ca29b44db", 0x92}, {&(0x7f0000000040)="c5e88fa71618c4ddf425762d2c98ccbf369dac3e4ba5aeee9f230e217e51ed6633346d4db6eb7bdf5421203cc068", 0x2e}, {&(0x7f0000000540)="8bc66f29c5b3c3b673fe5f45a24ac43038479dd36097024d08630ef6a097d1a5d29e502c0906137ba279f8851e72f5bb47b429c540601b21039e397aec5dc6527467aa38d25a7848eea460ea4744fe23c4ce9ae736d1b55f89a418b01e8113794a7aaafea0da578721566c653ce0e3c8ec1222bacb1ad7ef7e8aecbbb62490f4a71cc7079c3271fe3741c400be04e6a3ad7d323e7670606a6b70a385929bac999f0946d94967e8fb96a8d20ebac623cf041fe2838c57da88ebaba0fb71b91cfbfa814355d7815b2e51f073072fdf68d32f9b5f583ece88ef0557cadd8b2ea1696f19f5f27a846023aa35679be1cb62a4d551c75f62a1", 0xf6}, {&(0x7f0000000800)="559d819e2dea0a31bf70715d3e4f7e46e5eaf42a05032d4c1b5a131856733ba8680542afd85b7743fe38802a75df229b42a75ed1736864921d89ac6a4076059232eeceeef133f91e227c80d77945c01b495f3f6284565076a71931ddf0e2f1fb9efd2a25be529057cb8df01e3127454d8d37b113494f18d19abd2b558a890e89fedac6f778dfe070abdd06502d48e8f691bd534915506195867a04b53ce6f990a0a805c824ef30761eceb16566d94243adb0542658904b2838f4f9862cfa2cccdf7e4fb88f99411439c38f2e29dc", 0xce}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="7dee92b2267a027004e4cf2b9db499c2e2154d877acebcf03fb6a086ab2d86d4d8f0353dd2206a65540087065a8297fced59546cf569ad26a95263ca92a2465032e82819c90f91b18ffab18a27aa501f15ed4a8594d56623c5a480e3b7f86dd54f750c37a8a6361b779585fbdf35b4320703d8fee37b76aaeeafea4a1b7d1c8435534a12dbf446f654a5266160ce3ea73fc077de61", 0x95}, {&(0x7f00000019c0)="657c0686bb71211fb5de56290680d55b89696f02c5e3616513b24f92f4e43b93fb516e77e6b3ac49f9f2176041f9de3837f3363e90887bc9d77ca446231be13cdbc7dd992f749fbeb162e485aa1258cae22c04fee125572c87432dde6d7a3fddee95745f02c2eb9d0cce699b374769c4bf3cfac768bd7f507bb04e30bcbe99a7c8857d0b366845bb4a83e553dbe78a9d50cd0bd37c9b522851da0391a9b87d68165cb2d99d4b034a8450709df5810d1ff800", 0xb2}, {&(0x7f00000003c0)="9a80fb73b5a5f58a59964fd04dd22091e1d7f986b3bfa64df5eb808e5e88cd9a122a4b6f69e862f525bdcf64c60e719c292a10c6b06b011573744f1c2e2503876a54aa8a7309fcd9c96854e9076bf0aa5e8c83273df26f0bfc45", 0x5a}], 0x8, &(0x7f0000001c40)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r4, 0xffffffffffffffff, r6, r4, 0xffffffffffffffff, r6]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r7, r0, r8, r9, r3]}}], 0x98, 0x10}, 0x800) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 670.738786] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 670.739752] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 670.740690] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:10:50 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x8, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x24, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x409becb7bdfc1d3, 0x1, 0x0, 0x0, 0x9db}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) connect$inet6(r0, &(0x7f0000003d00)={0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8001}, 0x1c) [ 670.777858] loop1: detected capacity change from 0 to 135266304 [ 670.786730] loop6: detected capacity change from 0 to 135266304 [ 670.796028] loop7: detected capacity change from 0 to 135266304 sendmmsg$inet6(r0, &(0x7f0000004740)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x5, @local, 0x6}, 0x1c, &(0x7f0000001500)=[{&(0x7f0000000180)="ff6e4a2329996d0ca4e959d80a519657a6bd11d00575ebbb369d4cbc7d1a0d4e0bb1e6309e629fe8b3c7dfd1721c749a9019722f84517d184f108c7ddcae674467bae08b37dd7798c2ab374bdee9d6ea3ceac4e13f20ceac2bb871c5095202f5d8d64b478764dff29985b9e36a2a445ee54363670d4e8c149efe5da002bb7ff60463a28504a6d86e49c150ecf8db93dfed8b74f1773cf46852d0a1818613bad2c177b213391b501d55c41acf6117c85adc34552f01bc6540124a9311fa6eb62409e856c9e18c1483b5db9a79597eb815a40636bf6045", 0xd6}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000280)="2debb2bfa43c4df943f3b6ece0fa1388b599fc88a553b2cd4d9df395b1b77193aa5592a3c507ab7eacaf5dc7660c7e08f25f6d135934a3fc4456b2a1eefbd8032ca50d2dedd167a2ffa221b09f1512edb59e992632530a22de1b6e97c580e39d6be95addbc7a5838f7d69da51eab8aae794fa72f7cfe0a5cf66e36fc0a3183ded0a3b62251b0e8bb8470fc048ac29ef5d3539ea65d100b5ef48bab1444d3a95aa60dc68c506bfce1426589c5066024051491ebcd90d27cb23b619b69cbec3598b9b84433054aeae5998e2016bd8d72e8fbe3089383ec4ccf4559a2c456ee3f062727397e793eb5c5", 0xe8}, {&(0x7f0000000380)="e2ed4ffdcaa7974342a343c6977eb25b708d0e83dfc3f73b6c9f84fae80ea51a1197ee8f3c19e1c00ac3e4ad5328c7f7a98407feca0594c708e225c983a70ee3dbec52fb0a4afac843b1ed03ba277cb14f5a704d64dc78ec3d3c7c1678f9165b5b8af90ca0fa39c45314da0cadc88df9a9", 0x71}, {&(0x7f0000000400)="cbcae8a330f21dbb5ae26f27c9234af7bbf54c8c11837e1867aac6b9b2a2eeeb7c0f0a2382447958b35093c3508495a94302ede016ad20be51c9813e5e4e806896ebc4eb8d30c05652", 0x49}], 0x5, &(0x7f0000001580)=[@rthdrdstopts={{0x80, 0x29, 0x37, {0x2e, 0xd, '\x00', [@enc_lim={0x4, 0x1, 0xff}, @ra={0x5, 0x2, 0x2}, @calipso={0x7, 0x58, {0x3, 0x14, 0x8, 0x417a, [0x9, 0x4ac7, 0x4, 0xffffffffffff0001, 0x1, 0x2, 0x4, 0x2, 0x7, 0x100000000]}}, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1]}}}, @dstopts={{0x38, 0x29, 0x37, {0x2b, 0x3, '\x00', [@hao={0xc9, 0x10, @remote}, @pad1, @enc_lim={0x4, 0x1, 0xdb}, @padn={0x1, 0x1, [0x0]}, @pad1]}}}, @rthdrdstopts={{0x50, 0x29, 0x37, {0x3c, 0x6, '\x00', [@jumbo={0xc2, 0x4, 0x1f}, @pad1, @calipso={0x7, 0x28, {0x2, 0x8, 0x14, 0x2, [0x80, 0x0, 0x0, 0x2]}}]}}}], 0x108}}, {{&(0x7f0000000480)={0xa, 0x4e21, 0x2, @private2, 0xab}, 0x1c, &(0x7f00000017c0)=[{&(0x7f00000016c0)="08f7d505d88095dda11187f052192ffcc516078d1fbe20f6dedb7d1d7db7e7759d090334b24c5c98d6e80f1bcee715c3bef4eb31dd73616d1e3484eb1ee03ae2346d32cd30921f21181fff8b6bb500e03f843b0a9ed016c25e9c0974eda94227f5828213fc212b1ca77119712fe26f525bc7349a395628e1b0000d426df3a238967137d9986b3c69f8e6032d215a6eb0ae79a27569d910203f956cf6096899de76deed7c394a0744f1af23db1cb4420de8115c6efc4ff534a5659946644a104eb146372b9dbbc330e47802ce20055f642941e5acbbaa25c9b1754a28cce25e090ceb2331be9e7c1dca4da9", 0xeb}], 0x1, &(0x7f0000001800)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x4, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x4b7}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x3f}}, @dstopts_2292={{0x78, 0x29, 0x4, {0x21, 0xb, '\x00', [@ra={0x5, 0x2, 0x74e6}, @jumbo={0xc2, 0x4, 0x3}, @calipso={0x7, 0x50, {0x0, 0x12, 0xfd, 0x9, [0x6, 0x4, 0x5a6584a6, 0x10001, 0xbcf, 0x5, 0x3ff, 0x2422, 0x8]}}]}}}, @hopopts_2292={{0x118, 0x29, 0x36, {0x6, 0x1f, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @generic={0xe9, 0x97, "91ca6e1e9451301e4fa0c01cdd0593e9b9bfbecc75ec9a722d49f4fbcbdd49161c17720ea6953ed6c8a21c4e13f9c7017dbf5d828406172ed467ad2a8dd0dd247821d4a7408d5561b38b99457ec0f0f8e82da2a340757bdd3eebf6da759acfbeac0c9b6c8549f140ee70737cd9a45f97d7d42949daeee045f91ddc5b1f5981036ad673fb726312a7065e66d5ebb89b1ea79c112eaffbaa"}, @ra={0x5, 0x2, 0x200}, @calipso={0x7, 0x50, {0x3, 0x12, 0x0, 0x0, [0x3, 0xfffffffffffffffb, 0x2667, 0x400, 0x3, 0x37a, 0x1, 0x728c, 0x2]}}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x800}}, @flowinfo={{0x14, 0x29, 0xb, 0x6}}, @hopopts={{0x2c8, 0x29, 0x36, {0x29, 0x55, '\x00', [@jumbo={0xc2, 0x4, 0x1}, @ra={0x5, 0x2, 0xf1a8}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @jumbo={0xc2, 0x4, 0x8}, @generic={0xf5, 0x7, "0fe3064b27def3"}, @generic={0x48, 0x99, "0ddb353d2f910e3200f3d7a9e1a1891e9797173f1efa8bf8f4c071fc5c30ada1ccfe4f94c846c0b1bc37d006e7617a19f94720c9dea3b082e26f80768168114e333afa16048270b36a4baf9e1fed1f4f0e38a8f814bfb6d0f749ded793bb499b93cb0aaec8221f4e80c6ea1346773259b5eb14db4177c7f55ff48b8a6b72818ffc216f57836caf675af8db559e868308a1e1feb9e6cff13692"}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x40, {0x2, 0xe, 0x1, 0xff, [0x7, 0x5, 0x40, 0x1ff, 0xfffffffffffffffd, 0x5, 0xff]}}, @generic={0x81, 0xc6, "69f53f48280ad547e97cedb95356f1360ae13610014b5264dc7ba477f0bcb00591dfc80cf69fa9a39c467bc3785fe5cc053f471841d523f7298a88661154943e1f41eac13f33e7de77cb2453a91187ba17b25ac36675e47780385dc9beb35c97f1d00cd89122c4660d03b206df95538f4bf510b875724d455b644f526c24ab17ae8a33eeccec33e6e6508cf8057a98c5cdfeccb08c02218b26bf0beddf5509af74b033528459c53723529e18b67e82ec42d39de08265e00d504da92d0bc409b5a0a748684ed2"}, @generic={0xc, 0xd2, "7b8b779e78fa9a56199bcd3f40d412afae7bc2ed7bfdd494b47af800ea38a97f71021f5d91ddb961deea49cfe3bf8ab14cbd06cb4a17a29f248dcd52cd8f8d3ecc090e9ed9ee489f39a3841b460d888aaeecb4b22045cacd3b9a320a79fbba1c857145505aa96e6bd59858800b605dee3ec36fbdcd6fcd65a510e191fef2e83d4a80d055bec67b3b2499a7ee18600ef75a52366266f1a1709f2c876a16e20cb709041f37472ad34a144edae5d3e6b49ac7a22037d79fe753379a8d82fe32dd17a262dcd06d76517d7d68cb16ff0691ba8e70"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x500}}, {{&(0x7f0000001d00)={0xa, 0x4e24, 0x101, @private1, 0x401}, 0x1c, &(0x7f0000002140)=[{&(0x7f0000001d40)="bd20ec57e7883cf1c7391b4870cae6b990b51b5a630b5ac2962d22244996625f229376998f0965ad57897fc8563a77b12e0973fc", 0x34}, {&(0x7f0000001d80)="136cb5824d41cc3b9326e5aa2713a551cd1f43802247b322bfc620988e26e9dfae04799505e7e6cae314fdef3591c6cd19db9d282b57bcb84ff18081b7b9beab55dc3116b1ce7ed0ca31297fc4712a7a36bb6afd9d37635ac45bde7c93a8da2b05aff828deedfde04e6bef2e6a5382b5cacd1c15161d441b1b73eb7f16fbbee1eac61ac6d7c739ca9febf3e2dfe3f55acfc871dc9dace2163c521f0264a110b84bed1da1d112dd9db91d431451d73df1342ffbb5eecd5412bd078b7884125cfd4ce2e2e47153fd49ea7bfadf6ac986af", 0xd0}, {&(0x7f0000001e80)="8fddb5e3dea4e34753da23d4bb22d817c6134deb62ac878f81cce7662ce5e856380f049e9f12d3d2c6c81de9ce9dd1a928987fd5bc64f402a7547ff26bdd64ba5eb05806d6f133cd2d1376e61d7cb0c0bb364a4a73e09141ac0f2d9fe479051e15624427badd93c278b1220cc4a1ae8f18212c42f561cf6383a0154a9b64b7ba1b5f80b23d5b7c7de78690bb411cd5e0f7cbf004", 0x94}, {&(0x7f0000001f40)="28e78b", 0x3}, {&(0x7f0000001f80)="73a4e89badf9340b68d919dbe31d74c87f9709b74820973fd537f95dc467556850569cb31e58d39a288e29b7519cb16528346e82be2fabd4fe799d9fd2ba60d6338612b749c02a3eabb177964bb33d2f92a4ce283c58e3361e74109097bc5a86d196f631be5726e3fe85429cffa2a1269784092f1d5fb416bcbc86a930ab914a0ca0568092294df1f46615ff4ad9a415ef3d0d65d9c52ab45a7e7f53000102bdadce3c1c8f8ed904c133a656bbb66a699a1def031de3e63b93112024159bb2d8e4b6cb092c00300404", 0xc9}, {&(0x7f0000002080)="0f1b88617ba728425ef8a786dd700a5c07ba88ba1b2b2e576e5ba3f3246a4360102ae65e08193a075d2cbb45634026a5fa2ce189615f55033e7e12c4b8089bb70e751130ceed3aed8394c4171f65c84e6daaea8ea31cc0340e05d8e63155b8b1168212ab44816c4d819d299dcb520dee287b17e72092320cb921897030dcf63047ade565862caff0a447a079a99adfe2eace6907fcaebae5468073fe", 0x9c}], 0x6, &(0x7f00000021c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x2cd0}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x81}}], 0x30}}, {{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000002200)="0861a6dcff75f068dbbeea4b4163dc382a4228926fc6060f387b66d687cad845ebf2fb332dd7e8bbe6f604665cff4ea08fb2ae6f8dd8c480bc12111f41669b3b2fadcdb801c18a1fdb64fb48ea56d4b0fc7cde561763dd8b9318798375476d4ad1df3747fd98b95aaf37d279f089258bc453c6d6431808e8261197df0296c3c2c278ea606302ac79316e391be04a5e39221b8b4d89f2f355fab4abe5ae598b36ec029c32aa4fa2abe2de7a717a6e8c3c3334e26051fa3ab594d959c7611e7762fe9dcbcd33db84194939947ee4bd33bc0189fdfcbe14717359c48162c976580a6fc75de9d8520952c276c2ff5f96", 0xee}, {&(0x7f0000002300)="660206ddc048", 0x6}, {&(0x7f0000002340)="b88ee1beee9be99e7b26cc924a54f9a9b8be315a24a45d8a1fd687d4746a067a91a5ab1896634ae18be8bdad71b787cec61a13b65c7d14132e541663f55dcc768ec1c0e2d0e496c071059671d649c35911b4c067fd20445fcb2c6c187d47a58495a6d934637507", 0x67}, {&(0x7f00000023c0)="a3085744a19362", 0x7}], 0x4, &(0x7f0000002440)=[@pktinfo={{0x24, 0x29, 0x32, {@remote}}}, @dstopts={{0xe0, 0x29, 0x37, {0x1d, 0x18, '\x00', [@jumbo, @generic={0x7f, 0x4a, "6c31e1b2c596cd469f95be995684d4cdb92e14052b478b7e8df6890297c4c66d0fd4325e2f6095d9312c13b53ee635f93489b86a8ba33e04451fa4f8f5e984adbf26919c06faf889783f"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x20, 0x8, [0x80000000, 0x1]}}, @jumbo={0xc2, 0x4, 0x7}, @pad1, @enc_lim={0x4, 0x1, 0xfa}, @calipso={0x7, 0x30, {0x1, 0xa, 0x6f, 0xfffa, [0x1000, 0x0, 0x53, 0x8, 0xff]}}, @hao={0xc9, 0x10, @mcast2}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}], 0x108}}, {{&(0x7f0000002580)={0xa, 0x4e21, 0x2, @empty, 0x8}, 0x1c, &(0x7f00000038c0)=[{&(0x7f00000025c0)="02e35f0530bc4165b969275c40c8b1e5d906b031560581eb3bcaa25d81580690d0d609b66d8db72f0f7eceaa188fbf0769ea1d00d0229d5369e6d4596dd82edf6a93d4ca4ec5a77651712d74c8974ea19c0fb3e6a7608f7f7e988fd1be7122949f6e2ba2692b91e3825eee5b1989a27b1a390eda5aa61296765e2e928bdc4b88b7d6be1fc04e0c3062e7560d2d45b690d4ec1a7082e90987675efa36f27133790a140abea740ae9d51516e02d7c72fbaf58150fe303148e18ff541509b544d95825ddb762a6d39439bc60219798678481bdf5a17ef000dd30454f4d484a7d5f666b5f109d57c40d3660254d16b5e15e3988ab5", 0xf3}, {&(0x7f00000026c0)="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", 0x1000}, {&(0x7f00000036c0)="d381634515f828b7bd3e830bba9fb3dc68c1d0536ccc18819ea4569c6ef6f3dc788824c1f3a2db4af2b3a3079b5c07c7b08946440ec9f20ca27c1d233b3b695771efcde46e6c9ba063606cc9bf0d05c4fb0e0b783c", 0x55}, {&(0x7f0000003740)="21d78f3227d7a9a54833d68369ad2c5330e5d37afee489c4e476fdb8daeb09c982d4780ad88ea8c86fe753ad0383852b045911ab481ae2e970ec4f40aa467a1eb4f8c4f3dddf4bc16c8b21b1603c65602732689770398bf9929a929a656d825f60cf55a098a12b674764868caefc88dd6944bea4fd3e689159634b2432d11a80db564b", 0x83}, {&(0x7f0000003800)="ef7758f082e76ec26eb65d2f", 0xc}, {&(0x7f0000003840)="195f106821cdd48460ae1190868abf084652f1cc33a026dac6a5ccaab20e76e64941b2d02938ce4bfcb27e22e160aaabe754be57daef1dc929a21ad026c38d092179871588871bb746a19ccfb6edf70e3b60220ea6", 0x55}], 0x6, &(0x7f0000003940)=[@flowinfo={{0x14, 0x29, 0xb, 0x2}}], 0x18}}, {{&(0x7f0000003980)={0xa, 0x4e20, 0x80000000, @remote, 0x231}, 0x1c, &(0x7f0000003f40)=[{&(0x7f00000039c0)="85f610a03add40253b8506ebf202372a9cf8a95b1d33c0607e38d465331a94c0787618caa5319c3db8799846318ec28980c45d89e978cb3b149d1f8e03910ffa0fcfa13faf107eaf0d6ad78308b69e6558437be86a6fac1824c9a26ad1a990339514457f4ba240c04cc5115ac46bc705e20ff5e779d3195f3ce7f86c38f2c021c93972b9147c5d1c5d375fb63094a5c754bd49617060be8d23f79c886bfaad9c447be4b31cbc4597b2eecfb454a394a3d2d6f972ba7c7119cb48d2b24c7301ca3de8faf7", 0xc4}, {&(0x7f0000003ac0)="2e2a03604073474bf335bb866fe8b0dfda17f11419f7802b0077442f72f06c463e5c43ed3feef99b2984ce4a885c0d9bfc0f938369c598374261e9eea6c688f35694174795949d1b7a60f4ec037db26565e62f27e136e4b6da313855b122cebc07a48c02c671d596b2e3b4b1822116216a2126e533e794ee2f533fd1624de487d6b350c7dc1224699f2d37a74ae4f7445532771703d7389c71df572705ac4ee5a9d1ffb5ab33537e093e6da3ee47bb8a936e50499686c9c5d9b02a2ad8d0eac069a0e62e738beceb8414a719", 0xcc}, {&(0x7f0000003bc0)="077fcdbd73c41658c60e5fc4f6d55a03fa512888651fe7ccc9033cdc1d0f1a6321cc2360eb5891bde75348d014610313e0bd3dfe1aed3327ca4c26a6f5e96f5dc34e1698c6cef7d076001b8ad5e57f50d2acaf9b51c32b8707b6c0808a8163bda0e6643609920c99aba9a06b178c3a2c36d4cb5b9035e8e87998ec0cd143651e63", 0x81}, {&(0x7f0000003c80)="40e9af65c3de076a15668b923aed809e76c97e059ba3d14074b5d4317502cd891776d011b8237ca4bbec9cbae1a0f56234c02ca5ea1e7d4629f195d32532513064c65336e9ef953dd7e127241d80db39620a060e62396a89b245386daf", 0x5d}, {&(0x7f0000003d00)}, {&(0x7f0000003d40)="c814f77f56384820e4f8420c06967a254852459d0eb313519b25d406bf7531049ae6fb54b5e6c8cff93014e9a4417c7bb5be1f51dbac6044061c1f1bcaf236c977ff5e18825c68b15a246d9235bbb0c459c3ca623eb78e351c731ca4366b52e0f3489386985f0965cd792086754ef7639c98cabd65eb46453edef5a34c23bdbdd9244b31a433a63ea95453d534ea5e36a03d7e8099ddd208ac45021c9d0ddda9e9b2b680e604d515324d8de7d49eb430fb59f99a8ed9fe176b6d51de95b76d4aaa0613e801", 0xc5}, {&(0x7f0000004d40)="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", 0x1000}, {&(0x7f0000003e40)="a378dc0b9c9cd5077c76e922a5f62586763a44ded73ab1f5f544c4d66f6de2f2c9f4fbe0f6ea2b5d6ab83e9d67c8e20b8912fc2b4040382980668a24a02941bbed38a73c14d6cffa90449c114161598194bf4adb0a1c94a6f836a619eb2f681a4a42e608e1d4", 0x66}, {&(0x7f0000003ec0)="fcbd136cb2ec88b19bd07f89482677825d22b3188a430126b58a516331c63439ff8811215e026d0c0aad5decc7c7977aeeb9dff13ef94e13daa211c60805803186856087d9b5440ff0209087931579fbc4", 0x51}], 0x9, &(0x7f0000004000)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x10001}}, @hoplimit={{0x14, 0x29, 0x34, 0x26}}, @dstopts={{0x18, 0x29, 0x37, {0x4}}}], 0x48}}, {{&(0x7f0000004080)={0xa, 0x4e20, 0x4, @mcast2, 0x100}, 0x1c, &(0x7f0000004340)=[{&(0x7f00000040c0)="96d5161ce1f630d4adfa2828daaef9c5b3e80ded3d0789f537fcfa5a09f85fb1f5980d1d85c98d09440d65338e556170ab0cbc8cce5cb155718a788ffb8cea691975ee314eb2723f145d2cba1080abb910f488eef8d12c79ca9e399a11866695b06542c0cbce6ff9bd12d3489ac0bf63bacd2a1a5ed2c4277da226d819d90645ce3f82f2e8249586959dcf6ee798de85b3377e592da381a8e98e44cf5c5d311a4229ff7f", 0xa4}, {&(0x7f0000004180)="ef8dc757f31963dbd8ddd10653ee5dfc54151739f0e63e15b30a3aa29031ab1fffdac1661497843526234c", 0x2b}, {&(0x7f00000041c0)="d2741a2b19d167a4208485e95e9064b28f0c0953ef0d57eb6836265f21371c510840c9e79e8d4b99cb1767379b1cce948fe5cfacbd1b50d63f870329a3b825d1d80b4ffee27782fb7010a1c949b3ff98ebc40781a3f13c7190362e12f2792a9a073bdfb2390c3ab6b3130418149778f6045c27bb9eb82e3805ea139445ca90cd82d7970f8871cf98105e1fcb665bf2f4cf95f127a14b96d8fec35887742da86344aa7a9559e7dac511aae109b0f3b1919816a3feb7531ccd5d9ddcb43b2175bcdd20767d80c82cd89fd67bed7b1a89e33fa0ade929c76d4fc2e856", 0xdb}, {&(0x7f00000042c0)="bb6d35336704649752845d00ec1a3f2b88e8ada7d85e31acdfe91de52e9f3aa2bcda749127e0ae2e2d6594414992d539f20877a3f3a3733f49ea0242389e73a2928b68195e6d85b54290ebf14847bd24a4285bb69db6ae6625c58785f75975946be16f32f695b5c39b82", 0x6a}], 0x4, &(0x7f0000004900)=[@hopopts={{0x48, 0x29, 0x36, {0x21, 0x5, '\x00', [@ra={0x5, 0x2, 0x3f}, @ra={0x5, 0x2, 0x8000}, @enc_lim={0x4, 0x1, 0x9}, @calipso={0x7, 0x10, {0x3, 0x2, 0x0, 0x2, [0x1]}}, @jumbo={0xc2, 0x4, 0x7}, @jumbo={0xc2, 0x4, 0xf835}, @jumbo={0xc2, 0x4, 0x1}]}}}, @tclass={{0x14, 0x29, 0x43, 0x5}}, @rthdr={{0x58, 0x29, 0x39, {0x29, 0x8, 0x1, 0x2, 0x0, [@local, @private0={0xfc, 0x0, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @remote}, @remote]}}}, @hopopts={{0xa8, 0x29, 0x36, {0x62, 0x11, '\x00', [@jumbo={0xc2, 0x4, 0x9}, @hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x40, {0x2, 0xe, 0x1, 0x5, [0x7ff, 0x100000000, 0x5, 0x100000001, 0xef7, 0x3ff, 0x5]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x28, {0x1, 0x8, 0x4, 0x8001, [0x7, 0x1, 0x1f, 0x80]}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8001}}, @dontfrag={{0x14, 0x29, 0x3e, 0x80000001}}, @tclass={{0x14, 0x29, 0x43, 0xfffffffa}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @dstopts_2292={{0x38, 0x29, 0x4, {0xbb, 0x3, '\x00', [@jumbo={0xc2, 0x4, 0x252b}, @calipso={0x7, 0x10, {0x1, 0x2, 0x2, 0x2, [0x7f]}}, @ra={0x5, 0x2, 0x8}]}}}], 0x1f8}}], 0x7, 0x4000899) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000004400)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff}}, './file0\x00'}) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000004440)={0x3, 0x9, 0x1, 0x7}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}, 0xe00}, {{&(0x7f0000000280)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f00000014c0)=[@ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @dev}}}], 0x30}}], 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000000c0)={@private2, 0x12, r4}) 03:10:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9a%\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:10:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15tU\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:10:50 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:50 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 36) [ 670.955160] loop7: detected capacity change from 0 to 135266304 03:10:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9a*\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 670.983767] loop0: detected capacity change from 0 to 135266304 03:10:50 executing program 4: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"c3a18076876f03de81bf7c156b0ef40c", 0x0, 0x0, {0x0, 0xed}, {0x276, 0x1000}, 0x100, [0xfb, 0x5, 0x85d, 0x3f, 0x1, 0x10001, 0xffffffffffffffff, 0xfffffffffffff628, 0x3, 0x3635, 0x9, 0x7ff, 0x8, 0x4, 0x20000000000000, 0x408a115f]}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000200)={{}, r0, 0x12, @inherit={0x48, &(0x7f0000000000)={0x1, 0x0, 0x1, 0x200000002, {0xd, 0x9, 0x368b, 0x8}}}, @subvolid=0xfffffffffffffffd}) syz_emit_ethernet(0x2a, &(0x7f0000000080)=ANY=[@ANYBLOB="b3aaaaaaaaaa2c89da2d9e98080600010800060400010180c2000000ac1e00010180c2000000726700bcee14002cf61e2b53"], 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) [ 671.082989] FAULT_INJECTION: forcing a failure. [ 671.082989] name failslab, interval 1, probability 0, space 0, times 0 [ 671.085672] CPU: 0 PID: 6489 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 671.087238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.089131] Call Trace: [ 671.089738] dump_stack+0x107/0x167 [ 671.090577] should_fail.cold+0x5/0xa [ 671.091450] ? create_object.isra.0+0x3a/0xa30 [ 671.092493] should_failslab+0x5/0x20 [ 671.093448] kmem_cache_alloc+0x5b/0x310 [ 671.094371] create_object.isra.0+0x3a/0xa30 [ 671.095360] kmemleak_alloc_percpu+0xa0/0x100 [ 671.096363] pcpu_alloc+0x4e2/0x1240 [ 671.097210] ? io_async_queue_proc+0x80/0x80 [ 671.098196] percpu_ref_init+0x31/0x3d0 [ 671.099092] io_rsrc_node_switch_start.part.0+0x6a/0x250 [ 671.100302] io_uring_setup+0x14f6/0x2980 [ 671.101235] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 671.102375] ? wait_for_completion_io+0x270/0x270 [ 671.103473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 671.104643] ? syscall_enter_from_user_mode+0x1d/0x50 [ 671.105798] do_syscall_64+0x33/0x40 [ 671.106651] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 671.107803] RIP: 0033:0x7fca3e213b19 [ 671.108631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.112772] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 671.114474] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 671.116071] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 671.117666] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 671.119280] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 671.120872] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:10:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:10:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 671.358968] loop1: detected capacity change from 0 to 135266304 [ 684.485415] FAULT_INJECTION: forcing a failure. [ 684.485415] name failslab, interval 1, probability 0, space 0, times 0 [ 684.489672] CPU: 0 PID: 6509 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 684.491875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 684.494107] Call Trace: [ 684.494824] dump_stack+0x107/0x167 [ 684.495796] should_fail.cold+0x5/0xa [ 684.496818] ? percpu_ref_init+0xd8/0x3d0 [ 684.497932] should_failslab+0x5/0x20 [ 684.498943] kmem_cache_alloc_trace+0x55/0x320 [ 684.500156] ? io_async_queue_proc+0x80/0x80 [ 684.501323] percpu_ref_init+0xd8/0x3d0 [ 684.502397] io_rsrc_node_switch_start.part.0+0x6a/0x250 [ 684.503826] io_uring_setup+0x14f6/0x2980 [ 684.504935] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 684.506294] ? wait_for_completion_io+0x270/0x270 [ 684.507610] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 684.508986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 684.510368] do_syscall_64+0x33/0x40 [ 684.511349] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 684.512690] RIP: 0033:0x7fca3e213b19 [ 684.513671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.516945] loop5: detected capacity change from 0 to 135266304 [ 684.518500] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 684.518532] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 684.518545] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 684.518558] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 684.518571] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 684.518583] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:11:04 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 37) 03:11:04 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:04 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x110, r0, 0x10000000) syz_io_uring_setup(0x52dd, &(0x7f00000003c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_TEE, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0xc2d, 0x0, 0x0, {0x0, r5}}, 0x10000) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd_index=0x6, 0x0, 0x0, 0x0, 0x1, 0x1, {0x0, r5}}, 0x101) r6 = socket$unix(0x1, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x7, 0x1, 0x0, {0x0, r5, r6}}, 0x8) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 03:11:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9a+\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:11:04 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:04 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 38) [ 684.566482] loop1: detected capacity change from 0 to 135266304 [ 684.610130] loop0: detected capacity change from 0 to 135266304 03:11:04 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f00000001c0)={0x2, 0x100}) lseek(r1, 0x0, 0x4) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000080)={{0x0, 0x3, 0x7f, 0x0, 0x2}, 0xfffffffffffffffd, 0x3ff, 0x6}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x8401, &(0x7f0000000140)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3f}}, {@nodiscard}, {@sb={'sb', 0x3d, 0x6}}]}) [ 684.653638] loop6: detected capacity change from 0 to 135266304 03:11:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9a-\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:11:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:04 executing program 5: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)='\a', 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x0) pwritev2(r1, &(0x7f0000000140)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1, 0x100009, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x108000}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1a, &(0x7f0000003d40), 0x4) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000080)={0x97dd, 0x8bb1, 0x0, 0x1, 0x1}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="0d596d3294231ae552c4b3c65bbeeaaf41d2b5cb00c0cedec9949b36e1bfeb9040e6e29f4d6acebc676b943e2ddb9c2f7483b0aaa8505cf1ce6f937e1a737a723818487c373df39ba7ab4433a94273b76c97c0e536f952b386909b4faaeb5beb0656f6799bfabf55acfe46c5bdf5d2a6c13405ba0a75a95b12fbf65c13b403d1a72ee1f0cb153e3dd2a0b30f69890b7775ea61e98c4079c5d1a3d130447be96ed89e025f435089d5a4f799ce7504c6536e385545e4dac93583a1da581ebcfd224333b6994a813887c402afcc708453f5790a82346e3ed2d74455da1441", 0xdd, 0x20004084, &(0x7f0000000100)={0x11, 0x9, 0x0, 0x1, 0x8, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}}, 0x14) r3 = socket$inet_icmp(0x2, 0x2, 0x1) copy_file_range(r0, 0x0, r3, 0x0, 0xffffff7fffffff21, 0x0) 03:11:04 executing program 4: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwrite64(r0, &(0x7f0000000180)="af", 0x1, 0x0) pwrite64(r0, 0x0, 0x0, 0x10000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1/file0\x00', 0x0, 0xa8) write(r1, &(0x7f0000000240)="01", 0x1) [ 684.784387] FAULT_INJECTION: forcing a failure. [ 684.784387] name failslab, interval 1, probability 0, space 0, times 0 [ 684.785738] CPU: 1 PID: 6543 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 684.786547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 684.787508] Call Trace: [ 684.787817] dump_stack+0x107/0x167 [ 684.788244] should_fail.cold+0x5/0xa [ 684.788683] ? create_object.isra.0+0x3a/0xa30 [ 684.789210] should_failslab+0x5/0x20 [ 684.789649] kmem_cache_alloc+0x5b/0x310 [ 684.790130] create_object.isra.0+0x3a/0xa30 [ 684.790636] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 684.791220] kmem_cache_alloc_trace+0x151/0x320 [ 684.791755] ? io_async_queue_proc+0x80/0x80 [ 684.792260] percpu_ref_init+0xd8/0x3d0 [ 684.792718] io_rsrc_node_switch_start.part.0+0x6a/0x250 [ 684.793341] io_uring_setup+0x14f6/0x2980 [ 684.793821] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 684.794411] ? wait_for_completion_io+0x270/0x270 [ 684.794981] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 684.795581] ? syscall_enter_from_user_mode+0x1d/0x50 [ 684.796177] do_syscall_64+0x33/0x40 [ 684.796605] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 684.797165] RIP: 0033:0x7fca3e213b19 [ 684.797593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.799719] RSP: 002b:00007fca3b768108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 684.800595] RAX: ffffffffffffffda RBX: 00007fca3e327020 RCX: 00007fca3e213b19 [ 684.801412] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 684.802236] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 684.803054] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 684.803843] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 684.807168] loop7: detected capacity change from 0 to 135266304 03:11:04 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 39) 03:11:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9a.