d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) [ 1411.382528] FAULT_INJECTION: forcing a failure. [ 1411.382528] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.385023] CPU: 1 PID: 8093 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1411.386523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1411.388329] Call Trace: [ 1411.388909] dump_stack+0x107/0x167 [ 1411.389685] should_fail.cold+0x5/0xa [ 1411.390504] ? __iomap_dio_rw+0x1ee/0x1110 [ 1411.391400] should_failslab+0x5/0x20 [ 1411.392228] kmem_cache_alloc_trace+0x55/0x320 [ 1411.393210] __iomap_dio_rw+0x1ee/0x1110 [ 1411.394092] ? lock_release+0x680/0x680 [ 1411.394940] ? fsnotify+0x1570/0x1570 [ 1411.395763] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1411.396739] ? down_read_trylock+0x193/0x350 [ 1411.397691] ? ext4_file_read_iter+0x356/0x4c0 [ 1411.398684] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1411.399757] iomap_dio_rw+0x31/0x90 [ 1411.400530] ext4_file_read_iter+0x2c7/0x4c0 [ 1411.401463] ? ext4_release_file+0x380/0x380 [ 1411.402399] io_read+0x2dc/0x11e0 [ 1411.403165] ? kiocb_done+0xc90/0xc90 [ 1411.403982] ? mark_lock+0xf5/0x2df0 [ 1411.404793] ? lock_chain_count+0x20/0x20 [ 1411.405686] ? stack_trace_consume_entry+0x160/0x160 [ 1411.406787] ? lock_acquire+0x197/0x470 [ 1411.407650] ? __lock_acquire+0xbb1/0x5b00 [ 1411.408562] io_issue_sqe+0x2e8a/0x77b0 [ 1411.409417] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1411.410556] ? lock_chain_count+0x20/0x20 [ 1411.411682] ? __is_insn_slot_addr+0x14c/0x290 [ 1411.412961] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1411.414430] ? io_connect+0x610/0x610 [ 1411.415517] ? lock_acquire+0x197/0x470 [ 1411.416480] ? find_held_lock+0x2c/0x110 [ 1411.417380] ? __fget_files+0x2cf/0x520 [ 1411.418240] ? lock_downgrade+0x6d0/0x6d0 [ 1411.419151] __io_queue_sqe+0x90/0x9d0 [ 1411.419995] ? io_issue_sqe+0x77b0/0x77b0 [ 1411.421010] ? __fget_files+0x2f8/0x520 [ 1411.421880] ? io_prep_rw+0x7f5/0x1050 [ 1411.422737] io_submit_sqes+0x44aa/0x8610 [ 1411.423690] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1411.424838] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1411.425875] ? find_held_lock+0x2c/0x110 [ 1411.426749] ? io_submit_sqes+0x8610/0x8610 [ 1411.427697] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1411.428735] ? wait_for_completion_io+0x270/0x270 [ 1411.429771] ? rcu_read_lock_any_held+0x75/0xa0 [ 1411.430769] ? vfs_write+0x354/0xb10 [ 1411.431578] ? fput_many+0x2f/0x1a0 [ 1411.432366] ? ksys_write+0x1a9/0x260 [ 1411.433184] ? __ia32_sys_read+0xb0/0xb0 [ 1411.434060] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1411.435184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1411.436301] do_syscall_64+0x33/0x40 [ 1411.437096] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1411.438179] RIP: 0033:0x7f67cefd1b19 [ 1411.438958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1411.442919] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1411.444539] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1411.446071] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1411.447612] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1411.449146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1411.450675] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:25:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000007c0)=""/214, 0xd6}], 0x3, 0xffffffff, 0x401) 02:25:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc07, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:25:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc3, 0xe8}, 0x0, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:25:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0x93, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:25:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000007c0)=""/214, 0xd6}], 0x3, 0xffffffff, 0x401) 02:25:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc0a, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:25:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0x93, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:25:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:25:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, 0x0, &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:25:44 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x2) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:25:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:25:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, 0x0, &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:25:44 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000007c0)=""/214, 0xd6}], 0x3, 0xffffffff, 0x401) 02:25:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xab, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:25:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:25:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:25:44 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 1426.805897] FAULT_INJECTION: forcing a failure. [ 1426.805897] name failslab, interval 1, probability 0, space 0, times 0 [ 1426.809215] CPU: 0 PID: 8138 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1426.810923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1426.813033] Call Trace: [ 1426.813695] dump_stack+0x107/0x167 [ 1426.814619] should_fail.cold+0x5/0xa [ 1426.815574] ? create_object.isra.0+0x3a/0xa20 [ 1426.816726] should_failslab+0x5/0x20 [ 1426.817669] kmem_cache_alloc+0x5b/0x310 [ 1426.818693] create_object.isra.0+0x3a/0xa20 [ 1426.819793] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1426.821047] kmem_cache_alloc_trace+0x151/0x320 [ 1426.822205] __iomap_dio_rw+0x1ee/0x1110 [ 1426.823218] ? lock_release+0x680/0x680 [ 1426.824229] ? fsnotify+0x1570/0x1570 [ 1426.825167] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1426.826329] ? down_read_trylock+0x193/0x350 [ 1426.827438] ? ext4_file_read_iter+0x356/0x4c0 [ 1426.828581] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1426.829792] iomap_dio_rw+0x31/0x90 [ 1426.830711] ext4_file_read_iter+0x2c7/0x4c0 [ 1426.831825] ? ext4_release_file+0x380/0x380 [ 1426.832898] io_read+0x2dc/0x11e0 [ 1426.833758] ? kiocb_done+0xc90/0xc90 [ 1426.834696] ? mark_lock+0xf5/0x2df0 [ 1426.835619] ? lock_chain_count+0x20/0x20 [ 1426.836693] ? stack_trace_consume_entry+0x160/0x160 [ 1426.837955] ? lock_acquire+0x197/0x470 [ 1426.838931] ? __lock_acquire+0xbb1/0x5b00 [ 1426.839988] io_issue_sqe+0x2e8a/0x77b0 [ 1426.840967] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1426.842248] ? lock_chain_count+0x20/0x20 [ 1426.843275] ? __is_insn_slot_addr+0x14c/0x290 [ 