\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 684.903843] loop1: detected capacity change from 0 to 135266304 [ 684.917687] FAULT_INJECTION: forcing a failure. [ 684.917687] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 684.919297] CPU: 1 PID: 6557 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 684.920077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 684.921031] Call Trace: [ 684.921340] dump_stack+0x107/0x167 [ 684.921753] should_fail.cold+0x5/0xa [ 684.922200] _copy_to_user+0x2e/0x180 [ 684.922645] io_uring_setup+0x11b5/0x2980 [ 684.923121] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 684.923692] ? wait_for_completion_io+0x270/0x270 [ 684.924253] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 684.924846] ? syscall_enter_from_user_mode+0x1d/0x50 [ 684.925431] do_syscall_64+0x33/0x40 [ 684.925859] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 684.926445] RIP: 0033:0x7fca3e213b19 [ 684.926866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.928938] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 684.929802] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 684.930617] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 684.931422] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 684.932227] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 684.933031] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:11:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ftruncate(0xffffffffffffffff, 0x9) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x6000, 0x2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'wg2\x00'}) write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r2, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x2aa00, 0x0) syz_io_uring_setup(0x7806, &(0x7f0000000480)={0x0, 0x55d3, 0x0, 0x3, 0x194}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x1000, 0xe}, 0x0) syz_io_uring_complete(r3) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x81) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) getgroups(0x4, &(0x7f0000000280)=[r1, r1, 0xffffffffffffffff, r1]) fchownat(r5, &(0x7f0000000240)='./file0/file0\x00', r0, r6, 0x1000) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000140)) lseek(0xffffffffffffffff, 0x0, 0x1) acct(0x0) unshare(0x4a060400) 03:11:05 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) syz_emit_ethernet(0x66, &(0x7f0000000140)={@link_local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00G\x00', 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "47e5ac", 0x0, 0x0, 0x0, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}}, 0x0) 03:11:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9a0\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:11:05 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000140)="afc9", 0x2, 0xffffff) pipe(&(0x7f0000000040)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) mq_notify(r3, &(0x7f00000000c0)={0x0, 0x21, 0x4, @thr={&(0x7f0000000180)="811c2a19c614998eb81dafbf3f62852002b4e4594e6528d18522b7c8de9bdd463d52bfc09b2ff983537c0e2eead56811576d09cfdedfcf58b9b380b811d2ef88744f74ba4718e804202e06f3ec3c8372374f898c696ab8120cf9a25c33eb50ec4ae89eb91d24c3ee91a51173ce8bf96724a3224d4745bcdf4034d2f047c40f75fce215cc9d3e9c8ecc0cd638513995aab2c1a8bcff665fd225359e08fd8a335b52f092dae790b644feb2c8d2c42729064f6b5bc1ef76355bbd36c019685b66407d635653697c182d36e1de1f34f33eab176227f3ee9128be08977f02eb", &(0x7f0000001300)="7b20a0b48aa4b6ab120199565fc398d69a283d150bb16e59a68d8523d1d2edfd5f539620c5ce77819a475840613b25d1631be3f0df6b538876388c16c9cd462fa11ddb4e1a8481e10e1f6b9f558395721012d67faa048a552cb616a36e5bf54e548cf3a1720bf4aff0290dc6ca93c0929974ff21125205eb6c9724fd1bcb938f329c867c1f32590f5cd86ada7abe62a651d026d756b4523eeb543147aa4b9ac1a07145161336f5f10fd8d9ef54dcfe0e9b4475047d573ca4ff1ff17aa64412543d3a562145b1e4335bb99cec4e321e91481b2c9027a5e46025bfa15ebfcbe4e2edfd30e95b671a597e8121328debc6"}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x0, 0x3ba4141e, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000080)={&(0x7f0000000300)=""/4096, 0x1000, 0x80, 0x1e41b763}) 03:11:05 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 40) [ 685.131942] loop7: detected capacity change from 0 to 135266304 03:11:05 executing program 5: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000000)={'macvlan1\x00', 0x703c}) r0 = syz_io_uring_setup(0x4, &(0x7f0000000740), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2fd1, 0x0, 0x0, 0x0, 0x0) dup3(r0, r3, 0x0) 03:11:05 executing program 6: r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_setup(0x7806, &(0x7f0000000480)={0x0, 0x55d3, 0x0, 0x3, 0x194}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x1000, 0xe}, 0x0) syz_io_uring_setup(0x52dd, &(0x7f00000003c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_TEE, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0xc2d, 0x0, 0x0, {0x0, r10}}, 0x10000) syz_io_uring_submit(r8, r9, &(0x7f0000000080)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd_index=0x6, 0x0, 0x0, 0x0, 0x1, 0x1, {0x0, r10}}, 0x101) syz_io_uring_submit(r6, r2, &(0x7f0000000040)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x5, 0x0, 0x0, 0x0, 0x31713, 0x0, 0x0, 0x1, {0x0, r10}}, 0xfffffff8) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 685.210187] FAULT_INJECTION: forcing a failure. [ 685.210187] name failslab, interval 1, probability 0, space 0, times 0 [ 685.213141] CPU: 0 PID: 6589 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 685.214730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 685.216585] Call Trace: [ 685.217195] dump_stack+0x107/0x167 [ 685.218044] should_fail.cold+0x5/0xa [ 685.218924] ? __d_alloc+0x2a/0x990 [ 685.219760] should_failslab+0x5/0x20 [ 685.220634] kmem_cache_alloc+0x5b/0x310 [ 685.221574] __d_alloc+0x2a/0x990 [ 685.222376] ? find_held_lock+0x2c/0x110 [ 685.223312] d_alloc_pseudo+0x19/0x70 [ 685.224184] alloc_file_pseudo+0xce/0x250 [ 685.225131] ? trace_hardirqs_on+0x5b/0x180 [ 685.226124] ? alloc_file+0x5a0/0x5a0 [ 685.227016] anon_inode_getfile+0xc8/0x1f0 [ 685.227992] io_uring_setup+0x138b/0x2980 [ 685.228952] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 685.230119] ? wait_for_completion_io+0x270/0x270 [ 685.231250] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 685.232454] ? syscall_enter_from_user_mode+0x1d/0x50 [ 685.233640] do_syscall_64+0x33/0x40 [ 685.234501] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 685.235674] RIP: 0033:0x7fca3e213b19 [ 685.236526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.240749] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 685.242498] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 685.244133] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 685.245767] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 685.247411] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 685.249045] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 685.304805] perf: interrupt took too long (16227 > 16217), lowering kernel.perf_event_max_sample_rate to 12000 03:11:05 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 41) 03:11:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9aX\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 685.391829] FAULT_INJECTION: forcing a failure. [ 685.391829] name failslab, interval 1, probability 0, space 0, times 0 [ 685.393146] CPU: 1 PID: 6602 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 685.393934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 685.394867] Call Trace: [ 685.395175] dump_stack+0x107/0x167 [ 685.395582] should_fail.cold+0x5/0xa [ 685.396005] ? create_object.isra.0+0x3a/0xa30 [ 685.396526] should_failslab+0x5/0x20 [ 685.396957] kmem_cache_alloc+0x5b/0x310 [ 685.397419] create_object.isra.0+0x3a/0xa30 [ 685.397920] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 685.398498] kmem_cache_alloc+0x159/0x310 [ 685.398970] __d_alloc+0x2a/0x990 [ 685.399359] ? find_held_lock+0x2c/0x110 [ 685.399816] d_alloc_pseudo+0x19/0x70 [ 685.400245] alloc_file_pseudo+0xce/0x250 [ 685.400713] ? trace_hardirqs_on+0x5b/0x180 [ 685.401201] ? alloc_file+0x5a0/0x5a0 [ 685.401644] anon_inode_getfile+0xc8/0x1f0 [ 685.402139] io_uring_setup+0x138b/0x2980 [ 685.402610] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 685.403186] ? wait_for_completion_io+0x270/0x270 [ 685.403746] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 685.404343] ? syscall_enter_from_user_mode+0x1d/0x50 [ 685.404939] do_syscall_64+0x33/0x40 [ 685.405362] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 685.405956] RIP: 0033:0x7fca3e213b19 [ 685.406377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.408342] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 685.409203] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 685.410022] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 685.410829] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 685.411629] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 685.412438] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:11:25 executing program 0: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xffffffffffffff9f) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='fdinfo/4\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x806c2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000380)=0x1, 0x3fc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000001f0000000200"/20], 0x14}}, 0x0) r2 = syz_io_uring_setup(0x29, &(0x7f0000000080)={0x0, 0x5236, 0x10}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) eventfd(0x0) syz_io_uring_setup(0x51d3, &(0x7f00000003c0)={0x0, 0xd912, 0x4, 0xffffffff, 0x29d}, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000140), &(0x7f0000000300)) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL={0xe, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x4) io_uring_enter(r2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0) r5 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) copy_file_range(0xffffffffffffffff, 0x0, r6, 0x0, 0x8707, 0x0) mq_timedsend(r5, 0x0, 0xff7f, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r5, @out_args}, './file1\x00'}) fcntl$setstatus(r1, 0x4, 0x6400) write(r1, &(0x7f0000001200), 0xffffff45) 03:11:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:25 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x7f, 0x5}, {0x5, 0x0, 0x1, 0x3}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000800)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000740)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101982, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) fallocate(r1, 0x1, 0x76, 0x3) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xa9, 0x12, 0x1d, 0x19, "6e60147ae2fcdc3f1d52584aebeafaa0edd69266edf29bbff612a7a730c97b72b322d0b8aff13a679593d52a3c987ef7c88e49e70f44c10f719a7c0f41774981", "f8258a6ec00c2423b3415e80f5dcc6b04bdfa5322086b2c40bc141347fe2216a", [0x100000001, 0x9]}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x220000, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0xfff, 0x0, 0x13, 0x0, "a33ffde15ac5e3597997ca8986bc6d30fb365a162412350d2dbb5f02e4b9158f3b699d557e93639a919a636fc399cb69327ad1688070049903904fc96628577b", "2f87934459fd43a9829984709a2e821126913d74f3d1ad8285ca2e3a4a403d99", [0xffff, 0x80]}) creat(&(0x7f0000000040)='./file1\x00', 0xc8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000500)=ANY=[@ANYBLOB="9789cdc1a58bb7b4ce6b91f3a41ae2f452523a45992fbb476b7ba2f081093dc89803cc6745a634a85feaf8f2cd4ec14543c88d990c72ba873c4073a7537a63495141fd6432925ef7240019f7bd2bc2541505748aaf5c8bad5ffbb966b332d87a3c99b80c16f31f280431ef91e60329d436f717ae3ab682c864079f1cdfddc7601028ab42fca994a645a9ace67ba6bb51e46ee029c098ab25d77ca121e4d454aa8515aa58f206340b"]) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file1\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_FALLOCATE={0x11, 0x5, 0x0, @fd=r3, 0xc7ab, 0x0, 0x1000, 0x0, 0x1}, 0x9) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) acct(&(0x7f00000001c0)='./file1\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x2, 0x0) 03:11:25 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 42) 03:11:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r8 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r8, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r10}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r10}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x20000810) 03:11:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ac\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:11:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:25 executing program 6: r0 = socket$unix(0x1, 0x0, 0x0) io_setup(0x5, &(0x7f0000000700)=0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) io_destroy(r1) io_setup(0x200, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)=ANY=[]) r2 = socket$netlink(0x10, 0x3, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@file={0x1, './file0\x00'}, 0x6e) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)={0x18, 0x2011, 0x300, 0x0, 0x0, {0x3}, [@nested={0x4, 0x4}]}, 0x18}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0xffffffffffffff03, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="14007ceeffff0f0002", @ANYRES64, @ANYRES16=r0, @ANYRES64=r1], 0x14}, 0x1, 0x0, 0x0, 0x24008045}, 0x0) socket(0x5, 0x802, 0x7) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) io_submit(0x0, 0x0, &(0x7f00000000c0)) io_getevents(r1, 0x0, 0x0, 0x0, 0x0) [ 705.457358] FAULT_INJECTION: forcing a failure. [ 705.457358] name failslab, interval 1, probability 0, space 0, times 0 [ 705.460499] CPU: 0 PID: 6626 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 705.462379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 705.464652] Call Trace: [ 705.465377] dump_stack+0x107/0x167 [ 705.466404] should_fail.cold+0x5/0xa [ 705.467458] ? __alloc_file+0x21/0x320 [ 705.468530] should_failslab+0x5/0x20 [ 705.469573] kmem_cache_alloc+0x5b/0x310 [ 705.470696] __alloc_file+0x21/0x320 [ 705.471717] alloc_empty_file+0x6d/0x170 [ 705.472829] alloc_file+0x5e/0x5a0 [ 705.473804] alloc_file_pseudo+0x16a/0x250 [ 705.474974] ? alloc_file+0x5a0/0x5a0 [ 705.475837] anon_inode_getfile+0xc8/0x1f0 [ 705.476993] io_uring_setup+0x138b/0x2980 [ 705.478011] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 705.479184] ? wait_for_completion_io+0x270/0x270 [ 705.480524] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 705.481799] ? syscall_enter_from_user_mode+0x1d/0x50 [ 705.483225] do_syscall_64+0x33/0x40 [ 705.484254] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 705.485661] RIP: 0033:0x7fca3e213b19 [ 705.486691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.491753] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 705.493847] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 705.495806] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 705.497742] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 705.499713] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 705.501669] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 705.532809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8209 sclass=netlink_route_socket pid=6634 comm=syz-executor.6 03:11:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ai\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 705.656877] loop7: detected capacity change from 0 to 135266304 [ 705.674652] loop1: detected capacity change from 0 to 135266304 03:11:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r8 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r8, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r10}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r10}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x20000810) [ 705.695107] Process accounting resumed 03:11:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r8 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r8, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r10}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r10}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x20000810) 03:11:25 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 43) [ 705.871091] Process accounting resumed 03:11:25 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x7f, 0x5}, {0x5, 0x0, 0x1, 0x3}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000800)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000740)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101982, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) fallocate(r1, 0x1, 0x76, 0x3) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xa9, 0x12, 0x1d, 0x19, "6e60147ae2fcdc3f1d52584aebeafaa0edd69266edf29bbff612a7a730c97b72b322d0b8aff13a679593d52a3c987ef7c88e49e70f44c10f719a7c0f41774981", "f8258a6ec00c2423b3415e80f5dcc6b04bdfa5322086b2c40bc141347fe2216a", [0x100000001, 0x9]}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x220000, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0xfff, 0x0, 0x13, 0x0, "a33ffde15ac5e3597997ca8986bc6d30fb365a162412350d2dbb5f02e4b9158f3b699d557e93639a919a636fc399cb69327ad1688070049903904fc96628577b", "2f87934459fd43a9829984709a2e821126913d74f3d1ad8285ca2e3a4a403d99", [0xffff, 0x80]}) creat(&(0x7f0000000040)='./file1\x00', 0xc8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000500)=ANY=[@ANYBLOB="9789cdc1a58bb7b4ce6b91f3a41ae2f452523a45992fbb476b7ba2f081093dc89803cc6745a634a85feaf8f2cd4ec14543c88d990c72ba873c4073a7537a63495141fd6432925ef7240019f7bd2bc2541505748aaf5c8bad5ffbb966b332d87a3c99b80c16f31f280431ef91e60329d436f717ae3ab682c864079f1cdfddc7601028ab42fca994a645a9ace67ba6bb51e46ee029c098ab25d77ca121e4d454aa8515aa58f206340b"]) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file1\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_FALLOCATE={0x11, 0x5, 0x0, @fd=r3, 0xc7ab, 0x0, 0x1000, 0x0, 0x1}, 0x9) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) acct(&(0x7f00000001c0)='./file1\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x2, 0x0) [ 705.927262] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8209 sclass=netlink_route_socket pid=6634 comm=syz-executor.6 03:11:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r3, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9al\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 706.023506] FAULT_INJECTION: forcing a failure. [ 706.023506] name failslab, interval 1, probability 0, space 0, times 0 [ 706.026178] CPU: 0 PID: 6679 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 706.027725] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 706.029600] Call Trace: [ 706.030229] dump_stack+0x107/0x167 [ 706.031066] should_fail.cold+0x5/0xa [ 706.031936] ? create_object.isra.0+0x3a/0xa30 [ 706.032970] should_failslab+0x5/0x20 [ 706.033861] kmem_cache_alloc+0x5b/0x310 [ 706.034798] create_object.isra.0+0x3a/0xa30 [ 706.035795] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 706.036956] kmem_cache_alloc+0x159/0x310 [ 706.037909] __alloc_file+0x21/0x320 [ 706.038754] alloc_empty_file+0x6d/0x170 [ 706.039861] alloc_file+0x5e/0x5a0 [ 706.040683] alloc_file_pseudo+0x16a/0x250 [ 706.041827] ? alloc_file+0x5a0/0x5a0 [ 706.042914] anon_inode_getfile+0xc8/0x1f0 [ 706.044078] io_uring_setup+0x138b/0x2980 [ 706.045236] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 706.046630] ? wait_for_completion_io+0x270/0x270 [ 706.047985] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 706.049425] ? syscall_enter_from_user_mode+0x1d/0x50 [ 706.050846] do_syscall_64+0x33/0x40 [ 706.051871] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 706.053275] RIP: 0033:0x7fca3e213b19 [ 706.054305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.059323] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 706.061408] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 706.063389] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 706.065328] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 706.067281] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 706.069223] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 706.091633] loop7: detected capacity change from 0 to 135266304 03:11:26 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r8 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r8, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r10}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r10}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x20000810) [ 706.162660] loop0: detected capacity change from 0 to 135266304 [ 706.300738] Process accounting resumed 03:11:40 executing program 6: syz_io_uring_setup(0x40, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x890c, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@private0, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x9, 0x2, 0x1, 0x8, 0x6, 0x7}, 0x20) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="027701be471a9110a0997ee27f83f9069bd37195f1cc5d665f24f2993e0a15ae74213c2cd10594e6740bebbd79f4c9862aa3ca2c8897d1577c2e2a7c5566d482cae07b98b3c267b2c2f690d746003e32acaae7f44e1c89cd7afd31547ae5b90e93079fd9d831b90e"], 0x190) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@remote, 0x0, r9}) 03:11:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:40 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 44) 03:11:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ao\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:11:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x88000, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)={0x44, r6, 0x201, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r7}, @val={0xc}}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'wg0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}]}, 0x44}}, 0x4) sendmsg$NL80211_CMD_NEW_MPATH(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x7, 0x34}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x400c0}, 0x4040) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r2, @ANYBLOB="080002"], 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r5) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="01002abd7000fddbdf254c0000000c00990031000000420000000c0058f86d00000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0xc040) 03:11:40 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_io_uring_complete(0x0) r1 = epoll_create(0x1) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x80800) syz_io_uring_setup(0x59ee, &(0x7f0000001500)={0x0, 0xf802, 0x8, 0x0, 0x28e}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000003c0), &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="8f4275ba210602000000f952fd0a9bbf00000000", @ANYRES32, @ANYRES64=r0]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xa0000003}) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000180)=0x800, 0x2, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) clone3(&(0x7f0000000580)={0x48000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000240), {0x3f}, &(0x7f00000002c0)=""/158, 0x9e, &(0x7f0000000480)=""/224, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) 03:11:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r8 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r8, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r10}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r10}) [ 720.720969] FAULT_INJECTION: forcing a failure. [ 720.720969] name failslab, interval 1, probability 0, space 0, times 0 [ 720.722671] CPU: 1 PID: 6711 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 720.723628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.724742] Call Trace: [ 720.725115] dump_stack+0x107/0x167 [ 720.725619] should_fail.cold+0x5/0xa [ 720.726159] ? security_file_alloc+0x34/0x170 [ 720.726774] should_failslab+0x5/0x20 [ 720.727276] kmem_cache_alloc+0x5b/0x310 [ 720.727835] security_file_alloc+0x34/0x170 [ 720.728428] __alloc_file+0xb7/0x320 [ 720.728941] alloc_empty_file+0x6d/0x170 [ 720.729501] alloc_file+0x5e/0x5a0 [ 720.729999] alloc_file_pseudo+0x16a/0x250 [ 720.730580] ? alloc_file+0x5a0/0x5a0 [ 720.731114] anon_inode_getfile+0xc8/0x1f0 [ 720.731701] io_uring_setup+0x138b/0x2980 [ 720.732278] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 720.732974] ? wait_for_completion_io+0x270/0x270 [ 720.733654] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 720.734388] ? syscall_enter_from_user_mode+0x1d/0x50 [ 720.735074] do_syscall_64+0x33/0x40 [ 720.735590] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 720.736300] RIP: 0033:0x7fca3e213b19 [ 720.736815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.739377] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 720.740401] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 720.741391] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 720.742372] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 720.743328] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 720.744263] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 720.768479] loop7: detected capacity change from 0 to 135266304 03:11:40 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 45) [ 720.791663] loop1: detected capacity change from 0 to 135266304 03:11:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ap\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 720.862417] FAULT_INJECTION: forcing a failure. [ 720.862417] name failslab, interval 1, probability 0, space 0, times 0 [ 720.863952] CPU: 1 PID: 6726 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 720.864848] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.865900] Call Trace: [ 720.866257] dump_stack+0x107/0x167 [ 720.866737] should_fail.cold+0x5/0xa [ 720.867243] ? create_object.isra.0+0x3a/0xa30 [ 720.867841] should_failslab+0x5/0x20 [ 720.868343] kmem_cache_alloc+0x5b/0x310 [ 720.868879] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 720.869606] create_object.isra.0+0x3a/0xa30 [ 720.870194] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 720.870860] kmem_cache_alloc+0x159/0x310 [ 720.871412] security_file_alloc+0x34/0x170 [ 720.871974] __alloc_file+0xb7/0x320 [ 720.872458] alloc_empty_file+0x6d/0x170 [ 720.872989] alloc_file+0x5e/0x5a0 [ 720.873454] alloc_file_pseudo+0x16a/0x250 [ 720.874009] ? alloc_file+0x5a0/0x5a0 [ 720.874515] anon_inode_getfile+0xc8/0x1f0 [ 720.875066] io_uring_setup+0x138b/0x2980 [ 720.875610] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 720.876267] ? wait_for_completion_io+0x270/0x270 [ 720.876917] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 720.877597] ? syscall_enter_from_user_mode+0x1d/0x50 [ 720.878281] do_syscall_64+0x33/0x40 [ 720.878768] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 720.879436] RIP: 0033:0x7fca3e213b19 [ 720.879918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.882342] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 720.883288] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 720.884220] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 720.885148] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 720.886091] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 720.886977] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:11:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:55 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 46) 03:11:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x88000, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000001c0)={0x44, r6, 0x201, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r7}, @val={0xc}}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'wg0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}]}, 0x44}}, 0x4) sendmsg$NL80211_CMD_NEW_MPATH(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x7, 0x34}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x400c0}, 0x4040) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r2, @ANYBLOB="080002"], 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r5) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="01002abd7000fddbdf254c0000000c00990031000000420000000c0058f86d00000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0xc040) 03:11:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r7 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r7, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) r8 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r9}) 03:11:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:11:55 executing program 6: syz_io_uring_setup(0x40, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x890c, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@private0, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x9, 0x2, 0x1, 0x8, 0x6, 0x7}, 0x20) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="027701be471a9110a0997ee27f83f9069bd37195f1cc5d665f24f2993e0a15ae74213c2cd10594e6740bebbd79f4c9862aa3ca2c8897d1577c2e2a7c5566d482cae07b98b3c267b2c2f690d746003e32acaae7f44e1c89cd7afd31547ae5b90e93079fd9d831b90e"], 0x190) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@remote, 0x0, r9}) 03:11:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9as\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:11:55 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_gettime(0x0, &(0x7f00000002c0)) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x9}, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000240)={0x20080522}, &(0x7f0000000300)={0x800, 0x3, 0x7, 0xd7, 0x8000, 0x6}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_gettime(0x0, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x77359400}, {r1, r2+10000000}}, &(0x7f0000000440)) timer_delete(0x0) timer_gettime(0x0, &(0x7f00000008c0)) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x1, @thr={&(0x7f0000000900)="f97684a461757d17dbd8f325e27bbe2aaaf0be627d4f6cd4b4138989f15cf9314501ce0cf9aed6794958dfbe68911299bbb4ca4b9620433d9c3acfd0d490e50a86f7e9aa28fef776a435aed37fd57556884931c797acee2b35501e2cd5c3569c4ad222a62d39bf9e797a7b0e2b600574c2fea462fc022214b14ca618932821302e0bb15417ebd66febbe123b0b6efd09afd963503d513973", &(0x7f00000009c0)="8b69d6c207c2e7213b0e720e3a4906591219543836a67e91371607c1195f90ed7f6b14511f0dbce32071a606816c0cb7b26cb6ed152295f041bfb15e6b23f3abbb1ef486505a7b69ed8007b90a66bb85c9f4c12f5f7748878959c6b0f026834dd7ac64db61c1f3ded8fdd5e2bf7d69a3e8d40587a6dd6374b070591f7f29afacc7f5b3c4adb79f478329713b9d8c78b66befaa10553211b42a89ee0fff24b76b5dc5abb63f8eb797f801928d8225658d8bf03c8c046878169a3b30e2075ea10416651552"}}, &(0x7f0000000340)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) timer_gettime(r3, &(0x7f0000000880)) sendmsg$inet6(r4, &(0x7f0000000800)={&(0x7f0000000000)={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x6}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000040)="b76586bb9b6f0260011d6a3f7ba2641eac892633a1fd3fd07b030d7d68", 0x1d}, {&(0x7f0000000380)="e417a14225118839f7bd5ddb22491b18365ed4e3e84406c5998d1331f4fb60279514db6dede19575b94b0740092c1377303bca3cdcc5b2728a003e7f89bdd5ab61abfd03f6263c284516bacc65a50eca93d24e1d1f430e76c74e375a765cc04970bc098361c7ea2612d7a8f096b75fbb1de0ef22a114049fc56ec79e9e32c9209b4458e28d0c98dca0b6b47b421100341a22882a47ccda2d5ad63eb4af524d1f89cd3d75ae943f99f83cf5570abb14f64712fb67d9dde7e793220f005908f730809d107f065d9e497116df57d27f036cafba25ac3dca93", 0xd7}, {&(0x7f0000000080)="7560e313c265920c7153de6d93b05e2f38804f13f384057dff44fb576a7ca9a28ea2fe04885749224a990ff29096a5e7f2eaa456c5cbcbe2da98ddb73d629a0453", 0x41}, {&(0x7f0000000480)="f7bb7d5a9974d0aef28e700fd35fabe237d7e09279df9bc6264862a0816160a75df332828409b51329d04e01a7260a94cac538be50de88e9b391d6a760353ee6460ed67923b1bdf48e321b4409fd829943ff067ee877d7da095acc77abd710da64f882b4ebea969ce619a67c5ef429a47c8578cfa7835cfc864d4fc9a1673c8483c7eac2481b5bd362a3ae2e5002a48573826fe384222482953dfa964ea0f090c1b3e79fb96f46262f214260108a5387a22810d51fcfe304634eb04844747e1dca01d80948b667018f571ca550888f731361f7532fee09118262be3ec2935f52c0ebd87d8f5a8680390b2125", 0xec}, {&(0x7f0000000100)="d1527856c9589c34ed1bfeab", 0xc}, {&(0x7f0000000580)="b4ccadba83a049f8e306ad7d6d4e3068d3927a6cf5c7f99268c3f4e88d0f86d1a18000ef3c674e144e9d262865cde0fc03c5c60a7d59b52506f4e4a5d35b7f1077d76bafddd90076ef1022aa4f3382827f59fe7c6daa5c0bf5c3b928c02e76fdf9e3c1d914e1ecd5596d4fc2a5d3b8b504245295334cf1c8b0490f7019e4fce8b1fe50de3176d39eaa9824cb640a", 0x8e}, {&(0x7f0000000280)}], 0x7, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x108}, 0x40000) fcntl$getown(0xffffffffffffffff, 0x9) clone3(&(0x7f00000001c0)={0x40180300, 0x0, 0x0, 0x0, {0x36}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 735.776780] FAULT_INJECTION: forcing a failure. [ 735.776780] name failslab, interval 1, probability 0, space 0, times 0 [ 735.779350] CPU: 1 PID: 6743 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 735.780784] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 735.782540] Call Trace: [ 735.783092] dump_stack+0x107/0x167 [ 735.783845] should_fail.cold+0x5/0xa [ 735.784653] ? io_uring_alloc_task_context+0x99/0x6a0 [ 735.785735] should_failslab+0x5/0x20 [ 735.786547] kmem_cache_alloc_trace+0x55/0x320 [ 735.787498] io_uring_alloc_task_context+0x99/0x6a0 [ 735.788532] ? io_import_iovec+0x1120/0x1120 [ 735.789450] ? lock_downgrade+0x6d0/0x6d0 [ 735.790314] ? do_raw_spin_lock+0x121/0x260 [ 735.791205] ? rwlock_bug.part.0+0x90/0x90 [ 735.792098] __io_uring_add_tctx_node+0x2c6/0x520 [ 735.793122] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 735.794210] ? alloc_fd+0x2e7/0x670 [ 735.794967] io_uring_setup+0x1fbb/0x2980 [ 735.795829] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 735.796881] ? wait_for_completion_io+0x270/0x270 [ 735.797931] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 735.799031] ? syscall_enter_from_user_mode+0x1d/0x50 [ 735.800123] do_syscall_64+0x33/0x40 [ 735.800907] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 735.802008] RIP: 0033:0x7fca3e213b19 [ 735.802793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 735.806666] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 735.808269] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 735.809772] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 735.811282] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 735.812786] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 735.814298] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 735.818544] loop7: detected capacity change from 0 to 135266304 03:11:55 executing program 4: syz_io_uring_setup(0x40, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x890c, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@private0, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x9, 0x2, 0x1, 0x8, 0x6, 0x7}, 0x20) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="027701be471a9110a0997ee27f83f9069bd37195f1cc5d665f24f2993e0a15ae74213c2cd10594e6740bebbd79f4c9862aa3ca2c8897d1577c2e2a7c5566d482cae07b98b3c267b2c2f690d746003e32acaae7f44e1c89cd7afd31547ae5b90e93079fd9d831b90e"], 0x190) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@remote, 0x0, r9}) [ 735.864963] loop1: detected capacity change from 0 to 135266304 03:11:55 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 47) [ 735.940616] FAULT_INJECTION: forcing a failure. [ 735.940616] name failslab, interval 1, probability 0, space 0, times 0 [ 735.943028] CPU: 0 PID: 6769 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 735.944464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 735.946221] Call Trace: [ 735.946781] dump_stack+0x107/0x167 [ 735.947552] should_fail.cold+0x5/0xa [ 735.948359] ? create_object.isra.0+0x3a/0xa30 [ 735.949318] should_failslab+0x5/0x20 [ 735.950132] kmem_cache_alloc+0x5b/0x310 [ 735.950998] create_object.isra.0+0x3a/0xa30 [ 735.951925] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 735.953004] kmem_cache_alloc_trace+0x151/0x320 [ 735.954019] io_uring_alloc_task_context+0x99/0x6a0 [ 735.955072] ? io_import_iovec+0x1120/0x1120 [ 735.956006] ? lock_downgrade+0x6d0/0x6d0 [ 735.956888] ? do_raw_spin_lock+0x121/0x260 [ 735.957801] ? rwlock_bug.part.0+0x90/0x90 [ 735.958715] __io_uring_add_tctx_node+0x2c6/0x520 [ 735.959737] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 735.960840] ? alloc_fd+0x2e7/0x670 [ 735.961624] io_uring_setup+0x1fbb/0x2980 [ 735.962515] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 735.963581] ? wait_for_completion_io+0x270/0x270 [ 735.964630] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 735.965741] ? syscall_enter_from_user_mode+0x1d/0x50 [ 735.966850] do_syscall_64+0x33/0x40 [ 735.967635] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 735.968714] RIP: 0033:0x7fca3e213b19 [ 735.969498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 735.973405] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 735.975031] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 735.976542] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 735.978077] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 735.979578] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 735.981078] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:11:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r7 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r7, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:12:09 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 48) 03:12:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9au\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:12:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r7 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r7, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:12:09 executing program 6: syz_io_uring_setup(0x40, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x890c, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@private0, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x9, 0x2, 0x1, 0x8, 0x6, 0x7}, 0x20) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="027701be471a9110a0997ee27f83f9069bd37195f1cc5d665f24f2993e0a15ae74213c2cd10594e6740bebbd79f4c9862aa3ca2c8897d1577c2e2a7c5566d482cae07b98b3c267b2c2f690d746003e32acaae7f44e1c89cd7afd31547ae5b90e93079fd9d831b90e"], 0x190) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@remote, 0x0, r9}) 03:12:09 executing program 4: syz_io_uring_setup(0x40, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x890c, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@private0, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x9, 0x2, 0x1, 0x8, 0x6, 0x7}, 0x20) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="027701be471a9110a0997ee27f83f9069bd37195f1cc5d665f24f2993e0a15ae74213c2cd10594e6740bebbd79f4c9862aa3ca2c8897d1577c2e2a7c5566d482cae07b98b3c267b2c2f690d746003e32acaae7f44e1c89cd7afd31547ae5b90e93079fd9d831b90e"], 0x190) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@remote, 0x0, r9}) 03:12:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 749.940975] FAULT_INJECTION: forcing a failure. [ 749.940975] name failslab, interval 1, probability 0, space 0, times 0 [ 749.943732] CPU: 0 PID: 6780 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 749.945378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 749.947383] Call Trace: [ 749.948035] dump_stack+0x107/0x167 [ 749.948637] loop1: detected capacity change from 0 to 135266304 [ 749.948911] should_fail.cold+0x5/0xa [ 749.948937] ? create_object.isra.0+0x3a/0xa30 [ 749.948959] should_failslab+0x5/0x20 [ 749.952689] kmem_cache_alloc+0x5b/0x310 [ 749.953663] create_object.isra.0+0x3a/0xa30 [ 749.954736] kmemleak_alloc_percpu+0xa0/0x100 [ 749.955816] pcpu_alloc+0x4e2/0x1240 [ 749.956720] __percpu_counter_init+0x10d/0x2d0 [ 749.957819] io_uring_alloc_task_context+0xcc/0x6a0 [ 749.959034] ? io_import_iovec+0x1120/0x1120 [ 749.960096] ? lock_downgrade+0x6d0/0x6d0 [ 749.961099] ? do_raw_spin_lock+0x121/0x260 [ 749.962136] ? rwlock_bug.part.0+0x90/0x90 [ 749.963160] __io_uring_add_tctx_node+0x2c6/0x520 [ 749.964319] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 749.965590] ? alloc_fd+0x2e7/0x670 [ 749.966490] io_uring_setup+0x1fbb/0x2980 [ 749.967484] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 749.968682] ? wait_for_completion_io+0x270/0x270 [ 749.969864] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 749.971126] ? syscall_enter_from_user_mode+0x1d/0x50 [ 749.972376] do_syscall_64+0x33/0x40 [ 749.973265] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 749.974498] RIP: 0033:0x7fca3e213b19 [ 749.975384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 749.979783] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 749.981598] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 749.983302] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 749.985000] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 749.986758] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 749.988437] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:12:10 executing program 1: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 750.057030] loop7: detected capacity change from 0 to 135266304 03:12:10 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 49) 03:12:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r7 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r7, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) [ 750.072710] loop0: detected capacity change from 0 to 135266304 [ 750.122169] loop1: detected capacity change from 0 to 135266304 03:12:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ax\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:12:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:10 executing program 6: syz_io_uring_setup(0x40, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x890c, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@private0, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x9, 0x2, 0x1, 0x8, 0x6, 0x7}, 0x20) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="027701be471a9110a0997ee27f83f9069bd37195f1cc5d665f24f2993e0a15ae74213c2cd10594e6740bebbd79f4c9862aa3ca2c8897d1577c2e2a7c5566d482cae07b98b3c267b2c2f690d746003e32acaae7f44e1c89cd7afd31547ae5b90e93079fd9d831b90e"], 0x190) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@remote, 0x0, r9}) [ 750.202959] FAULT_INJECTION: forcing a failure. [ 750.202959] name failslab, interval 1, probability 0, space 0, times 0 [ 750.204445] CPU: 1 PID: 6811 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 750.205292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 750.206338] Call Trace: [ 750.206673] dump_stack+0x107/0x167 [ 750.207126] should_fail.cold+0x5/0xa [ 750.207612] ? create_object.isra.0+0x3a/0xa30 [ 750.208175] should_failslab+0x5/0x20 [ 750.208662] kmem_cache_alloc+0x5b/0x310 [ 750.209168] create_object.isra.0+0x3a/0xa30 [ 750.209720] kmemleak_alloc_percpu+0xa0/0x100 [ 750.210280] pcpu_alloc+0x4e2/0x1240 [ 750.210750] __percpu_counter_init+0x10d/0x2d0 [ 750.211324] io_uring_alloc_task_context+0xcc/0x6a0 [ 750.211938] ? io_import_iovec+0x1120/0x1120 [ 750.212479] ? lock_downgrade+0x6d0/0x6d0 [ 750.212990] ? do_raw_spin_lock+0x121/0x260 [ 750.213524] ? rwlock_bug.part.0+0x90/0x90 [ 750.214061] __io_uring_add_tctx_node+0x2c6/0x520 [ 750.214653] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 750.215301] ? alloc_fd+0x2e7/0x670 [ 750.215754] io_uring_setup+0x1fbb/0x2980 [ 750.216269] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 750.216897] ? wait_for_completion_io+0x270/0x270 [ 750.217503] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 750.218154] ? syscall_enter_from_user_mode+0x1d/0x50 [ 750.218792] do_syscall_64+0x33/0x40 [ 750.219253] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 750.219881] RIP: 0033:0x7fca3e213b19 [ 750.220340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 750.222615] RSP: 002b:00007fca3b768108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 750.223545] RAX: ffffffffffffffda RBX: 00007fca3e327020 RCX: 00007fca3e213b19 [ 750.224423] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 750.225299] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 750.226195] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 750.227113] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:12:10 executing program 1: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 750.260545] loop7: detected capacity change from 0 to 135266304 03:12:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:10 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 750.394708] loop0: detected capacity change from 0 to 135266304 [ 764.126609] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 764.132919] FAULT_INJECTION: forcing a failure. [ 764.132919] name failslab, interval 1, probability 0, space 0, times 0 [ 764.134511] CPU: 1 PID: 6848 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 764.135465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 764.136605] Call Trace: [ 764.136968] dump_stack+0x107/0x167 [ 764.137461] should_fail.cold+0x5/0xa [ 764.137993] ? io_wq_create+0xeb/0xc00 [ 764.138520] should_failslab+0x5/0x20 [ 764.139030] __kmalloc+0x72/0x390 [ 764.139500] io_wq_create+0xeb/0xc00 [ 764.140006] io_uring_alloc_task_context+0x1f1/0x6a0 [ 764.140693] ? io_import_iovec+0x1120/0x1120 [ 764.141288] ? io_apoll_task_func+0x2d0/0x2d0 [ 764.141900] ? __io_req_find_next+0x300/0x300 [ 764.142511] ? do_raw_spin_lock+0x121/0x260 [ 764.143100] ? rwlock_bug.part.0+0x90/0x90 [ 764.143689] __io_uring_add_tctx_node+0x2c6/0x520 [ 764.144350] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 764.145069] ? alloc_fd+0x2e7/0x670 [ 764.145573] io_uring_setup+0x1fbb/0x2980 [ 764.146148] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 764.146834] ? wait_for_completion_io+0x270/0x270 [ 764.147507] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 764.148208] ? syscall_enter_from_user_mode+0x1d/0x50 [ 764.148900] do_syscall_64+0x33/0x40 [ 764.149397] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 764.150116] RIP: 0033:0x7fca3e213b19 [ 764.150627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 764.153135] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 764.154187] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 764.155147] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 764.156113] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 764.157075] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 764.158054] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 764.169086] loop1: detected capacity change from 0 to 135266304 03:12:24 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r7 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r7, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r8}) 03:12:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\b\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:12:24 executing program 0: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x5, 0xbf, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x93b}, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffd, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000800)=ANY=[]) r1 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010096000009000000677d1211d845e8be00e80000"], 0x24}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x301000, 0x0) openat(r2, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) read(0xffffffffffffffff, &(0x7f00000006c0)=""/135, 0x87) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x823, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0000000049051cd3a6064a7204adf33c23d4867aed1d780fb948bee051c6e792243ffc0b600ee52c74b771a2d74d12a0b749a50391922d6d884e786e24d46d9821b009e7d0902743f22844570e75f0fec3f110c110619da4f13a1ac33b4cb918f5aa4992ed4bc35d9567992c325741cd438abf8a7c478ffad4851a07dcbd2583dcad3316bb5d147de1351392f90ed44c5a89e4af", @ANYRES16, @ANYRES64=r1], 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x240041c0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20401010}, 0xc, &(0x7f0000000640)={&(0x7f0000000200)=ANY=[@ANYBLOB="ad33878e392e6d6cb99b2e170310ab", @ANYRES16=0x0, @ANYBLOB="010028bd7000fadbdf25010000000c000300fdffffffffffffff080001000000000008000100000000000c00030001000080000000000c0005000b000000000000000c0003000900000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x44000}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/184, 0xb8}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000500)=""/114, 0x72}], 0x3, 0x16, 0x4) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000800)={0x0, 0x0, "17f042"}) fallocate(0xffffffffffffffff, 0x52, 0x2, 0x10000000fdffffff) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 03:12:24 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:24 executing program 1: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:24 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 50) [ 764.179173] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 764.180785] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 764.182503] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 764.189372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 764.191784] loop7: detected capacity change from 0 to 135266304 [ 764.210072] tmpfs: Unknown parameter 'À' 03:12:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\t\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 764.214508] loop6: detected capacity change from 0 to 135266304 03:12:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:24 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 51) [ 764.334004] FAULT_INJECTION: forcing a failure. [ 764.334004] name failslab, interval 1, probability 0, space 0, times 0 [ 764.335529] CPU: 1 PID: 6866 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 764.336386] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 764.337414] Call Trace: [ 764.337745] dump_stack+0x107/0x167 [ 764.338208] should_fail.cold+0x5/0xa [ 764.338692] ? create_object.isra.0+0x3a/0xa30 [ 764.339274] should_failslab+0x5/0x20 [ 764.339749] kmem_cache_alloc+0x5b/0x310 [ 764.340249] ? io_uring_alloc_task_context+0xf5/0x6a0 [ 764.340889] create_object.isra.0+0x3a/0xa30 [ 764.341439] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 764.342083] __kmalloc+0x16e/0x390 [ 764.342531] io_wq_create+0xeb/0xc00 [ 764.343002] io_uring_alloc_task_context+0x1f1/0x6a0 [ 764.343632] ? io_import_iovec+0x1120/0x1120 [ 764.344180] ? io_apoll_task_func+0x2d0/0x2d0 [ 764.344736] ? __io_req_find_next+0x300/0x300 [ 764.345292] ? do_raw_spin_lock+0x121/0x260 [ 764.345826] ? rwlock_bug.part.0+0x90/0x90 [ 764.346359] __io_uring_add_tctx_node+0x2c6/0x520 [ 764.346962] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 764.347619] ? alloc_fd+0x2e7/0x670 [ 764.348080] io_uring_setup+0x1fbb/0x2980 [ 764.348601] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 764.349226] ? wait_for_completion_io+0x270/0x270 [ 764.349836] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 764.350506] ? syscall_enter_from_user_mode+0x1d/0x50 [ 764.351160] do_syscall_64+0x33/0x40 [ 764.351619] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 764.352261] RIP: 0033:0x7fca3e213b19 [ 764.352728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 764.355051] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 764.356004] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 764.356904] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 764.357795] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 764.358702] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 764.359599] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:12:24 executing program 0: syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x185882, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f00000002c0), 0x4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f00000005c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd, 0x1ff, 0x0, 0x9, 0x4, 0x1}, 0x80000001) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r3) write$bt_hci(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="01040803e06d0fc2d73c0b2714527416afa30400000000"], 0x6) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01002abd7000fbdbdf25060000229f00020006000000080003002ed50723d927a10aec0700000034000180080007002d26832842f07709e24076ab65adc945548eb1c99fd72e1cf2546364760b970eb0da151367189f7ffe11fe95eec34750f1853c4fad674aa0223bd0a368e60a4be18f4e28968c", @ANYRES32=0x0, @ANYBLOB="060005004e24000008000300ac1414aa08000700", @ANYRES32=0x0, @ANYBLOB="050002007f000000060005004e2100000800020004000000"], 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000003080)={0x0, "1aaaa8aae701d5ca00"}) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000240)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x80000) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000200)=0x1f) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 03:12:24 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r7 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r7, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r8}) 03:12:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\x0f\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:12:24 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 764.508996] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 764.513689] loop1: detected capacity change from 0 to 135266304 [ 764.588847] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 764.590478] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 764.593803] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 764.604552] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:12:38 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 52) 03:12:38 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:38 executing program 6: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x101000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x402}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r2 = inotify_init1(0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x43) dup3(r3, r2, 0x0) io_cancel(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x427, r2, &(0x7f0000000080)="9b092f6d4da7d173fbc970301e3efff493a04ced5782a5cd6755bbcc95af47e62284", 0x22, 0x100000000}, &(0x7f0000000180)) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) mount$9p_rdma(&(0x7f0000000200), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340), 0x1000, &(0x7f00000004c0)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x3}}, {@timeout={'timeout', 0x3d, 0x4}}, {@timeout={'timeout', 0x3d, 0x9}}, {@sq={'sq', 0x3d, 0x3f}}, {@rq={'rq', 0x3d, 0x10000}}, {@rq={'rq', 0x3d, 0xfffffffffffff862}}, {@rq={'rq', 0x3d, 0x5}}, {@rq={'rq', 0x3d, 0x8}}], [{@pcr={'pcr', 0x3d, 0x22}}, {@uid_eq}, {@permit_directio}, {@uid_gt={'uid>', 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xa6'}}, {@permit_directio}, {@uid_lt}, {@permit_directio}]}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x2, 0x6a, 0x101, 0x10, @private1, @private2, 0x20, 0x0, 0x61, 0x6}}) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 03:12:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:38 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\x10\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:12:38 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r7 = eventfd2(0x1, 0x80001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r7, 0xc0709411, &(0x7f0000000280)={{0x0, 0x3f19, 0x810001, 0x4, 0x7ff, 0x401, 0x10000, 0xffffffff, 0xda7, 0xffffffff, 0x20, 0x40000000002, 0x5, 0x8, 0x2}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r8}) 03:12:38 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x2400c0, 0x0) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000080)={0x8, 0x5, 0x4, 0x1f}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x89c}}, './file0\x00'}) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="646566636f6e7465f8743d73797374656d5f752cfdffffffffffffff73797374656d5f752c00"]) [ 778.487942] kauditd_printk_skb: 22 callbacks suppressed [ 778.487965] audit: type=1400 audit(1762830758.499:140): avc: denied { watch_reads } for pid=6889 comm="syz-executor.6" path="/syzkaller-testdir859674958/syzkaller.iRLWwq/72/file0" dev="sda" ino=16027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=1 [ 778.509651] tmpfs: Unknown parameter 'defconteøt' [ 778.511924] loop1: detected capacity change from 0 to 135266304 [ 778.518082] FAULT_INJECTION: forcing a failure. [ 778.518082] name failslab, interval 1, probability 0, space 0, times 0 [ 778.520539] CPU: 1 PID: 6910 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 778.522007] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 778.523763] Call Trace: [ 778.524327] dump_stack+0x107/0x167 [ 778.525102] should_fail.cold+0x5/0xa [ 778.525943] ? io_wq_create+0x6ef/0xc00 [ 778.526784] should_failslab+0x5/0x20 [ 778.527660] kmem_cache_alloc_node_trace+0x59/0x340 [ 778.528695] io_wq_create+0x6ef/0xc00 [ 778.529487] io_uring_alloc_task_context+0x1f1/0x6a0 [ 778.530543] ? io_import_iovec+0x1120/0x1120 [ 778.531450] ? io_apoll_task_func+0x2d0/0x2d0 [ 778.532374] ? __io_req_find_next+0x300/0x300 [ 778.532731] loop7: detected capacity change from 0 to 135266304 [ 778.533290] ? do_raw_spin_lock+0x121/0x260 [ 778.533310] ? rwlock_bug.part.0+0x90/0x90 [ 778.533335] __io_uring_add_tctx_node+0x2c6/0x520 [ 778.533355] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 778.533373] ? alloc_fd+0x2e7/0x670 [ 778.533405] io_uring_setup+0x1fbb/0x2980 [ 778.540037] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 778.541091] ? wait_for_completion_io+0x270/0x270 [ 778.542120] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 778.543202] ? syscall_enter_from_user_mode+0x1d/0x50 [ 778.544270] do_syscall_64+0x33/0x40 [ 778.545044] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 778.546123] RIP: 0033:0x7fca3e213b19 [ 778.546890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 778.550688] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 778.552263] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 778.553715] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 778.555187] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 778.556652] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 778.558139] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:12:38 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) eventfd2(0x1, 0x80001) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r8}) 03:12:38 executing program 4: rt_sigpending(&(0x7f0000000040), 0x8) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) rt_sigaction(0x34, &(0x7f00000001c0)={&(0x7f0000000140)="660f3832a00a000000c4414972f7063664672636653ef245ad0fad460c0f0fe997c44169ebbf00800000c421d35c9bf7fffffff2420fc2d50766f241a50f4b59f3", 0x80000002, &(0x7f00000000c0)="64470fd92cfddf0c578464f20f38f03bc4e20dde7965c4c1f5da4a008fe978d1fec4e27af7b60c000000d9ebd3da44af410f01ef", {[0x5]}}, &(0x7f0000000280)={&(0x7f0000000200)="4052c4c2bd4753f0c4619414ea8fa9109a8209000000260f0f4500bf6744d84f99c421fd5aadf9ffffff2e400f3808fdc4610565a100000000c403f908c804", 0x0, &(0x7f0000000240)="c441a85416c42279182f3e0f18c8f2c80f0000c4a3b57c857d26e633b366450fe964f599c4e37904fe0d8f29209a890f000000c483614c3e000fdc6a06"}, 0x8, &(0x7f00000002c0)) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000100)={0x18, 0x16, 0x69844ea0a6ddcd11, 0x0, 0x0, {}, [@typed={0x4, 0x1, 0x0, 0x0, @str}]}, 0x18}}, 0x0) 03:12:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1c\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:12:38 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x1f, 0x0, 0x7, 0x4088, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0xc}, 0x50102, 0x7, 0x1}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x840, 0x0) r1 = fsopen(&(0x7f0000000080)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000100)=')\x00', &(0x7f0000000140)='\x00', 0x0) syz_io_uring_setup(0x7806, &(0x7f0000000480)={0x0, 0x55d3, 0x0, 0x3, 0x194}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x1000, 0xe}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x7, 0x1, 0x0, {0x0, 0x0, r4}}, 0xfffffff9) fsopen(&(0x7f0000000080)='tmpfs\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r6 = getpgid(0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x8) kcmp(0xffffffffffffffff, r6, 0x2, r7, 0xffffffffffffffff) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) 03:12:38 executing program 6: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x2}, 0x6) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup3(r1, r0, 0x0) 03:12:38 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:38 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 53) 03:12:38 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x7}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) getpgrp(0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000fffffdfd020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d4571082000000000000000000000000000000000000000000824a700900"/260]) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0xd, 0xfa, 0x80, 0x31, 0x0, 0x0, 0x80004, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xdc3, 0x4, @perf_bp={&(0x7f0000000000), 0xd}, 0x57680, 0x8, 0x4f, 0x3, 0x7, 0x1000, 0xc5, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000980)={{r1}, r3, 0x18, @unused=[0xfff, 0x7f, 0x1ff, 0x1], @name="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"}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="3c00000001000000030015c1e10000030000000220000001dee8fc131fc92b57000000014d0ffee000008068fb93f20624d998bb2382fbef2e605d20efd13ad8020454fe726d5ec494d8000000000000b7382cb035ae"]}) sendmsg$nl_generic(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="d400000014000268e872002a36e58c2516000000309195bcedd4a355ffd0b57d36c80aa3cd5c00a209ab410588e2acf39f612a058aca019d424c1cfefa9bd84118e7b9a3dc7b648488e3b314280151f16e53c3b34d356001432e0e37dbfac2e264d49dde22ffb05d71782e4588a22964e120c9b3e8ac10a180903c642a26553943488705f8f9389f0dc82f10989f62b3874701ee49da692b47f3a2374ddcf5407ac1d8d6ece93e8156a83bca75748906b35121f4bfbcd532464798ecfcbf0151eccc1703000000e09aefabad56510f51901f721fb776488673f91400"/230], 0xd4}, 0x1, 0x0, 0x0, 0x8010}, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000880)=ANY=[@ANYBLOB="010601060000000000000000000000000000000000000001ff020000000000000000000000000001fc000000000000000000000000000000f88226a91f8b26296906a7c6112d7c23cc1890b9dac6ad76f124cc078544b156c06a4b5f643402a388b7b6ede5be94169040c873919189f0bb22567c3a24bc8125a2e76bd2b3104ebbdb6802785a82b050ac7fb3228ceb0b614ec31cae8c820bae862312b19eb847822245ff0be847d669f25a0ffc03bce9499a5dbcd92b9d93e2314ecfcf71562229babcb88fdce82b9783e2c30ebcbb0b8b28701efe37da5c"], 0x38) signalfd4(0xffffffffffffffff, &(0x7f0000000180)={[0x9]}, 0x8, 0x80000) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x5, 0x81, 0x0, 0x1ff}]}) prlimit64(0x0, 0x6, &(0x7f0000000440)={0x4, 0x16ba}, &(0x7f0000000600)) unshare(0x48020200) 03:12:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\a\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 778.848874] FAULT_INJECTION: forcing a failure. [ 778.848874] name failslab, interval 1, probability 0, space 0, times 0 [ 778.851267] CPU: 1 PID: 6942 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 778.852695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 778.854426] Call Trace: [ 778.854991] dump_stack+0x107/0x167 [ 778.855748] should_fail.cold+0x5/0xa [ 778.856548] ? create_object.isra.0+0x3a/0xa30 [ 778.857480] should_failslab+0x5/0x20 [ 778.858274] kmem_cache_alloc+0x5b/0x310 [ 778.859115] ? io_wq_create+0x114/0xc00 [ 778.859926] create_object.isra.0+0x3a/0xa30 [ 778.860832] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 778.861905] kmem_cache_alloc_node_trace+0x16d/0x340 [ 778.862983] io_wq_create+0x6ef/0xc00 [ 778.863776] io_uring_alloc_task_context+0x1f1/0x6a0 [ 778.864817] ? io_import_iovec+0x1120/0x1120 [ 778.865716] ? io_apoll_task_func+0x2d0/0x2d0 [ 778.866638] ? __io_req_find_next+0x300/0x300 [ 778.867551] ? do_raw_spin_lock+0x121/0x260 [ 778.868443] ? rwlock_bug.part.0+0x90/0x90 [ 778.869311] __io_uring_add_tctx_node+0x2c6/0x520 [ 778.870296] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 778.871675] ? alloc_fd+0x2e7/0x670 [ 778.872631] io_uring_setup+0x1fbb/0x2980 [ 778.873594] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 778.874675] ? wait_for_completion_io+0x270/0x270 [ 778.875704] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 778.876840] ? syscall_enter_from_user_mode+0x1d/0x50 03:12:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x2000000000000001}, 0x11010, 0x84b, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x3, 0x3, 0x0, 0x0, 0x0, 0x10000004, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x10000000000001, 0x9}, 0x19a0, 0x1, 0x6, 0x0, 0x0, 0xa30, 0xd, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) process_vm_readv(r0, &(0x7f00000004c0)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/231, 0xe7}, {&(0x7f0000000040)=""/57, 0x39}, {&(0x7f0000000340)=""/193, 0xc1}, {&(0x7f0000000440)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29860, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, r1, 0x0) creat(0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)=0x4) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r2}) ptrace$peek(0x1, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r3, 0x0, 0x80464c453f) connect$inet6(r3, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 778.877927] do_syscall_64+0x33/0x40 [ 778.878890] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 778.879974] RIP: 0033:0x7fca3e213b19 [ 778.880779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 778.884704] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 778.886321] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 778.887832] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 778.889333] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 778.890849] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 778.892388] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:12:38 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:38 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x1, 0x2, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x8, 0x700, 0xf782, 0x80000000}}) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r8}) 03:12:39 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 54) 03:12:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\t\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 779.114904] FAULT_INJECTION: forcing a failure. [ 779.114904] name failslab, interval 1, probability 0, space 0, times 0 [ 779.117331] CPU: 0 PID: 6957 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 779.118772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 779.120516] Call Trace: [ 779.121076] dump_stack+0x107/0x167 [ 779.121839] should_fail.cold+0x5/0xa [ 779.122644] ? create_object.isra.0+0x3a/0xa30 [ 779.123594] should_failslab+0x5/0x20 [ 779.124406] kmem_cache_alloc+0x5b/0x310 [ 779.125257] ? io_uring_alloc_task_context+0xf5/0x6a0 [ 779.126344] create_object.isra.0+0x3a/0xa30 [ 779.127265] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 779.128336] __kmalloc+0x16e/0x390 [ 779.129081] io_wq_create+0xeb/0xc00 [ 779.129868] io_uring_alloc_task_context+0x1f1/0x6a0 [ 779.130931] ? io_import_iovec+0x1120/0x1120 [ 779.131840] ? io_apoll_task_func+0x2d0/0x2d0 [ 779.132768] ? __io_req_find_next+0x300/0x300 [ 779.133700] ? do_raw_spin_lock+0x121/0x260 [ 779.134595] ? rwlock_bug.part.0+0x90/0x90 [ 779.135478] __io_uring_add_tctx_node+0x2c6/0x520 [ 779.136471] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 779.137540] ? alloc_fd+0x2e7/0x670 [ 779.138314] io_uring_setup+0x1fbb/0x2980 [ 779.139190] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 779.140239] ? wait_for_completion_io+0x270/0x270 [ 779.141260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 779.142368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 779.143442] do_syscall_64+0x33/0x40 [ 779.144214] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 779.145284] RIP: 0033:0x7fca3e213b19 [ 779.146063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.149851] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 779.151441] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 779.152917] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 779.154392] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 779.155860] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 779.157343] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:12:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:39 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 55) 03:12:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\x0f\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 779.383052] FAULT_INJECTION: forcing a failure. [ 779.383052] name failslab, interval 1, probability 0, space 0, times 0 [ 779.385357] CPU: 0 PID: 6976 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 779.386668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 779.388233] Call Trace: [ 779.388735] dump_stack+0x107/0x167 [ 779.389434] should_fail.cold+0x5/0xa [ 779.390154] ? create_object.isra.0+0x3a/0xa30 [ 779.391017] should_failslab+0x5/0x20 [ 779.391749] kmem_cache_alloc+0x5b/0x310 [ 779.392526] create_object.isra.0+0x3a/0xa30 [ 779.393348] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 779.394328] kmem_cache_alloc_trace+0x151/0x320 [ 779.395206] __io_uring_add_tctx_node+0x15c/0x520 [ 779.396114] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 779.397105] ? alloc_fd+0x2e7/0x670 [ 779.397793] io_uring_setup+0x1fbb/0x2980 [ 779.398589] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 779.399541] ? wait_for_completion_io+0x270/0x270 [ 779.400471] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 779.401452] ? syscall_enter_from_user_mode+0x1d/0x50 [ 779.402461] do_syscall_64+0x33/0x40 [ 779.403160] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 779.404125] RIP: 0033:0x7fca3e213b19 [ 779.404827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.408276] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 779.409676] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 779.411006] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 779.412340] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 779.413666] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 779.414994] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 779.520921] loop1: detected capacity change from 0 to 135266304 03:12:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = signalfd(r0, &(0x7f0000000140)={[0x5]}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffc01) setns(0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) open(&(0x7f0000000480)='./file1\x00', 0x200, 0x180) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000680), 0x4}, 0x11904, 0x0, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) r6 = syz_io_uring_setup(0x7806, &(0x7f0000000480)={0x0, 0x55d3, 0x0, 0x3, 0x194}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000000140)) io_uring_enter(r6, 0xc4b, 0x9b, 0x4, &(0x7f0000000040)={[0x4]}, 0x8) 03:12:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r8}) 03:12:54 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:12:54 executing program 4: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) sysfs$2(0x2, 0xde4, &(0x7f0000000180)=""/156) io_setup(0x5e0, &(0x7f0000000180)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYRESOCT=r0, @ANYRES64=r0, @ANYRESHEX], 0x70}, 0x1, 0x0, 0x0, 0x24004890}, 0x4040010) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r1}, 0xfffffffffffffec8) fchmod(0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x44, 0x0, 0x500, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x4000081) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c3ee2, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010000000000000000000000000005000000000000000c00008008001000", @ANYRES32=r3, @ANYBLOB="3d1a0c686bed540d7be191b494a684aafb9325731dfab100"/39], 0x28}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000003c0)={@remote, 0x1a, r5}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00'}) 03:12:54 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 56) [ 794.784023] FAULT_INJECTION: forcing a failure. [ 794.784023] name failslab, interval 1, probability 0, space 0, times 0 [ 794.786951] CPU: 1 PID: 6997 Comm: syz-executor.3 Not tainted 5.10.246 #1 03:12:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\x10\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 794.788686] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 794.791041] Call Trace: [ 794.791719] dump_stack+0x107/0x167 [ 794.792670] should_fail.cold+0x5/0xa [ 794.793649] ? create_object.isra.0+0x3a/0xa30 [ 794.794824] should_failslab+0x5/0x20 [ 794.795786] kmem_cache_alloc+0x5b/0x310 [ 794.796840] create_object.isra.0+0x3a/0xa30 [ 794.797959] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 794.799277] kmem_cache_alloc_trace+0x151/0x320 [ 794.800471] __io_uring_add_tctx_node+0x15c/0x520 [ 794.801715] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 794.802854] ? alloc_fd+0x2e7/0x670 [ 794.803792] io_uring_setup+0x1fbb/0x2980 [ 794.804841] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 794.806162] ? wait_for_completion_io+0x270/0x270 [ 794.807438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 794.808777] ? syscall_enter_from_user_mode+0x1d/0x50 [ 794.810093] do_syscall_64+0x33/0x40 [ 794.811062] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 794.812360] RIP: 0033:0x7fca3e213b19 [ 794.813312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 794.818069] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 794.820011] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 794.821837] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 794.823650] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 794.825477] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 794.827301] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 794.843022] loop7: detected capacity change from 0 to 135266304 03:12:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\x14\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 794.919555] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 794.940334] loop1: detected capacity change from 0 to 135266304 [ 794.972369] loop6: detected capacity change from 0 to 135266304 03:12:55 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 57) [ 795.006076] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 795.071430] FAULT_INJECTION: forcing a failure. [ 795.071430] name failslab, interval 1, probability 0, space 0, times 0 [ 795.074510] CPU: 1 PID: 7027 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 795.076236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 795.078369] Call Trace: [ 795.079050] dump_stack+0x107/0x167 [ 795.079984] should_fail.cold+0x5/0xa [ 795.080945] ? ___slab_alloc+0x155/0x700 [ 795.081990] ? create_object.isra.0+0x3a/0xa30 [ 795.083167] should_failslab+0x5/0x20 [ 795.084142] kmem_cache_alloc+0x5b/0x310 [ 795.085176] create_object.isra.0+0x3a/0xa30 [ 795.086308] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 795.087609] kmem_cache_alloc+0x159/0x310 [ 795.088700] xas_alloc+0x336/0x440 [ 795.089603] xas_create+0x34a/0x10d0 [ 795.090584] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 795.091919] xas_store+0x8c/0x1c40 [ 795.092831] __xa_store+0x164/0x2d0 [ 795.093762] ? xa_delete_node+0x280/0x280 [ 795.094847] ? trace_hardirqs_on+0x5b/0x180 [ 795.095949] xa_store+0x31/0x50 [ 795.096665] __io_uring_add_tctx_node+0x1cf/0x520 [ 795.097907] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 795.099251] ? alloc_fd+0x2e7/0x670 [ 795.100204] io_uring_setup+0x1fbb/0x2980 [ 795.101265] ? __do_sys_io_uring_enter+0x1890/0x1890 03:12:55 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a04}], 0x0, &(0x7f0000000240)=ANY=[]) openat(r0, 0x0, 0x206000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000480)=ANY=[@ANYRESOCT, @ANYRES16, @ANYRES16], 0x10) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x100000001) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x6, [], 0x4, "9755154351ac9a"}) [ 795.102552] ? wait_for_completion_io+0x270/0x270 [ 795.104052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 795.105383] ? syscall_enter_from_user_mode+0x1d/0x50 [ 795.106726] do_syscall_64+0x33/0x40 [ 795.107689] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 795.109019] RIP: 0033:0x7fca3e213b19 [ 795.109972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 795.114682] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 795.116630] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 795.118468] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 795.120298] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 795.122114] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 795.123956] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:12:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r7}) 03:12:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w2\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:12:55 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x10) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)) fspick(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) syz_io_uring_setup(0x20004d52, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ftruncate(0xffffffffffffffff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2cf766646e6f3d", @ANYRESHEX=r2, @ANYBLOB=',cache=mmap,cache=fscache,debug=0x0000000000000924,nodevmap,noextend,dfltgid=', @ANYRESHEX=r3, @ANYBLOB="2c616669643d3078303030103030303045303030303334352c00"]) 03:12:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r7}) [ 795.379760] 9pnet: Insufficient options for proto=fd 03:12:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r1 = syz_io_uring_setup(0x40000132, &(0x7f0000000180)={0x0, 0x0, 0x8, 0x1, 0x0, 0x0, r0}, &(0x7f00000a0000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r5, 0x0, 0x0}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) connect$unix(r4, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r5, 0x4, 0x2800) syz_io_uring_submit(r6, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x8001) write$binfmt_elf64(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46013ff801faffffffffffffff03003e000100000024010000000000004000000000000000b100000000000000f8ffffffffff38000200fcffff03b0c154e57414ff01000002000000000000000400000000000000020000000000000002000000000000000500000000000000000000000000000001000000ff070000cdc400000000000027963f610000000004000000000000000600000000000000000000000000000003000000000000008879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"], 0xee) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0xf507, 0x0) 03:13:10 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 58) 03:13:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x02\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:13:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r7}) [ 810.984747] FAULT_INJECTION: forcing a failure. [ 810.984747] name failslab, interval 1, probability 0, space 0, times 0 [ 810.987289] CPU: 0 PID: 7062 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 810.988719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 810.990462] Call Trace: [ 810.991035] dump_stack+0x107/0x167 [ 810.991821] should_fail.cold+0x5/0xa [ 810.992634] ? xas_alloc+0x336/0x440 [ 810.993423] should_failslab+0x5/0x20 [ 810.994226] kmem_cache_alloc+0x5b/0x310 [ 810.995063] ? stack_trace_consume_entry+0x160/0x160 [ 810.996130] xas_alloc+0x336/0x440 [ 810.997040] xas_create+0x34a/0x10d0 [ 810.997822] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 810.998938] xas_store+0x8c/0x1c40 [ 810.999721] __xa_store+0x164/0x2d0 [ 811.000652] ? xa_delete_node+0x280/0x280 [ 811.001521] ? trace_hardirqs_on+0x5b/0x180 [ 811.002461] xa_store+0x31/0x50 [ 811.003166] __io_uring_add_tctx_node+0x1cf/0x520 [ 811.004195] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 811.005544] ? alloc_fd+0x2e7/0x670 [ 811.006619] io_uring_setup+0x1fbb/0x2980 [ 811.007699] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 811.008994] ? wait_for_completion_io+0x270/0x270 [ 811.010280] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 811.011523] ? syscall_enter_from_user_mode+0x1d/0x50 [ 811.011623] loop6: detected capacity change from 0 to 41948160 [ 811.012614] do_syscall_64+0x33/0x40 [ 811.012662] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 811.012685] RIP: 0033:0x7fca3e213b19 [ 811.016928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 811.020843] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 811.022471] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 811.023985] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 811.025494] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 811.027015] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 811.028526] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:13:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xffffffffffffffd8, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000904000000000000000000000000050000000000000004001080100001800c00e1000000000000000000"], 0x30}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) fallocate(r1, 0x10, 0x6, 0xfff) 03:13:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x40, 0x3c}, {}, {}, 0x0, 0x6e6bb8}}, 0xb8}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000400)={@private2={0xfc, 0x2, '\x00', 0x1}}, 0x14) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x800, 0x2}) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x43, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_io_uring_setup(0x2631, &(0x7f0000000040)={0x0, 0xef33, 0x30, 0x1, 0x256}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000540), &(0x7f00000003c0)) close_range(r2, r0, 0x2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)) write(r3, &(0x7f0000000080)="f26765", 0x3) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0004000000000000001f763310ebc9a320cb8db922b206ccf3f15e399551b98de4afe16424e30b59f6185ea0d21e88940fdcad44037da793e9a4d07e5951f3d88b5bd9cac45a28893459c6ac8e1cdf6bdb2114868c8ae03fbc0c1f2820859fc2eddc5fdf0b586c9d679aff7b5e954c77a495a73c1af5e901c09fdbf82811349459eca3f5bad788de48ce7332c614d214b515073e914c3a6d28a59c6cee55f1807d2d7284f7b5e88b20b329b6383210ac59b29707d2b95f52aea5a537b3d36eadc76cbe2672fc", @ANYRES16=0x0, @ANYBLOB="000228bd7000fbdbdf250000000008000200010000000800090002000000080005000a01010108000900010000000c00030004000000000000000c000300030000000000000008000500ac1e000106000600040000000800020000000000"], 0x64}, 0x1, 0x0, 0x0, 0xc014}, 0x20000044) signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x1]}, 0x8) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x14, r4, 0xb0b, 0x0, 0xfffffffe}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="20c42a230000f9c9c939abee15092b9145b4c9d327f2b0534a8c82d28bd1d5", @ANYRES16=r4, @ANYBLOB="000409000000e5dbdf25010000000c0001800800030001000000"], 0x20}, 0x1, 0x0, 0x0, 0x20048040}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x2007, @fd_index=0x6, 0xf9de, 0x40, 0x34a8, 0x2, 0x1}, 0x8000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:13:10 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000100)=ANY=[], 0x10) recvfrom$unix(r0, &(0x7f0000000200)=""/169, 0xa9, 0x22, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) r2 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0xfdef) syz_io_uring_setup(0x7806, &(0x7f0000000480)={0x0, 0x55d3, 0x0, 0x3, 0x194}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x1000, 0xe}, 0x0) syz_io_uring_setup(0x7806, &(0x7f0000000480)={0x0, 0x55d3, 0x0, 0x3, 0x194}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x1000, 0xe}, 0x0) syz_io_uring_submit(r3, r6, &(0x7f0000000100)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5, 0x2007, @fd=r0, 0x4, 0x0, 0x0, 0x4, 0x0, {0x1}}, 0xffff18bd) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x640c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 811.098782] loop1: detected capacity change from 0 to 135266304 [ 811.110401] loop7: detected capacity change from 0 to 135266304 03:13:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x03\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:13:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x5d, r5}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r8}) 03:13:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:11 executing program 0: pread64(0xffffffffffffffff, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES16, @ANYRESOCT, @ANYRESOCT=r0], 0x200003) sendto$inet6(r0, &(0x7f00000020c0)="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", 0x1000, 0x1, &(0x7f0000000300)={0xa, 0x6, 0xffffffff, @mcast1, 0x4}, 0x1c) r1 = syz_open_pts(0xffffffffffffffff, 0x200) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)={0x14, 0x11, 0xc21}, 0x14}}, 0x0) sendmsg$inet6(r4, &(0x7f00000004c0)={&(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, '\x00', 0x21}}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000340)="23f5e8eca910813cadde55c94004b4dd3b370de0dbf9b2b62722a66892a2ecae403a3f4e5b4c540065fb5e76c03c85a6f0d06a357bfade109c34eb93dcc1ae6b607ff82b2f41fbe265e694ed039e928612ba716bfa241422997495cdaec2521a341f7712a0bf1028f5f6", 0x6a}], 0x1}, 0x8000) r5 = shmget$private(0x0, 0x5000, 0x0, &(0x7f0000ffb000/0x5000)=nil) shmctl$SHM_LOCK(r5, 0xb) r6 = shmget$private(0x0, 0x5000, 0x0, &(0x7f0000ffb000/0x5000)=nil) shmctl$SHM_LOCK(r6, 0xb) r7 = shmget$private(0x0, 0x5000, 0x0, &(0x7f0000ffb000/0x5000)=nil) shmctl$SHM_LOCK(r7, 0xb) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0x67, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYRES32, @ANYRESOCT=r6, @ANYRES64, @ANYRES16=r1, @ANYBLOB="7a3d05a162cf1cdbad40b8d921e7e52b933d379ae0148fe845d0fa3788f4b4f1c6d3fa2bb90f738e8d5b61e10df30d7ed13c87171823d8acc3d21673f7b0b9ec4aeb2aa122ca3561085246d2bfa36da019baaa6017ecb738944d6cc6c5b836ff034dab03e2f1520ec9a38d67e4349aafda9f583a0108837894d5f6", @ANYRES32=r7], 0x50}, 0x1, 0x0, 0x0, 0x20048888}, 0x4000000) fcntl$getflags(r2, 0x401) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="080100001d00210c26bd700001000000040002005ef50c376f1c6db52da1085be79f1bffa526bd7693e95bf6e80299abea12842b4d82fc055d05298cd3365c4007cbe09154c748550cd9b827b12a5cf2d114b0634ef6d205b14686d7886acc08b4225bdadf524119f4d164a8848cdfb409e7d19ed9d4a2a735e34d3ae7102e720944cc6dc8d03dd5095316802e4d83bf810790011fbc31f43e4245d9030e51293a25ca2bb91187c359fa43f3415b378678fbb14abac098982cb98f60fd8ff769fa612a1ba4c0a20f394b543311551fe1b2274c2fd97d5e5707c1690d502472066a4d1b0b6321bb3f12d6ff5d5b3d6037000000000000"], 0x150}, 0x1, 0x0, 0x0, 0x20000840}, 0x0) [ 811.347435] loop1: detected capacity change from 0 to 135266304 [ 811.406078] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.0'. 03:13:26 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 59) 03:13:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) fremovexattr(0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x81, 0x6, 0x0, 0x217e2885}, {0x7, 0x3f, 0x20}, {0x1, 0x5, 0x3f, 0x8}, {0x80, 0x20, 0x8, 0x1ff}]}) 03:13:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x05\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:13:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:26 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r7}) 03:13:26 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000010c0)='/proc/diskstats\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2000) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x4001004) r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='\x00', &(0x7f00000002c0)='./file1\x00', r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4bc4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000140)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREADLINK(r3, &(0x7f0000001080)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYBLOB=',afid=0x0000000000000345,\x00']) [ 826.407985] 9p: Unknown Cache mode füMͨ¤o=ebug=0x0000000000000924 [ 826.429295] FAULT_INJECTION: forcing a failure. [ 826.429295] name failslab, interval 1, probability 0, space 0, times 0 [ 826.432068] 9p: Unknown Cache mode füMͨ¤o=ebug=0x0000000000000924 [ 826.433742] CPU: 1 PID: 7130 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 826.435336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 826.437253] Call Trace: [ 826.437878] dump_stack+0x107/0x167 [ 826.438739] should_fail.cold+0x5/0xa [ 826.439623] ? xas_alloc+0x336/0x440 [ 826.440490] should_failslab+0x5/0x20 [ 826.441368] kmem_cache_alloc+0x5b/0x310 [ 826.442327] xas_alloc+0x336/0x440 [ 826.443162] xas_create+0x34a/0x10d0 [ 826.444047] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 826.445261] xas_store+0x8c/0x1c40 [ 826.446108] __xa_store+0x164/0x2d0 [ 826.446952] ? xa_delete_node+0x280/0x280 [ 826.447913] ? trace_hardirqs_on+0x5b/0x180 [ 826.448919] xa_store+0x31/0x50 [ 826.449676] __io_uring_add_tctx_node+0x1cf/0x520 [ 826.450802] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 826.451995] ? alloc_fd+0x2e7/0x670 [ 826.452870] io_uring_setup+0x1fbb/0x2980 [ 826.453848] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 826.455081] ? wait_for_completion_io+0x270/0x270 [ 826.456262] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 826.457521] ? syscall_enter_from_user_mode+0x1d/0x50 [ 826.458734] do_syscall_64+0x33/0x40 [ 826.459585] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 826.460756] RIP: 0033:0x7fca3e213b19 [ 826.461606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 826.465811] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 826.467555] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 826.469176] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 826.470822] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 826.472437] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 826.474064] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 826.488592] loop7: detected capacity change from 0 to 135266304 [ 826.507813] loop1: detected capacity change from 0 to 135266304 [ 826.533324] audit: type=1326 audit(1762830806.544:141): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7115 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f663a1e3b19 code=0x7ffc0000 [ 826.547864] audit: type=1326 audit(1762830806.559:142): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7115 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f663a1e3b19 code=0x7ffc0000 [ 826.556978] audit: type=1326 audit(1762830806.568:143): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7115 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f663a1e3b19 code=0x7ffc0000 03:13:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x06\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:13:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:41 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f00000002c0)) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x405d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000240)={0x20080522}, &(0x7f0000000300)={0x800, 0x3, 0x6, 0xd7, 0x8000, 0x9}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x1, @tid=r0}, &(0x7f0000000340)=0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$getown(0xffffffffffffffff, 0x9) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) fchdir(r2) timer_delete(r1) 03:13:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x240000, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r7}) 03:13:41 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0xb39e}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0100000008000000000003000000"], 0x14}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40000203}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r5, r3) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:13:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) sendmsg$nl_generic(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) connect$unix(r8, &(0x7f0000000040)=@file={0x1, './file1\x00'}, 0x6e) 03:13:41 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 60) 03:13:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 841.782731] FAULT_INJECTION: forcing a failure. [ 841.782731] name failslab, interval 1, probability 0, space 0, times 0 [ 841.785145] CPU: 0 PID: 7162 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 841.786591] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.788350] Call Trace: [ 841.788912] dump_stack+0x107/0x167 [ 841.789689] should_fail.cold+0x5/0xa [ 841.790508] ? xas_alloc+0x336/0x440 [ 841.790982] loop7: detected capacity change from 0 to 135266304 [ 841.791313] should_failslab+0x5/0x20 [ 841.791333] kmem_cache_alloc+0x5b/0x310 [ 841.791358] xas_alloc+0x336/0x440 [ 841.791381] xas_create+0x34a/0x10d0 [ 841.791415] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 841.791437] xas_store+0x8c/0x1c40 [ 841.791473] __xa_store+0x164/0x2d0 [ 841.798451] ? xa_delete_node+0x280/0x280 [ 841.799331] ? trace_hardirqs_on+0x5b/0x180 [ 841.800256] xa_store+0x31/0x50 [ 841.800958] __io_uring_add_tctx_node+0x1cf/0x520 [ 841.801977] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 841.803094] ? alloc_fd+0x2e7/0x670 [ 841.803878] io_uring_setup+0x1fbb/0x2980 [ 841.804763] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 841.805933] ? wait_for_completion_io+0x270/0x270 [ 841.807165] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 841.808285] ? syscall_enter_from_user_mode+0x1d/0x50 [ 841.809379] do_syscall_64+0x33/0x40 [ 841.810191] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 841.811271] RIP: 0033:0x7fca3e213b19 [ 841.812062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.815988] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 841.817617] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 841.819150] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 841.820604] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 841.822068] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 841.823525] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 841.902600] loop1: detected capacity change from 0 to 135266304 03:13:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\a\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:13:42 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 61) 03:13:42 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r7}) 03:13:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\n\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:13:42 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x920420, &(0x7f00000000c0)=ANY=[]) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x6, 0x0, 0x0, 0x0, 0x1}, 0x101) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800004307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x251) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {r1}}, './file0\x00'}) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 03:13:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000003c0)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota}]}) [ 842.143750] FAULT_INJECTION: forcing a failure. [ 842.143750] name failslab, interval 1, probability 0, space 0, times 0 [ 842.146359] CPU: 1 PID: 7184 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 842.147806] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 842.149552] Call Trace: [ 842.150125] dump_stack+0x107/0x167 [ 842.150895] should_fail.cold+0x5/0xa [ 842.151693] ? ___slab_alloc+0x155/0x700 [ 842.152541] ? create_object.isra.0+0x3a/0xa30 [ 842.153496] should_failslab+0x5/0x20 [ 842.154306] kmem_cache_alloc+0x5b/0x310 [ 842.155162] create_object.isra.0+0x3a/0xa30 [ 842.156081] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 842.157148] kmem_cache_alloc+0x159/0x310 [ 842.158045] xas_alloc+0x336/0x440 [ 842.158792] xas_create+0x34a/0x10d0 [ 842.159586] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 842.160687] xas_store+0x8c/0x1c40 [ 842.161457] __xa_store+0x164/0x2d0 [ 842.162236] ? xa_delete_node+0x280/0x280 [ 842.163113] ? trace_hardirqs_on+0x5b/0x180 [ 842.164031] xa_store+0x31/0x50 [ 842.164727] __io_uring_add_tctx_node+0x1cf/0x520 [ 842.165740] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 842.166848] ? alloc_fd+0x2e7/0x670 [ 842.167622] io_uring_setup+0x1fbb/0x2980 [ 842.168504] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 842.169570] ? wait_for_completion_io+0x270/0x270 [ 842.170620] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 842.171728] ? syscall_enter_from_user_mode+0x1d/0x50 [ 842.172809] do_syscall_64+0x33/0x40 [ 842.173586] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 842.174663] RIP: 0033:0x7fca3e213b19 [ 842.175431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.179329] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 842.180910] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 842.182419] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 842.183924] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 842.185440] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 842.186956] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 842.202560] loop6: detected capacity change from 0 to 2048 [ 842.240320] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 03:13:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 842.281261] loop6: detected capacity change from 0 to 2048 03:13:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:42 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 62) 03:13:42 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r7}) [ 842.324364] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities 03:13:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x0f\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:13:42 executing program 6: pread64(0xffffffffffffffff, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0xdb4d, 0xbc3}, 0x2, 0x6}}, 0x200003) sendto$inet6(r0, &(0x7f00000020c0)="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", 0x1000, 0x1, &(0x7f0000000300)={0xa, 0x6, 0xffffffff, @mcast1, 0x4}, 0x1c) r1 = syz_open_pts(0xffffffffffffffff, 0x200) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x6, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = shmget$private(0x0, 0x5000, 0x0, &(0x7f0000ffb000/0x5000)=nil) shmctl$SHM_LOCK(r4, 0xb) r5 = shmget$private(0x0, 0x5000, 0x0, &(0x7f0000ffb000/0x5000)=nil) shmctl$SHM_LOCK(r5, 0xb) r6 = shmget$private(0x0, 0x5000, 0x0, &(0x7f0000ffb000/0x5000)=nil) shmctl$SHM_LOCK(r6, 0xb) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0x67, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYRES32, @ANYRESOCT=r5, @ANYRES64, @ANYRES16=r1, @ANYBLOB="7a3d05a162cf1cdbad40b8d921e7e52b933d379ae0143788f4b4f1c6d3fa2bb90f738e8d5b61e10df30d7ed13c87174796d8acc3d21673f7b0b9ec4aeb2aa122ca3561085246d2bfa36da019baaa6017ecb738944d6cc6c5b836d0d94dab03e2f1520ec9a38d67e4349aafda9f583a0108837894d5f6", @ANYRES32=r6], 0x50}, 0x1, 0x0, 0x0, 0x20048888}, 0x4000000) fcntl$getflags(r2, 0x401) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x108, 0x1d, 0xc21, 0x70bd26, 0x1, {0x4, 0x0, 0x2}, [@generic="5ef5bd7693e95bf6e80299abea12842b4d82fc055d05298cd3366e363bd1dfea40a6cc775c4007cbe09154c748550cd9b827b12a5cf2d114b0634ef6d205b14686d7886acc08b4225bdadf524119f4d164a8848cdfb409e7d19ed9d4a2a735e34d3ae7102e720944cc6dc8d03dd5095316802e4d83bf810790011fbc31f43e4245d9030e51293a25ca2bb91187c359c100b937802ecb60fbb14abac098982cb98f60fd8ff769fa612a1ba4c0a20f394b543311551f8f29a6c4b6460ae4e1b2274c2fd9311021d5b9317d5e5707c1690d502471066a4d1b0b6321bb3f12d6ff5d5b3d6037d10f5c090a51a7e1b365786399"]}, 0x150}, 0x1, 0x0, 0x0, 0x20000840}, 0x0) [ 842.409943] FAULT_INJECTION: forcing a failure. [ 842.409943] name failslab, interval 1, probability 0, space 0, times 0 [ 842.412393] CPU: 1 PID: 7209 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 842.413791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 842.415486] Call Trace: [ 842.416047] dump_stack+0x107/0x167 [ 842.416798] should_fail.cold+0x5/0xa [ 842.417584] ? create_object.isra.0+0x3a/0xa30 [ 842.418534] should_failslab+0x5/0x20 [ 842.419327] kmem_cache_alloc+0x5b/0x310 [ 842.420162] ? mark_held_locks+0x9e/0xe0 [ 842.420998] create_object.isra.0+0x3a/0xa30 [ 842.421903] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 842.422995] kmem_cache_alloc+0x159/0x310 [ 842.423876] xas_alloc+0x336/0x440 [ 842.424626] xas_create+0x34a/0x10d0 [ 842.425411] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 842.426496] xas_store+0x8c/0x1c40 [ 842.427239] __xa_store+0x164/0x2d0 [ 842.427984] ? xa_delete_node+0x280/0x280 [ 842.428854] ? trace_hardirqs_on+0x5b/0x180 [ 842.429742] xa_store+0x31/0x50 [ 842.430430] __io_uring_add_tctx_node+0x1cf/0x520 [ 842.431414] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 842.432520] ? alloc_fd+0x2e7/0x670 [ 842.433286] io_uring_setup+0x1fbb/0x2980 [ 842.434152] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 842.435192] ? wait_for_completion_io+0x270/0x270 [ 842.436194] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 842.437261] ? syscall_enter_from_user_mode+0x1d/0x50 [ 842.438328] do_syscall_64+0x33/0x40 [ 842.439085] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 842.440123] RIP: 0033:0x7fca3e213b19 [ 842.440879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.444637] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 842.446203] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 842.447668] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 842.449122] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 842.450593] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 842.452045] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 842.461013] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.6'. [ 842.471335] cgroup2: Unknown parameter './file0' [ 842.558542] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.6'. 03:13:57 executing program 6: io_setup(0x5e0, &(0x7f0000000180)=0x0) io_pgetevents(r0, 0x1, 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040), 0x0) io_setup(0x5e0, &(0x7f0000000180)=0x0) io_pgetevents(r1, 0x1, 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040), 0x0) io_setup(0x5e0, &(0x7f0000000180)=0x0) io_pgetevents(r2, 0x1, 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040), 0x0) io_setup(0x5e0, &(0x7f0000000180)=0x0) io_pgetevents(r3, 0x1, 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040), 0x0) io_setup(0x5e0, &(0x7f0000000180)=0x0) io_pgetevents(r4, 0x1, 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040), 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb58906d6b66702effffff7f02cad059501801ad19f8000020004000000000000000ceb76b294d3ad55ac11592a4fde6d67d828ad7ab3942d7c230d04a59bc8bac9132eb9a0064000000000000005c9ef6063090c3f364efccec8259510b13", 0x5f}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000380)=ANY=[@ANYRES16=r0, @ANYRESDEC=r1, @ANYRESOCT, @ANYRESHEX=r4, @ANYRES32, @ANYRES64]) chdir(&(0x7f0000000040)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000100)=ANY=[], 0x10) ftruncate(r5, 0x2) sendfile(r5, r6, 0x0, 0x100000001) 03:13:57 executing program 0: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02"}}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000340)=""/221, 0xdd}, {&(0x7f00000001c0)}, {&(0x7f0000000240)=""/95, 0x5f}, {&(0x7f0000000500)=""/135, 0x87}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, 0xbf8a, 0xf9) signalfd4(r5, &(0x7f0000000140)={[0x20]}, 0x8, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:13:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) sendmsg$nl_generic(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) connect$unix(r8, &(0x7f0000000040)=@file={0x1, './file1\x00'}, 0x6e) 03:13:57 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r3, 0xffffffffffffffff, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r6}) 03:13:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:13:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x10\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:13:57 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 63) [ 857.801117] loop6: detected capacity change from 0 to 32768 [ 857.829499] FAULT_INJECTION: forcing a failure. [ 857.829499] name failslab, interval 1, probability 0, space 0, times 0 [ 857.831965] CPU: 0 PID: 7250 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 857.833426] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 857.835200] Call Trace: [ 857.835763] dump_stack+0x107/0x167 [ 857.836541] should_fail.cold+0x5/0xa [ 857.837359] ? create_object.isra.0+0x3a/0xa30 [ 857.838329] should_failslab+0x5/0x20 [ 857.839130] kmem_cache_alloc+0x5b/0x310 [ 857.839983] ? mark_held_locks+0x9e/0xe0 03:13:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x14\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 857.840849] create_object.isra.0+0x3a/0xa30 [ 857.841959] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 857.843052] kmem_cache_alloc+0x159/0x310 [ 857.843595] loop7: detected capacity change from 0 to 135266304 [ 857.843945] xas_alloc+0x336/0x440 [ 857.845980] xas_create+0x34a/0x10d0 [ 857.846795] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 857.847917] xas_store+0x8c/0x1c40 [ 857.848691] __xa_store+0x164/0x2d0 [ 857.849479] ? xa_delete_node+0x280/0x280 [ 857.850385] ? trace_hardirqs_on+0x5b/0x180 [ 857.851314] xa_store+0x31/0x50 [ 857.852017] __io_uring_add_tctx_node+0x1cf/0x520 [ 857.853041] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 857.854171] ? alloc_fd+0x2e7/0x670 [ 857.854967] io_uring_setup+0x1fbb/0x2980 [ 857.855865] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 857.856942] ? wait_for_completion_io+0x270/0x270 [ 857.857998] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 857.859134] ? syscall_enter_from_user_mode+0x1d/0x50 [ 857.860243] do_syscall_64+0x33/0x40 [ 857.861035] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 857.862137] RIP: 0033:0x7fca3e213b19 [ 857.862924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 857.866848] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 857.868467] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 857.869984] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 857.871520] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 857.873037] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 857.874560] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 857.922887] FAT-fs (loop6): bogus logical sector size 639 [ 857.924203] FAT-fs (loop6): Can't find a valid FAT filesystem [ 857.928673] loop1: detected capacity change from 0 to 135266304 03:13:57 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) dup(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x6a70, @mcast2, 0xb2}, 0x1c) ppoll(&(0x7f0000000240)=[{r1, 0x19520}, {r2, 0x82}, {0xffffffffffffffff, 0xa109}, {}, {0xffffffffffffffff, 0x104ad}], 0x5, &(0x7f00000002c0), &(0x7f0000000440)={[0xb9]}, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000540)={{{@in=@private, @in=@private}}, {{@in=@loopback}, 0x0, @in6=@private1}}, &(0x7f00000001c0)=0xe8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x101100, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000280)=0x81, 0x9b0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x1f, 0x9, 0xd, 0x3, 0x0, 0xf50, 0x71035, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xb9f, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x40, 0x6, 0x576, 0x0, 0x0, 0x81, 0x3ff, 0x0, 0x7, 0x0, 0x20}, 0xffffffffffffffff, 0x4, r5, 0x3) 03:13:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x02\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 857.995006] loop6: detected capacity change from 0 to 32768 [ 858.030089] FAT-fs (loop6): bogus logical sector size 639 [ 858.031513] FAT-fs (loop6): Can't find a valid FAT filesystem 03:13:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r2, 0xffffffffffffffff, 0x0}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r5}) 03:13:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 858.207103] loop7: detected capacity change from 0 to 135266304 03:14:12 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 64) 03:14:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) sendmsg$nl_generic(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) connect$unix(r8, &(0x7f0000000040)=@file={0x1, './file1\x00'}, 0x6e) 03:14:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x03\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:14:12 executing program 6: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000e40)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x49c6, &(0x7f0000000380)={0x0, 0x5265, 0x2, 0xffffffff, 0x11b}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)) r5 = syz_io_uring_setup(0x7806, &(0x7f0000000480)={0x0, 0x55d3, 0x0, 0x3, 0x194}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000000140)) io_uring_enter(r5, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x349a, &(0x7f0000000040)={0x0, 0xe2b6, 0x8, 0x2, 0x299, 0x0, r5}, &(0x7f000037f000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r6, &(0x7f0000000180)=@IORING_OP_NOP={0x0, 0x3}, 0x0) dup(r3) sendfile(r1, r2, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) 03:14:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x6000, 0x2, &(0x7f00000002c0)) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r1, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x2aa00, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x81) ioctl$TUNSETQUEUE(r2, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'veth0_to_hsr\x00'}) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000008, 0x10010, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000140)) lseek(0xffffffffffffffff, 0x0, 0x1) acct(0x0) unshare(0x4a060400) 03:14:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) [ 872.329359] FAULT_INJECTION: forcing a failure. [ 872.329359] name failslab, interval 1, probability 0, space 0, times 0 [ 872.331716] CPU: 1 PID: 7294 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 872.333146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 872.334901] Call Trace: [ 872.335460] dump_stack+0x107/0x167 [ 872.336227] should_fail.cold+0x5/0xa [ 872.337026] ? xas_alloc+0x336/0x440 [ 872.337806] should_failslab+0x5/0x20 [ 872.338619] kmem_cache_alloc+0x5b/0x310 [ 872.339477] xas_alloc+0x336/0x440 [ 872.340224] xas_create+0x34a/0x10d0 [ 872.341019] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 872.342131] xas_store+0x8c/0x1c40 [ 872.342893] __xa_store+0x164/0x2d0 [ 872.343658] ? xa_delete_node+0x280/0x280 [ 872.344533] ? trace_hardirqs_on+0x5b/0x180 [ 872.345443] xa_store+0x31/0x50 [ 872.346146] __io_uring_add_tctx_node+0x1cf/0x520 [ 872.347155] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 872.348251] ? alloc_fd+0x2e7/0x670 [ 872.349031] io_uring_setup+0x1fbb/0x2980 [ 872.349912] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 872.350984] ? wait_for_completion_io+0x270/0x270 [ 872.352016] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 872.353110] ? syscall_enter_from_user_mode+0x1d/0x50 [ 872.354205] do_syscall_64+0x33/0x40 [ 872.354983] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 872.356051] RIP: 0033:0x7fca3e213b19 [ 872.356825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 872.360554] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 872.362142] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 872.363618] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 872.365087] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 872.366560] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 872.368026] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 872.380012] loop7: detected capacity change from 0 to 135266304 [ 872.398622] loop1: detected capacity change from 0 to 135266304 03:14:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x04\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:14:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) 03:14:12 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 65) 03:14:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 872.635865] FAULT_INJECTION: forcing a failure. [ 872.635865] name failslab, interval 1, probability 0, space 0, times 0 [ 872.637974] CPU: 0 PID: 7325 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 872.639173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 872.640517] Call Trace: [ 872.640939] dump_stack+0x107/0x167 [ 872.641516] should_fail.cold+0x5/0xa [ 872.642128] ? create_object.isra.0+0x3a/0xa30 [ 872.642854] should_failslab+0x5/0x20 [ 872.643459] kmem_cache_alloc+0x5b/0x310 [ 872.644103] ? mark_held_locks+0x9e/0xe0 [ 872.644747] create_object.isra.0+0x3a/0xa30 [ 872.645441] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 872.646258] kmem_cache_alloc+0x159/0x310 [ 872.646915] xas_alloc+0x336/0x440 [ 872.647484] xas_create+0x34a/0x10d0 [ 872.648072] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 872.648914] xas_store+0x8c/0x1c40 [ 872.649493] __xa_store+0x164/0x2d0 [ 872.650064] ? xa_delete_node+0x280/0x280 [ 872.650739] ? trace_hardirqs_on+0x5b/0x180 [ 872.651431] xa_store+0x31/0x50 [ 872.651961] __io_uring_add_tctx_node+0x1cf/0x520 [ 872.652721] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 872.653549] ? alloc_fd+0x2e7/0x670 [ 872.654141] io_uring_setup+0x1fbb/0x2980 [ 872.654805] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 872.655604] ? wait_for_completion_io+0x270/0x270 [ 872.656395] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 872.657226] ? syscall_enter_from_user_mode+0x1d/0x50 [ 872.658041] do_syscall_64+0x33/0x40 [ 872.658636] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 872.659450] RIP: 0033:0x7fca3e213b19 [ 872.660035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 872.662900] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 872.664121] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 872.665262] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 872.666390] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 872.667530] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 872.668670] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:14:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x05\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:14:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) 03:14:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) 03:14:27 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 66) 03:14:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x06\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:14:27 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000180)=0x2, 0x4) r3 = perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x80, 0x1, 0x7f, 0x9, 0x9, 0x0, 0xf1d7, 0x20001, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_config_ext={0x62, 0xa23}, 0x420, 0x6, 0xff, 0x9, 0x80000001, 0x1e, 0x7ff, 0x0, 0x3f, 0x0, 0x6}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) sendto$inet(r0, 0x0, 0x5f, 0x0, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) 03:14:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) sendmsg$nl_generic(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) connect$unix(r8, &(0x7f0000000040)=@file={0x1, './file1\x00'}, 0x6e) 03:14:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) [ 887.731815] FAULT_INJECTION: forcing a failure. [ 887.731815] name failslab, interval 1, probability 0, space 0, times 0 [ 887.734290] CPU: 0 PID: 7357 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 887.735723] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 887.737463] Call Trace: [ 887.738019] dump_stack+0x107/0x167 [ 887.738799] should_fail.cold+0x5/0xa [ 887.739607] ? create_object.isra.0+0x3a/0xa30 [ 887.740574] should_failslab+0x5/0x20 [ 887.741369] kmem_cache_alloc+0x5b/0x310 [ 887.742237] ? mark_held_locks+0x9e/0xe0 [ 887.743103] create_object.isra.0+0x3a/0xa30 [ 887.744018] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 887.745084] kmem_cache_alloc+0x159/0x310 [ 887.745969] xas_alloc+0x336/0x440 [ 887.746726] xas_create+0x34a/0x10d0 [ 887.747552] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 887.748658] xas_store+0x8c/0x1c40 [ 887.749431] __xa_store+0x164/0x2d0 [ 887.750230] ? xa_delete_node+0x280/0x280 [ 887.751118] ? trace_hardirqs_on+0x5b/0x180 [ 887.752046] xa_store+0x31/0x50 [ 887.752751] __io_uring_add_tctx_node+0x1cf/0x520 [ 887.753766] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 887.754890] ? alloc_fd+0x2e7/0x670 [ 887.755671] io_uring_setup+0x1fbb/0x2980 [ 887.756554] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 887.757627] ? wait_for_completion_io+0x270/0x270 [ 887.758691] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 887.759800] ? syscall_enter_from_user_mode+0x1d/0x50 [ 887.760896] do_syscall_64+0x33/0x40 [ 887.761680] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 887.762779] RIP: 0033:0x7fca3e213b19 [ 887.763566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 887.767460] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 887.769058] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 887.770582] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 887.772085] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 887.773585] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 887.775133] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:14:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) [ 887.794452] loop1: detected capacity change from 0 to 135266304 [ 887.819838] loop7: detected capacity change from 0 to 135266304 03:14:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) 03:14:27 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001900210c00000000000000000200000008000000", @ANYRES32=0x0, @ANYBLOB="0400000084f92a9194dd8a260e63aeb905004b9e9dcfe1be1b630152de9cf64d6b551bf083bfc6091b058c144f35645970eeb23a3e4e89919263954922074237045e7892630613bd1d48b061ceda80f87c59d3f0a48c0ff1b81732ab088aee2ea78fb1d8b7bd09c81ef15e7cc26c924ce50a8e70296e70d31cbc8395268046119a80ad813f6da12eecd7dcf7890c7b32e05e77065a332864f679d54e1357c8b6941d9c00157a4ba66738f800000000ca7bfb69d59c8d"], 0x20}}, 0x0) socket$netlink(0x10, 0x3, 0x5) 03:14:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) 03:14:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\a\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:14:27 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 67) 03:14:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) [ 888.069020] FAULT_INJECTION: forcing a failure. [ 888.069020] name failslab, interval 1, probability 0, space 0, times 0 [ 888.071490] CPU: 1 PID: 7392 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 888.072931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 888.074678] Call Trace: [ 888.075235] dump_stack+0x107/0x167 [ 888.076004] should_fail.cold+0x5/0xa [ 888.076806] ? create_object.isra.0+0x3a/0xa30 [ 888.077764] should_failslab+0x5/0x20 [ 888.078580] kmem_cache_alloc+0x5b/0x310 [ 888.079421] ? mark_held_locks+0x9e/0xe0 [ 888.080275] create_object.isra.0+0x3a/0xa30 [ 888.081204] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 888.082286] kmem_cache_alloc+0x159/0x310 [ 888.083160] xas_alloc+0x336/0x440 [ 888.083911] xas_create+0x34a/0x10d0 [ 888.084705] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 888.085807] xas_store+0x8c/0x1c40 [ 888.086594] __xa_store+0x164/0x2d0 [ 888.087357] ? xa_delete_node+0x280/0x280 [ 888.088239] ? trace_hardirqs_on+0x5b/0x180 [ 888.089151] xa_store+0x31/0x50 [ 888.089842] __io_uring_add_tctx_node+0x1cf/0x520 [ 888.090868] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 888.091984] ? alloc_fd+0x2e7/0x670 [ 888.092765] io_uring_setup+0x1fbb/0x2980 [ 888.093644] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 888.094724] ? wait_for_completion_io+0x270/0x270 [ 888.095762] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 888.096865] ? syscall_enter_from_user_mode+0x1d/0x50 [ 888.097945] do_syscall_64+0x33/0x40 [ 888.098741] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 888.099811] RIP: 0033:0x7fca3e213b19 [ 888.100586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 888.104476] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 888.106096] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 888.107630] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 888.109166] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 888.110689] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 888.112216] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:14:46 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="756d61736b3d3041940400e00c9bbdddfcc6caaa12099b3600bdba0c2a303030303000000000a989867d7d5a85720a8bd5e6cd064985e28630320a580ecd3c21349af68fb68c47eaee5018a641fb4963ffab32ab86da002656932958c96850119d6f0ba5006b70054b082e6e83d366fdaad901675803a30cfa058f0bd078e3f69041c8047c47a8879242612aa52a70ca679b2bbb6e1dcedb8af8c418bfe7645d836d3e9c103c16589907677f55d6447eebf6bab368763b2bfc28a9cc4661b96d1de76afdb852657eef49b5fffe69220674b545daf3bd2fccd95a31a313e9174577f94b6e3107"]) r1 = syz_io_uring_setup(0x7806, &(0x7f0000000480)={0x0, 0x55d3, 0x0, 0x3, 0x194}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x1000, 0xe}, 0x0) syz_io_uring_setup(0x4358, &(0x7f0000000080)={0x0, 0xc6be, 0x8, 0x0, 0xd4}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000100)=0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) syz_io_uring_submit(r2, r4, &(0x7f0000000140)=@IORING_OP_SEND={0x1a, 0x2, 0x0, r5, 0x0, &(0x7f00000001c0)="47bfda64b0f378121c701c85c5ec3f923795930c1182a310a81443e6971845fe9d09f9dce60574380e30626911d45a59f69dd98a74c7881bf75a6684485914438c11e3566e53f443974d7ef445670bee7f8672a73199d0b3fc8323b95e1822cb93b92d89b01f3becdac6f006df23158e3538b1c6d0f039f9a0e82ab6", 0x7c, 0xc000, 0x1}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000240)={r0, 0x4, 0xb223, 0x5}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x11, r6, 0x8000000) 03:14:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:46 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) sendmsg$nl_generic(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) 03:14:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) 03:14:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\b\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:14:46 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 68) 03:14:46 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) [ 906.155342] FAT-fs (loop6): Unrecognized mount option "umask=0A”" or missing value [ 906.170945] loop7: detected capacity change from 0 to 135266304 [ 906.189837] FAULT_INJECTION: forcing a failure. [ 906.189837] name failslab, interval 1, probability 0, space 0, times 0 [ 906.192352] CPU: 1 PID: 7420 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 906.193839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.195667] Call Trace: [ 906.196248] dump_stack+0x107/0x167 [ 906.197030] should_fail.cold+0x5/0xa [ 906.197850] ? xas_alloc+0x336/0x440 [ 906.198676] should_failslab+0x5/0x20 [ 906.199526] kmem_cache_alloc+0x5b/0x310 [ 906.200419] xas_alloc+0x336/0x440 [ 906.201191] xas_create+0x34a/0x10d0 [ 906.201997] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 906.203111] xas_store+0x8c/0x1c40 [ 906.203890] __xa_store+0x164/0x2d0 [ 906.204671] ? xa_delete_node+0x280/0x280 [ 906.205564] ? trace_hardirqs_on+0x5b/0x180 [ 906.206500] xa_store+0x31/0x50 [ 906.207208] __io_uring_add_tctx_node+0x1cf/0x520 [ 906.208241] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 906.209374] ? alloc_fd+0x2e7/0x670 [ 906.210166] io_uring_setup+0x1fbb/0x2980 [ 906.211086] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 906.212174] ? wait_for_completion_io+0x270/0x270 [ 906.213238] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 906.214380] ? syscall_enter_from_user_mode+0x1d/0x50 [ 906.215501] do_syscall_64+0x33/0x40 [ 906.216305] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 906.217414] RIP: 0033:0x7fca3e213b19 [ 906.218224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.222202] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 906.223829] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 906.225362] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 906.226907] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 906.228447] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 906.229969] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 906.247036] loop1: detected capacity change from 0 to 135266304 03:14:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) [ 906.304851] FAT-fs (loop6): Unrecognized mount option "umask=0A”" or missing value 03:14:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\n\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:14:46 executing program 6: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x80, 0x0) fremovexattr(r0, &(0x7f0000001740)=@random={'os2.', '\x00'}) flock(0xffffffffffffffff, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7002) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @broadcast}, {0x308}, 0xac1414bb, {0x2, 0x0, @broadcast}}) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x7, 0x1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8927, &(0x7f0000001880)={'batadv_slave_1\x00'}) statx(r4, &(0x7f0000001c40)='./file0\x00', 0x800, 0x40, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r4, &(0x7f0000002ec0)=[{{&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000004c0)="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", 0x1000}], 0x1, &(0x7f0000002e00)=[@rights={{0x1c, 0x1, 0x1, [r2, r3, r4]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, r5, r6, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, r7}}}], 0xb8, 0x4}}], 0x1, 0x840) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f00000000c0)={0x4, 0x28, 0x20, 0x10, 0xa, 0x7fff, 0x5, 0xd8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000000180)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 03:14:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:14:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:14:46 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 69) 03:14:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) [ 906.506771] FAULT_INJECTION: forcing a failure. [ 906.506771] name failslab, interval 1, probability 0, space 0, times 0 [ 906.509462] CPU: 0 PID: 7442 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 906.511238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.512981] Call Trace: [ 906.513540] dump_stack+0x107/0x167 [ 906.514303] should_fail.cold+0x5/0xa [ 906.515109] ? create_object.isra.0+0x3a/0xa30 [ 906.516047] should_failslab+0x5/0x20 [ 906.516838] kmem_cache_alloc+0x5b/0x310 [ 906.517682] ? mark_held_locks+0x9e/0xe0 [ 906.518540] create_object.isra.0+0x3a/0xa30 [ 906.519610] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.520672] kmem_cache_alloc+0x159/0x310 [ 906.521542] xas_alloc+0x336/0x440 [ 906.522316] xas_create+0x34a/0x10d0 [ 906.523092] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 906.524173] xas_store+0x8c/0x1c40 [ 906.524920] __xa_store+0x164/0x2d0 [ 906.525669] ? xa_delete_node+0x280/0x280 [ 906.526552] ? trace_hardirqs_on+0x5b/0x180 [ 906.527469] xa_store+0x31/0x50 [ 906.528150] __io_uring_add_tctx_node+0x1cf/0x520 [ 906.529149] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 906.530428] ? alloc_fd+0x2e7/0x670 [ 906.531374] io_uring_setup+0x1fbb/0x2980 [ 906.532269] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 906.533298] ? wait_for_completion_io+0x270/0x270 [ 906.534350] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 906.535685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 906.536772] do_syscall_64+0x33/0x40 [ 906.537729] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 906.538852] RIP: 0033:0x7fca3e213b19 [ 906.539825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.543938] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 906.545539] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 906.547083] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 906.548721] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 906.550403] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 906.551920] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:14:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x0f\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 906.656124] loop7: detected capacity change from 0 to 135266304 03:14:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:14:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) [ 906.698281] audit: type=1326 audit(1762830886.708:144): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 [ 906.703036] audit: type=1326 audit(1762830886.708:145): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 03:14:46 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 70) [ 906.710398] audit: type=1326 audit(1762830886.715:146): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 [ 906.727345] audit: type=1326 audit(1762830886.737:147): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 [ 906.732711] audit: type=1326 audit(1762830886.737:148): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 [ 906.740437] audit: type=1326 audit(1762830886.738:149): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 [ 906.747459] audit: type=1326 audit(1762830886.738:150): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 [ 906.802122] audit: type=1326 audit(1762830886.813:151): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 [ 906.806959] audit: type=1326 audit(1762830886.813:152): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 [ 906.828667] audit: type=1326 audit(1762830886.840:153): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7437 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7ffad9babb19 code=0x7ffc0000 [ 906.846109] FAULT_INJECTION: forcing a failure. [ 906.846109] name failslab, interval 1, probability 0, space 0, times 0 [ 906.848658] CPU: 0 PID: 7462 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 906.850133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.852274] Call Trace: [ 906.852971] dump_stack+0x107/0x167 [ 906.853760] should_fail.cold+0x5/0xa [ 906.854598] ? create_object.isra.0+0x3a/0xa30 [ 906.855572] should_failslab+0x5/0x20 [ 906.856384] kmem_cache_alloc+0x5b/0x310 [ 906.857247] ? mark_held_locks+0x9e/0xe0 [ 906.858106] create_object.isra.0+0x3a/0xa30 [ 906.859025] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.860113] kmem_cache_alloc+0x159/0x310 [ 906.860996] xas_alloc+0x336/0x440 [ 906.861727] xas_create+0x34a/0x10d0 [ 906.862527] ? queued_spin_lock_slowpath+0xcc/0x8c0 [ 906.863559] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 906.864672] xas_store+0x8c/0x1c40 [ 906.865455] __xa_store+0x164/0x2d0 [ 906.866222] ? xa_delete_node+0x280/0x280 [ 906.867106] ? trace_hardirqs_on+0x5b/0x180 [ 906.868006] xa_store+0x31/0x50 [ 906.868700] __io_uring_add_tctx_node+0x1cf/0x520 [ 906.869720] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 906.870841] ? alloc_fd+0x2e7/0x670 [ 906.871618] io_uring_setup+0x1fbb/0x2980 [ 906.872498] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 906.873553] ? wait_for_completion_io+0x270/0x270 [ 906.874588] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 906.875690] ? syscall_enter_from_user_mode+0x1d/0x50 [ 906.876792] do_syscall_64+0x33/0x40 [ 906.877574] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 906.878658] RIP: 0033:0x7fca3e213b19 [ 906.879448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.881574] loop6: detected capacity change from 0 to 16776704 [ 906.883272] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 906.883293] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 906.883304] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 906.883314] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 906.883324] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 906.883334] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 906.993820] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 906.993820] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 906.993820] [ 906.997503] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 03:14:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04H\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:14:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:14:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 907.053740] loop1: detected capacity change from 0 to 135266304 03:14:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r7, 0x0, r7) 03:14:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:14:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:14:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04L\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 907.257492] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 03:15:04 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 71) 03:15:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:15:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:15:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) socket$netlink(0x10, 0x3, 0x0) 03:15:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:15:04 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:15:04 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:15:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04h\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 924.408723] FAULT_INJECTION: forcing a failure. [ 924.408723] name failslab, interval 1, probability 0, space 0, times 0 [ 924.411975] CPU: 1 PID: 7518 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 924.413699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 924.415812] Call Trace: [ 924.416489] dump_stack+0x107/0x167 [ 924.417433] should_fail.cold+0x5/0xa [ 924.418037] loop6: detected capacity change from 0 to 135266304 [ 924.418430] ? create_object.isra.0+0x3a/0xa30 [ 924.418452] should_failslab+0x5/0x20 [ 924.418474] kmem_cache_alloc+0x5b/0x310 [ 924.418502] ? mark_held_locks+0x9e/0xe0 [ 924.423255] create_object.isra.0+0x3a/0xa30 [ 924.424356] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 924.425635] kmem_cache_alloc+0x159/0x310 [ 924.426689] xas_alloc+0x336/0x440 [ 924.427603] xas_create+0x34a/0x10d0 [ 924.428553] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 924.429876] xas_store+0x8c/0x1c40 [ 924.430802] __xa_store+0x164/0x2d0 [ 924.431724] ? xa_delete_node+0x280/0x280 [ 924.432785] ? trace_hardirqs_on+0x5b/0x180 [ 924.433881] xa_store+0x31/0x50 [ 924.434724] __io_uring_add_tctx_node+0x1cf/0x520 [ 924.435939] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 924.437262] ? alloc_fd+0x2e7/0x670 [ 924.438194] io_uring_setup+0x1fbb/0x2980 [ 924.439245] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 924.440399] ? wait_for_completion_io+0x270/0x270 [ 924.441531] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 924.442744] ? syscall_enter_from_user_mode+0x1d/0x50 [ 924.443932] do_syscall_64+0x33/0x40 [ 924.444787] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 924.445961] RIP: 0033:0x7fca3e213b19 [ 924.446819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.451058] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 924.452804] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 924.454448] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 924.456092] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 924.457725] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 924.459364] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 924.473671] loop1: detected capacity change from 0 to 135266304 [ 924.492549] loop7: detected capacity change from 0 to 135266304 03:15:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:15:04 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:15:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04l\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:15:19 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 72) 03:15:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:15:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) 03:15:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:15:19 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) sendmsg$nl_generic(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) 03:15:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04t\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:15:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:15:19 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) [ 939.494316] FAULT_INJECTION: forcing a failure. [ 939.494316] name failslab, interval 1, probability 0, space 0, times 0 [ 939.497211] CPU: 0 PID: 7560 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 939.498944] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 939.501024] Call Trace: [ 939.501696] dump_stack+0x107/0x167 [ 939.502631] should_fail.cold+0x5/0xa [ 939.503612] ? create_object.isra.0+0x3a/0xa30 [ 939.504758] should_failslab+0x5/0x20 [ 939.505720] kmem_cache_alloc+0x5b/0x310 [ 939.506750] ? mark_held_locks+0x9e/0xe0 [ 939.507787] create_object.isra.0+0x3a/0xa30 [ 939.508897] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 939.510190] kmem_cache_alloc+0x159/0x310 [ 939.511313] xas_alloc+0x336/0x440 [ 939.512208] xas_create+0x34a/0x10d0 [ 939.513160] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 939.514496] xas_store+0x8c/0x1c40 [ 939.515412] __xa_store+0x164/0x2d0 [ 939.516334] ? xa_delete_node+0x280/0x280 [ 939.517388] ? trace_hardirqs_on+0x5b/0x180 [ 939.518499] xa_store+0x31/0x50 [ 939.519121] loop7: detected capacity change from 0 to 135266304 [ 939.519328] __io_uring_add_tctx_node+0x1cf/0x520 [ 939.519349] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 939.519364] ? alloc_fd+0x2e7/0x670 [ 939.519396] io_uring_setup+0x1fbb/0x2980 [ 939.519424] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 939.519440] ? wait_for_completion_io+0x270/0x270 [ 939.519485] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 939.519504] ? syscall_enter_from_user_mode+0x1d/0x50 [ 939.519527] do_syscall_64+0x33/0x40 [ 939.529423] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 939.530516] RIP: 0033:0x7fca3e213b19 [ 939.531299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 939.535177] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 939.536775] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 939.538270] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 939.539784] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 939.541283] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 939.542794] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 939.562544] loop1: detected capacity change from 0 to 135266304 03:15:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 03:15:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:15:19 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 73) [ 939.801151] FAULT_INJECTION: forcing a failure. [ 939.801151] name failslab, interval 1, probability 0, space 0, times 0 [ 939.803749] CPU: 0 PID: 7581 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 939.805217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 939.806964] Call Trace: [ 939.807528] dump_stack+0x107/0x167 [ 939.808298] should_fail.cold+0x5/0xa [ 939.809101] ? create_object.isra.0+0x3a/0xa30 [ 939.810079] should_failslab+0x5/0x20 [ 939.810900] kmem_cache_alloc+0x5b/0x310 [ 939.811757] ? mark_held_locks+0x9e/0xe0 [ 939.812615] create_object.isra.0+0x3a/0xa30 [ 939.813538] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 939.814627] kmem_cache_alloc+0x159/0x310 [ 939.815519] xas_alloc+0x336/0x440 [ 939.816292] xas_create+0x34a/0x10d0 [ 939.817095] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 939.818216] xas_store+0x8c/0x1c40 [ 939.818995] __xa_store+0x164/0x2d0 [ 939.819766] ? xa_delete_node+0x280/0x280 [ 939.820650] ? trace_hardirqs_on+0x5b/0x180 [ 939.821576] xa_store+0x31/0x50 [ 939.822281] __io_uring_add_tctx_node+0x1cf/0x520 [ 939.823310] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 939.824419] ? alloc_fd+0x2e7/0x670 [ 939.825204] io_uring_setup+0x1fbb/0x2980 [ 939.826093] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 939.827172] ? wait_for_completion_io+0x270/0x270 [ 939.828222] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 939.829337] ? syscall_enter_from_user_mode+0x1d/0x50 [ 939.830443] do_syscall_64+0x33/0x40 [ 939.831238] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 939.832317] RIP: 0033:0x7fca3e213b19 [ 939.833104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 939.836978] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 939.838594] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 939.840095] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 939.841594] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 939.843112] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 939.844612] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:15:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04z\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:15:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:15:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) sendmsg$nl_generic(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) 03:15:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 03:15:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:15:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:15:35 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 74) 03:15:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) [ 955.463840] FAULT_INJECTION: forcing a failure. [ 955.463840] name failslab, interval 1, probability 0, space 0, times 0 [ 955.465236] CPU: 0 PID: 7599 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 955.466045] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 955.467043] Call Trace: [ 955.467379] dump_stack+0x107/0x167 [ 955.467812] should_fail.cold+0x5/0xa [ 955.468265] ? create_object.isra.0+0x3a/0xa30 [ 955.468822] should_failslab+0x5/0x20 [ 955.469280] kmem_cache_alloc+0x5b/0x310 [ 955.469771] ? mark_held_locks+0x9e/0xe0 [ 955.470256] create_object.isra.0+0x3a/0xa30 [ 955.470797] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 955.471408] kmem_cache_alloc+0x159/0x310 [ 955.471908] xas_alloc+0x336/0x440 [ 955.472346] xas_create+0x34a/0x10d0 [ 955.472811] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 955.473442] xas_store+0x8c/0x1c40 [ 955.473880] __xa_store+0x164/0x2d0 [ 955.474325] ? xa_delete_node+0x280/0x280 [ 955.474841] ? trace_hardirqs_on+0x5b/0x180 [ 955.475365] xa_store+0x31/0x50 [ 955.475760] __io_uring_add_tctx_node+0x1cf/0x520 [ 955.476342] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 955.476966] ? alloc_fd+0x2e7/0x670 [ 955.477412] io_uring_setup+0x1fbb/0x2980 [ 955.477910] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 955.478527] ? wait_for_completion_io+0x270/0x270 [ 955.479109] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 955.479734] ? syscall_enter_from_user_mode+0x1d/0x50 [ 955.480347] do_syscall_64+0x33/0x40 [ 955.480789] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 955.481404] RIP: 0033:0x7fca3e213b19 [ 955.481837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 955.484003] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 955.484912] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 955.485765] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 955.485975] loop7: detected capacity change from 0 to 135266304 [ 955.486621] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 955.486627] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 955.486634] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:15:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 03:15:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x03\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:15:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x804ebb, &(0x7f0000000340)={0x0, 0x1b9b, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:15:35 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 75) [ 955.578683] loop1: detected capacity change from 0 to 135266304 [ 955.641154] FAULT_INJECTION: forcing a failure. [ 955.641154] name failslab, interval 1, probability 0, space 0, times 0 [ 955.643284] CPU: 0 PID: 7624 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 955.644068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 955.645010] Call Trace: [ 955.645324] dump_stack+0x107/0x167 [ 955.645742] should_fail.cold+0x5/0xa [ 955.646176] ? create_object.isra.0+0x3a/0xa30 [ 955.646709] should_failslab+0x5/0x20 [ 955.647137] kmem_cache_alloc+0x5b/0x310 [ 955.647602] ? mark_held_locks+0x9e/0xe0 [ 955.648060] create_object.isra.0+0x3a/0xa30 [ 955.648561] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 955.649142] kmem_cache_alloc+0x159/0x310 [ 955.649620] xas_alloc+0x336/0x440 [ 955.650022] xas_create+0x34a/0x10d0 [ 955.650469] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 955.651072] xas_store+0x8c/0x1c40 [ 955.651492] __xa_store+0x164/0x2d0 [ 955.651919] ? xa_delete_node+0x280/0x280 [ 955.652399] ? trace_hardirqs_on+0x5b/0x180 [ 955.652892] xa_store+0x31/0x50 [ 955.653275] __io_uring_add_tctx_node+0x1cf/0x520 [ 955.653828] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 955.654445] ? alloc_fd+0x2e7/0x670 [ 955.654865] io_uring_setup+0x1fbb/0x2980 [ 955.655347] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 955.655922] ? wait_for_completion_io+0x270/0x270 [ 955.656483] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 955.657076] ? syscall_enter_from_user_mode+0x1d/0x50 [ 955.657663] do_syscall_64+0x33/0x40 [ 955.658086] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 955.658680] RIP: 0033:0x7fca3e213b19 [ 955.659098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 955.661184] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 955.662051] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 955.662869] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 955.663684] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 955.664495] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 955.665308] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:15:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x05\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:15:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x0, 0x0, 0x380, 0x0, 0x400036, r2}) 03:15:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) 03:15:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) 03:15:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x06\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:15:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400036, r2}) 03:15:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:15:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:15:51 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 76) 03:15:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) sendmsg$nl_generic(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x13, 0xc21}, 0x14}}, 0x0) [ 971.524566] FAULT_INJECTION: forcing a failure. [ 971.524566] name failslab, interval 1, probability 0, space 0, times 0 [ 971.527054] CPU: 0 PID: 7659 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 971.528535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.530339] Call Trace: [ 971.530947] dump_stack+0x107/0x167 [ 971.531737] should_fail.cold+0x5/0xa [ 971.532595] ? xas_alloc+0x336/0x440 [ 971.533551] should_failslab+0x5/0x20 [ 971.534395] kmem_cache_alloc+0x5b/0x310 [ 971.535304] xas_alloc+0x336/0x440 [ 971.536081] xas_create+0x34a/0x10d0 [ 971.536900] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 971.538030] xas_store+0x8c/0x1c40 [ 971.538837] __xa_store+0x164/0x2d0 [ 971.539622] ? xa_delete_node+0x280/0x280 [ 971.540528] ? trace_hardirqs_on+0x5b/0x180 [ 971.541459] xa_store+0x31/0x50 [ 971.542168] __io_uring_add_tctx_node+0x1cf/0x520 [ 971.543227] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 971.544356] ? alloc_fd+0x2e7/0x670 [ 971.545148] io_uring_setup+0x1fbb/0x2980 [ 971.546052] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 971.546652] loop1: detected capacity change from 0 to 135266304 [ 971.547162] ? wait_for_completion_io+0x270/0x270 [ 971.547209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.547230] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.547254] do_syscall_64+0x33/0x40 [ 971.547274] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.547287] RIP: 0033:0x7fca3e213b19 [ 971.547305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.547315] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 971.547336] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 971.547347] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 971.547358] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 971.547368] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 971.547379] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:15:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}) [ 971.599769] loop7: detected capacity change from 0 to 135266304 03:15:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\a\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:15:51 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 77) 03:15:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) 03:15:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}) [ 971.713589] FAULT_INJECTION: forcing a failure. [ 971.713589] name failslab, interval 1, probability 0, space 0, times 0 [ 971.716105] CPU: 0 PID: 7671 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 971.717580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.719397] Call Trace: [ 971.719973] dump_stack+0x107/0x167 [ 971.720767] should_fail.cold+0x5/0xa [ 971.721595] ? create_object.isra.0+0x3a/0xa30 [ 971.722613] should_failslab+0x5/0x20 [ 971.723441] kmem_cache_alloc+0x5b/0x310 [ 971.724318] ? mark_held_locks+0x9e/0xe0 [ 971.725197] create_object.isra.0+0x3a/0xa30 [ 971.726144] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 971.727266] kmem_cache_alloc+0x159/0x310 [ 971.728167] xas_alloc+0x336/0x440 [ 971.728935] xas_create+0x34a/0x10d0 [ 971.729748] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 971.730904] xas_store+0x8c/0x1c40 [ 971.731692] __xa_store+0x164/0x2d0 [ 971.732486] ? xa_delete_node+0x280/0x280 [ 971.733385] ? trace_hardirqs_on+0x5b/0x180 [ 971.734322] xa_store+0x31/0x50 [ 971.735066] __io_uring_add_tctx_node+0x1cf/0x520 [ 971.736108] ? io_uring_alloc_task_context+0x6a0/0x6a0 [ 971.737235] ? alloc_fd+0x2e7/0x670 [ 971.738029] io_uring_setup+0x1fbb/0x2980 [ 971.738958] ? __do_sys_io_uring_enter+0x1890/0x1890 [ 971.740049] ? wait_for_completion_io+0x270/0x270 [ 971.741109] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.742239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.743373] do_syscall_64+0x33/0x40 [ 971.744172] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.745277] RIP: 0033:0x7fca3e213b19 [ 971.746080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.750038] RSP: 002b:00007fca3b789108 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 971.751716] RAX: ffffffffffffffda RBX: 00007fca3e326f60 RCX: 00007fca3e213b19 [ 971.753251] RDX: 0000000020fff000 RSI: 0000000020000540 RDI: 00000000000028bb [ 971.754817] RBP: 0000000020000540 R08: 0000000020000600 R09: 0000000020000600 [ 971.756359] R10: 00000000200005c0 R11: 0000000000000202 R12: 0000000020000600 [ 971.757895] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:15:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) 03:15:51 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 78) 03:15:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) [ 971.960410] FAULT_INJECTION: forcing a failure. [ 971.960410] name failslab, interval 1, probability 0, space 0, times 0 [ 971.963319] CPU: 0 PID: 7687 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 971.964803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.966625] Call Trace: [ 971.967196] dump_stack+0x107/0x167 [ 971.967978] should_fail.cold+0x5/0xa [ 971.968797] ? vm_area_dup+0x78/0x290 [ 971.969621] should_failslab+0x5/0x20 [ 971.970451] kmem_cache_alloc+0x5b/0x310 [ 971.971346] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 971.972479] vm_area_dup+0x78/0x290 [ 971.973259] ? SOFTIRQ_verbose+0x10/0x10 [ 971.974136] ? mark_lock+0xf5/0x2df0 [ 971.974974] ? lock_chain_count+0x20/0x20 [ 971.975864] ? mark_lock+0xf5/0x2df0 [ 971.976671] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 971.977787] ? lock_chain_count+0x20/0x20 [ 971.978698] ? _raw_spin_unlock_irq+0x1f/0x30 [ 971.979664] ? trace_hardirqs_on+0x5b/0x180 [ 971.980596] ? mark_lock+0xf5/0x2df0 [ 971.981401] ? vm_area_alloc+0x110/0x110 [ 971.982280] ? __lock_acquire+0x1657/0x5b00 [ 971.983247] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 971.984375] ? SOFTIRQ_verbose+0x10/0x10 [ 971.985246] ? vmacache_find+0x55/0x2a0 [ 971.986106] __split_vma+0xa8/0x4e0 [ 971.986918] __do_munmap+0x365/0x1260 [ 971.987738] ? arch_get_unmapped_area+0x450/0x450 [ 971.988774] ? lock_release+0x680/0x680 [ 971.989628] mmap_region+0x7cc/0x1500 [ 971.990484] do_mmap+0x868/0x1370 [ 971.991246] vm_mmap_pgoff+0x198/0x1f0 [ 971.992086] ? randomize_page+0xb0/0xb0 [ 971.992955] ksys_mmap_pgoff+0x41c/0x560 [ 971.993827] ? find_mergeable_anon_vma+0x250/0x250 [ 971.994907] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.996035] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.997148] do_syscall_64+0x33/0x40 [ 971.997952] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.999082] RIP: 0033:0x7fca3e213b62 [ 971.999882] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 972.003869] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 972.005512] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 972.007075] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 972.008623] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 972.010148] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 972.011685] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:16:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) 03:16:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}) 03:16:07 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) 03:16:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) 03:16:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(0x0, 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:16:07 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:16:07 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 79) 03:16:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\n\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 987.843557] FAULT_INJECTION: forcing a failure. [ 987.843557] name failslab, interval 1, probability 0, space 0, times 0 [ 987.844940] CPU: 0 PID: 7708 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 987.845722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.846687] Call Trace: [ 987.846997] dump_stack+0x107/0x167 [ 987.847417] should_fail.cold+0x5/0xa [ 987.847861] ? create_object.isra.0+0x3a/0xa30 [ 987.848393] should_failslab+0x5/0x20 [ 987.848832] kmem_cache_alloc+0x5b/0x310 [ 987.849305] create_object.isra.0+0x3a/0xa30 [ 987.849814] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 987.850409] kmem_cache_alloc+0x159/0x310 [ 987.850906] vm_area_dup+0x78/0x290 [ 987.851333] ? lock_release+0x680/0x680 [ 987.851786] ? mark_lock+0xf5/0x2df0 [ 987.852211] ? lock_chain_count+0x20/0x20 [ 987.852677] ? mark_lock+0xf5/0x2df0 [ 987.853110] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.853701] ? lock_chain_count+0x20/0x20 [ 987.854184] ? mark_lock+0xf5/0x2df0 [ 987.854622] ? vm_area_alloc+0x110/0x110 [ 987.855092] ? __lock_acquire+0x1657/0x5b00 [ 987.855605] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.856205] ? SOFTIRQ_verbose+0x10/0x10 [ 987.856667] ? vmacache_find+0x55/0x2a0 [ 987.857127] __split_vma+0xa8/0x4e0 [ 987.857544] __do_munmap+0x365/0x1260 [ 987.857989] ? arch_get_unmapped_area+0x450/0x450 [ 987.858539] ? lock_release+0x680/0x680 [ 987.858988] mmap_region+0x7cc/0x1500 [ 987.859428] do_mmap+0x868/0x1370 [ 987.859828] vm_mmap_pgoff+0x198/0x1f0 [ 987.860271] ? randomize_page+0xb0/0xb0 [ 987.860729] ksys_mmap_pgoff+0x41c/0x560 [ 987.861185] ? find_mergeable_anon_vma+0x250/0x250 [ 987.861752] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 987.862347] ? syscall_enter_from_user_mode+0x1d/0x50 [ 987.862944] do_syscall_64+0x33/0x40 [ 987.863378] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 987.863980] RIP: 0033:0x7fca3e213b62 [ 987.864404] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 987.866480] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 987.867355] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 987.868161] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 987.868964] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 987.869773] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 987.870593] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 987.875765] loop1: detected capacity change from 0 to 135266304 03:16:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r2}) [ 987.916318] loop7: detected capacity change from 0 to 135266304 03:16:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400036}) 03:16:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x0f\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:16:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(0x0, 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:16:08 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 80) [ 988.018007] FAULT_INJECTION: forcing a failure. [ 988.018007] name failslab, interval 1, probability 0, space 0, times 0 [ 988.019364] CPU: 0 PID: 7736 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 988.020145] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.021095] Call Trace: [ 988.021415] dump_stack+0x107/0x167 [ 988.021837] should_fail.cold+0x5/0xa [ 988.022282] ? anon_vma_clone+0xdc/0x590 [ 988.022758] should_failslab+0x5/0x20 [ 988.023199] kmem_cache_alloc+0x5b/0x310 [ 988.023674] anon_vma_clone+0xdc/0x590 [ 988.024123] __split_vma+0x17c/0x4e0 [ 988.024548] __do_munmap+0x365/0x1260 [ 988.024979] ? arch_get_unmapped_area+0x450/0x450 [ 988.025544] ? lock_release+0x680/0x680 [ 988.025996] mmap_region+0x7cc/0x1500 [ 988.026447] do_mmap+0x868/0x1370 [ 988.026863] vm_mmap_pgoff+0x198/0x1f0 [ 988.027307] ? randomize_page+0xb0/0xb0 [ 988.027770] ksys_mmap_pgoff+0x41c/0x560 [ 988.028235] ? find_mergeable_anon_vma+0x250/0x250 [ 988.028802] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 988.029408] ? syscall_enter_from_user_mode+0x1d/0x50 [ 988.029992] do_syscall_64+0x33/0x40 [ 988.030420] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 988.031005] RIP: 0033:0x7fca3e213b62 [ 988.031428] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 988.033530] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 988.034417] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 988.035235] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 988.036066] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 988.036876] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 988.037704] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:16:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00H\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400036}) 03:16:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400036}) 03:16:08 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 81) [ 988.131254] FAULT_INJECTION: forcing a failure. [ 988.131254] name failslab, interval 1, probability 0, space 0, times 0 [ 988.132630] CPU: 0 PID: 7750 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 988.133405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.134349] Call Trace: [ 988.134670] dump_stack+0x107/0x167 [ 988.135081] should_fail.cold+0x5/0xa [ 988.135514] ? create_object.isra.0+0x3a/0xa30 [ 988.136028] should_failslab+0x5/0x20 [ 988.136459] kmem_cache_alloc+0x5b/0x310 [ 988.136919] create_object.isra.0+0x3a/0xa30 [ 988.137425] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 988.137997] kmem_cache_alloc+0x159/0x310 [ 988.138472] anon_vma_clone+0xdc/0x590 [ 988.138923] __split_vma+0x17c/0x4e0 [ 988.139351] __do_munmap+0x365/0x1260 [ 988.139790] ? arch_get_unmapped_area+0x450/0x450 [ 988.140342] ? lock_release+0x680/0x680 [ 988.140793] mmap_region+0x7cc/0x1500 [ 988.141234] do_mmap+0x868/0x1370 [ 988.141634] vm_mmap_pgoff+0x198/0x1f0 [ 988.142076] ? randomize_page+0xb0/0xb0 [ 988.142545] ksys_mmap_pgoff+0x41c/0x560 [ 988.143005] ? find_mergeable_anon_vma+0x250/0x250 [ 988.143559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 988.144152] ? syscall_enter_from_user_mode+0x1d/0x50 [ 988.144734] do_syscall_64+0x33/0x40 [ 988.145157] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 988.145737] RIP: 0033:0x7fca3e213b62 [ 988.146158] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 988.148244] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 988.149110] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 988.149910] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 988.150719] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 988.151516] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 988.152323] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:16:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}}, 0x3) 03:16:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(0x0, 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:16:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:16:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 03:16:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00L\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:16:21 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 82) 03:16:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 1001.128408] FAULT_INJECTION: forcing a failure. [ 1001.128408] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.130845] CPU: 1 PID: 7761 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1001.132285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1001.134017] Call Trace: [ 1001.134584] dump_stack+0x107/0x167 [ 1001.135346] should_fail.cold+0x5/0xa [ 1001.136141] ? vm_area_alloc+0x1c/0x110 [ 1001.136974] should_failslab+0x5/0x20 [ 1001.137776] kmem_cache_alloc+0x5b/0x310 [ 1001.138648] vm_area_alloc+0x1c/0x110 [ 1001.139309] loop5: detected capacity change from 0 to 135266304 [ 1001.139452] mmap_region+0x982/0x1500 [ 1001.141070] do_mmap+0x868/0x1370 [ 1001.141811] vm_mmap_pgoff+0x198/0x1f0 [ 1001.142644] ? randomize_page+0xb0/0xb0 [ 1001.143513] ksys_mmap_pgoff+0x41c/0x560 [ 1001.144372] ? find_mergeable_anon_vma+0x250/0x250 [ 1001.145410] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1001.146522] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1001.147622] do_syscall_64+0x33/0x40 [ 1001.148408] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1001.149487] RIP: 0033:0x7fca3e213b62 [ 1001.150270] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1001.154152] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1001.155770] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 1001.157286] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 1001.158791] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 1001.160300] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 1001.161808] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:16:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00h\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 1001.253942] loop7: detected capacity change from 0 to 135266304 [ 1001.280850] loop1: detected capacity change from 0 to 135266304 03:16:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:16:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00l\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:16:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) 03:16:36 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) 03:16:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:16:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:16:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00t\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:36 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 83) 03:16:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:16:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 1016.738911] FAULT_INJECTION: forcing a failure. [ 1016.738911] name failslab, interval 1, probability 0, space 0, times 0 [ 1016.741418] CPU: 1 PID: 7818 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1016.742869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1016.744616] Call Trace: [ 1016.745182] dump_stack+0x107/0x167 [ 1016.745952] should_fail.cold+0x5/0xa [ 1016.746779] ? create_object.isra.0+0x3a/0xa30 [ 1016.747733] should_failslab+0x5/0x20 [ 1016.748549] kmem_cache_alloc+0x5b/0x310 [ 1016.749417] create_object.isra.0+0x3a/0xa30 [ 1016.750339] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1016.751432] kmem_cache_alloc+0x159/0x310 [ 1016.752317] vm_area_alloc+0x1c/0x110 [ 1016.753124] mmap_region+0x982/0x1500 [ 1016.753947] do_mmap+0x868/0x1370 [ 1016.754710] vm_mmap_pgoff+0x198/0x1f0 [ 1016.755536] ? randomize_page+0xb0/0xb0 [ 1016.756395] ksys_mmap_pgoff+0x41c/0x560 [ 1016.757268] ? find_mergeable_anon_vma+0x250/0x250 [ 1016.758326] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1016.759463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1016.760568] do_syscall_64+0x33/0x40 [ 1016.761361] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1016.762462] RIP: 0033:0x7fca3e213b62 [ 1016.763260] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1016.767181] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1016.768811] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 1016.770332] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 1016.771859] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 1016.773387] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 1016.774914] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 1016.803749] loop7: detected capacity change from 0 to 135266304 [ 1016.813617] loop1: detected capacity change from 0 to 135266304 03:16:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036}) 03:16:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00z\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:37 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 84) 03:16:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) [ 1017.127584] FAULT_INJECTION: forcing a failure. [ 1017.127584] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.130086] CPU: 1 PID: 7847 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1017.131544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1017.133293] Call Trace: [ 1017.133856] dump_stack+0x107/0x167 [ 1017.134638] should_fail.cold+0x5/0xa [ 1017.135446] ? create_object.isra.0+0x3a/0xa30 [ 1017.136411] should_failslab+0x5/0x20 [ 1017.137217] kmem_cache_alloc+0x5b/0x310 [ 1017.138095] create_object.isra.0+0x3a/0xa30 [ 1017.139034] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1017.140120] kmem_cache_alloc+0x159/0x310 [ 1017.141007] anon_vma_clone+0xdc/0x590 [ 1017.141839] __split_vma+0x17c/0x4e0 [ 1017.142645] __do_munmap+0x365/0x1260 [ 1017.143460] ? arch_get_unmapped_area+0x450/0x450 [ 1017.144489] ? lock_release+0x680/0x680 [ 1017.145337] mmap_region+0x7cc/0x1500 [ 1017.146163] do_mmap+0x868/0x1370 [ 1017.146924] vm_mmap_pgoff+0x198/0x1f0 [ 1017.147752] ? randomize_page+0xb0/0xb0 [ 1017.148621] ksys_mmap_pgoff+0x41c/0x560 [ 1017.149489] ? find_mergeable_anon_vma+0x250/0x250 [ 1017.150539] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1017.151664] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1017.152768] do_syscall_64+0x33/0x40 [ 1017.153558] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1017.154655] RIP: 0033:0x7fca3e213b62 [ 1017.155445] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1017.159348] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 03:16:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x02\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) [ 1017.160967] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 1017.162686] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 1017.164201] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 1017.165703] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 1017.167213] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:16:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:16:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) [ 1017.321900] loop1: detected capacity change from 0 to 135266304 03:16:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:16:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) 03:16:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x03\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) 03:16:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r4, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:16:55 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 85) [ 1035.037030] FAULT_INJECTION: forcing a failure. [ 1035.037030] name failslab, interval 1, probability 0, space 0, times 0 [ 1035.040019] CPU: 0 PID: 7877 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1035.041766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1035.043893] Call Trace: [ 1035.044568] dump_stack+0x107/0x167 [ 1035.045510] should_fail.cold+0x5/0xa [ 1035.046481] ? ptlock_alloc+0x1d/0x70 [ 1035.047447] should_failslab+0x5/0x20 [ 1035.048417] kmem_cache_alloc+0x5b/0x310 [ 1035.049465] ptlock_alloc+0x1d/0x70 [ 1035.050387] pte_alloc_one+0x68/0x1a0 [ 1035.051362] __pte_alloc+0x1d/0x330 [ 1035.052298] remap_pfn_range_internal+0x9a3/0xf60 [ 1035.053530] ? lookup_memtype+0x5b/0x200 [ 1035.054577] ? apply_to_existing_page_range+0x40/0x40 [ 1035.055920] remap_pfn_range+0xcd/0x160 [ 1035.056942] ? remap_pfn_range_notrack+0x70/0x70 [ 1035.058152] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1035.059477] io_uring_mmap+0x398/0x530 [ 1035.060471] mmap_file+0x5e/0xe0 [ 1035.061333] mmap_region+0xc4d/0x1500 [ 1035.062320] do_mmap+0x868/0x1370 [ 1035.063240] vm_mmap_pgoff+0x198/0x1f0 [ 1035.064240] ? randomize_page+0xb0/0xb0 [ 1035.065278] ksys_mmap_pgoff+0x41c/0x560 [ 1035.066312] ? find_mergeable_anon_vma+0x250/0x250 [ 1035.067687] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1035.069053] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1035.070371] do_syscall_64+0x33/0x40 [ 1035.071332] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1035.072646] RIP: 0033:0x7fca3e213b62 [ 1035.073608] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1035.078355] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1035.080311] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 1035.082142] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 1035.083958] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 1035.085930] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 1035.087534] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 1035.105223] ------------[ cut here ]------------ [ 1035.106463] WARNING: CPU: 1 PID: 7877 at arch/x86/mm/pat/memtype.c:1019 get_pat_info+0x216/0x270 [ 1035.108374] Modules linked in: [ 1035.109071] CPU: 1 PID: 7877 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1035.110543] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1035.112344] RIP: 0010:get_pat_info+0x216/0x270 [ 1035.113336] Code: c1 ea 03 80 3c 02 00 75 71 49 89 1e eb 8e e8 31 89 2e 00 0f 0b e9 97 fe ff ff 41 bc ea ff ff ff e9 77 ff ff ff e8 1a 89 2e 00 <0f> 0b 41 bc ea ff ff ff e9 65 ff ff ff 4c 89 ff e8 a5 a2 5a 00 e9 [ 1035.117257] RSP: 0018:ffff88804ee37890 EFLAGS: 00010216 [ 1035.118406] RAX: 00000000000131df RBX: ffff88800ce8bf00 RCX: ffffc90004a10000 [ 1035.119939] RDX: 0000000000040000 RSI: ffffffff81124466 RDI: 0000000000000007 [ 1035.121481] RBP: ffff88804ee37948 R08: 0000000000000000 R09: ffff88804ee37818 [ 1035.123041] R10: 0000000000000020 R11: 0000000000000001 R12: 0000000000000028 [ 1035.128751] R13: 1ffff11009dc6f12 R14: 0000000000000000 R15: ffff88800ce8bf50 [ 1035.131648] FS: 00007fca3b789700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1035.133411] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1035.134669] CR2: 0000555560f75708 CR3: 000000000b8de000 CR4: 0000000000350ee0 [ 1035.136225] Call Trace: [ 1035.136791] ? pgprot_writethrough+0xc0/0xc0 [ 1035.137772] ? finish_task_switch+0x126/0x5d0 [ 1035.138759] ? finish_task_switch+0xef/0x5d0 [ 1035.139735] untrack_pfn+0xdc/0x240 [ 1035.140535] ? track_pfn_insert+0x150/0x150 [ 1035.141476] ? lock_downgrade+0x6d0/0x6d0 [ 1035.142381] ? uprobe_munmap+0x95/0x560 [ 1035.143261] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1035.144421] unmap_single_vma+0x1bc/0x300 [ 1035.145356] zap_page_range_single+0x2ce/0x450 [ 1035.146358] ? unmap_single_vma+0x300/0x300 [ 1035.147317] ? remap_pfn_range_internal+0xc56/0xf60 [ 1035.148416] ? lookup_memtype+0x5b/0x200 [ 1035.149420] ? apply_to_existing_page_range+0x40/0x40 [ 1035.150582] remap_pfn_range+0x139/0x160 [ 1035.151494] ? remap_pfn_range_notrack+0x70/0x70 [ 1035.152546] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1035.153684] io_uring_mmap+0x398/0x530 [ 1035.154544] mmap_file+0x5e/0xe0 [ 1035.155305] mmap_region+0xc4d/0x1500 [ 1035.156144] do_mmap+0x868/0x1370 [ 1035.156935] vm_mmap_pgoff+0x198/0x1f0 [ 1035.157826] ? randomize_page+0xb0/0xb0 [ 1035.158932] ksys_mmap_pgoff+0x41c/0x560 [ 1035.159871] ? find_mergeable_anon_vma+0x250/0x250 [ 1035.160962] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1035.162116] ? syscall_enter_from_user_mode+0x1d/0x50 03:16:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) 03:16:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x8001) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3f, 0xf8, 0x1, 0xfffffffffffffffa, 0x3, 0x3e, 0x1, 0x124, 0x40, 0xb1, 0xfffffff8, 0xffff, 0x38, 0x2, 0xfffc, 0x3ff, 0xc1b0}, [{0x1474e554, 0x1ff, 0x2, 0x4, 0x2, 0x2, 0x5}, {0x1, 0x7ff, 0x0, 0x1000, 0x4, 0x6, 0x0, 0x3}], "7268bd7295524438af8879068e4125e82159e0ed356b9830ae57876421e635a4590ed32dd751f84c8fe8084e8bdc864c51563a27c351388db985d294920c"}, 0xee) 03:16:55 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@private0, @private1, @loopback, 0x0, 0x9, 0x0, 0x380, 0x0, 0x400036, r1}) 03:16:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x04\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:16:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1035.163272] do_syscall_64+0x33/0x40 [ 1035.164250] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1035.165379] RIP: 0033:0x7fca3e213b62 [ 1035.166203] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1035.170161] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1035.171850] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 1035.173408] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 1035.174968] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 1035.176547] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 1035.178123] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 [ 1035.179701] irq event stamp: 1131 [ 1035.180485] hardirqs last enabled at (1141): [] console_unlock+0x92d/0xb40 [ 1035.182330] hardirqs last disabled at (1150): [] console_unlock+0x839/0xb40 [ 1035.184196] softirqs last enabled at (578): [] asm_call_irq_on_stack+0x12/0x20 [ 1035.186119] softirqs last disabled at (525): [] asm_call_irq_on_stack+0x12/0x20 [ 1035.188023] ---[ end trace be932075a2a31c03 ]--- [ 1035.198593] loop1: detected capacity change from 0 to 135266304 [ 1035.239771] loop7: detected capacity change from 0 to 135266304 03:16:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x05\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 03:16:55 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_io_uring_setup(0x28bb, &(0x7f0000000540)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) (fail_nth: 86) 03:16:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2203, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r4, 0x4, 0x2800) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:16:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x06\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 03:16:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) [ 1035.517421] FAULT_INJECTION: forcing a failure. [ 1035.517421] name failslab, interval 1, probability 0, space 0, times 0 [ 1035.519872] CPU: 0 PID: 7914 Comm: syz-executor.3 Tainted: G W 5.10.246 #1 [ 1035.521600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1035.523368] Call Trace: [ 1035.523938] dump_stack+0x107/0x167 [ 1035.524722] should_fail.cold+0x5/0xa [ 1035.525548] ? create_object.isra.0+0x3a/0xa30 [ 1035.526512] should_failslab+0x5/0x20 [ 1035.527339] kmem_cache_alloc+0x5b/0x310 [ 1035.528200] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1035.529477] create_object.isra.0+0x3a/0xa30 [ 1035.530400] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1035.531487] kmem_cache_alloc+0x159/0x310 [ 1035.532391] ptlock_alloc+0x1d/0x70 [ 1035.533168] pte_alloc_one+0x68/0x1a0 [ 1035.533979] __pte_alloc+0x1d/0x330 [ 1035.534761] remap_pfn_range_internal+0x9a3/0xf60 [ 1035.535792] ? lookup_memtype+0x5b/0x200 [ 1035.536668] ? apply_to_existing_page_range+0x40/0x40 [ 1035.537776] remap_pfn_range+0xcd/0x160 [ 1035.538616] ? remap_pfn_range_notrack+0x70/0x70 [ 1035.539636] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1035.540739] io_uring_mmap+0x398/0x530 [ 1035.541572] mmap_file+0x5e/0xe0 [ 1035.542289] mmap_region+0xc4d/0x1500 [ 1035.543125] do_mmap+0x868/0x1370 [ 1035.543870] vm_mmap_pgoff+0x198/0x1f0 [ 1035.544700] ? randomize_page+0xb0/0xb0 [ 1035.545560] ksys_mmap_pgoff+0x41c/0x560 [ 1035.546420] ? find_mergeable_anon_vma+0x250/0x250 [ 1035.547481] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1035.548595] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1035.549706] do_syscall_64+0x33/0x40 [ 1035.550501] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1035.551596] RIP: 0033:0x7fca3e213b62 [ 1035.552385] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 1035.556291] RSP: 002b:00007fca3b7890f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 1035.557910] RAX: ffffffffffffffda RBX: 0000000000008011 RCX: 00007fca3e213b62 [ 1035.559427] RDX: 0000000000000003 RSI: 0000000000090140 RDI: 0000000020fff000 [ 1035.560938] RBP: 0000000020fff000 R08: 0000000000000004 R09: 0000000000000000 [ 1035.562458] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000600 [ 1035.563973] R13: 0000000020fff000 R14: 00000000200005c0 R15: 0000000020fff000 03:16:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="11da543f250f188000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', 0x0) statx(r2, 0x0, 0x400, 0x800, &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d", 0xbb, 0xb800}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}]}) VM DIAGNOSIS: 03:16:55 Registers: info registers vcpu 0 RAX=1ffffffff0a12833 RBX=1ffff11008c30f82 RCX=0000000000000000 RDX=dffffc0000000000 RSI=ffffffff85094180 RDI=ffffffff84f00180 RBP=ffff888046187cb8 RSP=ffff888046187bd0 R8 =0000000000000000 R9 =0000000000000001 R10=fffffbfff0acf599 R11=0000000000000001 R12=ffff888046187c90 R13=ffffffff85094180 R14=0000000000000000 R15=ffffffff84f00180 RIP=ffffffff8126363f RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f99ea840700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe6300000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d323000 CR3=00000000202aa000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f99ed3b17c000007f99ed3b17c8 XMM02=00007f99ed3b17e000007f99ed3b17c0 XMM03=00007f99ed3b17c800007f99ed3b17c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000003a RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822e5c51 RDI=ffffffff879f8240 RBP=ffffffff879f8200 RSP=ffff88804ee372a8 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=000000000000003a R13=000000000000003a R14=ffffffff879f8200 R15=dffffc0000000000 RIP=ffffffff822e5ca8 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fca3b789700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe6b00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555560f75708 CR3=000000000b8de000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000