1426.844408] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1426.845670] ? io_connect+0x610/0x610 [ 1426.846610] ? lock_acquire+0x197/0x470 [ 1426.847569] ? find_held_lock+0x2c/0x110 [ 1426.848566] ? __fget_files+0x2cf/0x520 [ 1426.849531] ? lock_downgrade+0x6d0/0x6d0 [ 1426.850571] __io_queue_sqe+0x90/0x9d0 [ 1426.851526] ? io_issue_sqe+0x77b0/0x77b0 [ 1426.852565] ? __fget_files+0x2f8/0x520 [ 1426.853538] ? io_prep_rw+0x7f5/0x1050 [ 1426.854497] io_submit_sqes+0x44aa/0x8610 [ 1426.855542] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1426.856777] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1426.857983] ? find_held_lock+0x2c/0x110 [ 1426.858967] ? io_submit_sqes+0x8610/0x8610 [ 1426.860029] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1426.861232] ? wait_for_completion_io+0x270/0x270 [ 1426.862405] ? rcu_read_lock_any_held+0x75/0xa0 [ 1426.863534] ? vfs_write+0x354/0xb10 [ 1426.864478] ? fput_many+0x2f/0x1a0 [ 1426.865387] ? ksys_write+0x1a9/0x260 [ 1426.866328] ? __ia32_sys_read+0xb0/0xb0 [ 1426.867354] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1426.868679] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1426.869957] do_syscall_64+0x33/0x40 [ 1426.870892] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1426.872148] RIP: 0033:0x7f67cefd1b19 [ 1426.873063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1426.877519] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1426.879364] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1426.881093] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1426.882837] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1426.884585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1426.886334] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:25:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:25:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:25:44 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000007c0)=""/214, 0xd6}], 0x3, 0xffffffff, 0x401) 02:25:44 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x3) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:25:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xab, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:25:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, 0x0, &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:25:44 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000007c0)=""/214, 0xd6}], 0x3, 0xffffffff, 0x401) 02:25:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:26:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:26:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:26:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:26:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0xffffffff, 0x401) 02:26:00 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:26:00 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x4) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280), &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xab, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1442.769403] FAULT_INJECTION: forcing a failure. [ 1442.769403] name failslab, interval 1, probability 0, space 0, times 0 [ 1442.771814] CPU: 1 PID: 8188 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1442.773279] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1442.775015] Call Trace: [ 1442.775590] dump_stack+0x107/0x167 [ 1442.776387] should_fail.cold+0x5/0xa [ 1442.777176] should_failslab+0x5/0x20 [ 1442.777980] kmem_cache_alloc_bulk+0x4b/0x320 [ 1442.778911] io_submit_sqes+0x6fe6/0x8610 [ 1442.779814] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1442.780853] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1442.781837] ? find_held_lock+0x2c/0x110 [ 1442.782673] ? io_submit_sqes+0x8610/0x8610 [ 1442.783561] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1442.784605] ? wait_for_completion_io+0x270/0x270 [ 1442.785627] ? rcu_read_lock_any_held+0x75/0xa0 [ 1442.786602] ? vfs_write+0x354/0xb10 [ 1442.787391] ? fput_many+0x2f/0x1a0 [ 1442.788144] ? ksys_write+0x1a9/0x260 [ 1442.788922] ? __ia32_sys_read+0xb0/0xb0 [ 1442.789762] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1442.790838] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1442.791928] do_syscall_64+0x33/0x40 [ 1442.792716] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1442.793807] RIP: 0033:0x7f67cefd1b19 [ 1442.794594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1442.798489] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1442.800069] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1442.801570] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1442.803112] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1442.804648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1442.806122] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:26:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0xffffffff, 0x401) 02:26:00 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x5) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xb7, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280), &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0xffffffff, 0x401) 02:26:00 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x6) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xb7, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:26:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f00000006c0)=""/193, 0xc1}], 0x2, 0xffffffff, 0x401) 02:26:13 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:26:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:26:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x7) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280), &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xb7, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:26:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:26:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x8) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1456.201829] FAULT_INJECTION: forcing a failure. [ 1456.201829] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.203719] CPU: 1 PID: 8228 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1456.204728] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1456.205925] Call Trace: [ 1456.206324] dump_stack+0x107/0x167 [ 1456.206859] should_fail.cold+0x5/0xa [ 1456.207424] ? create_object.isra.0+0x3a/0xa20 [ 1456.208093] should_failslab+0x5/0x20 [ 1456.208633] kmem_cache_alloc+0x5b/0x310 [ 1456.209213] create_object.isra.0+0x3a/0xa20 [ 1456.209826] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1456.210553] kmem_cache_alloc_bulk+0x168/0x320 [ 1456.211198] io_submit_sqes+0x6fe6/0x8610 [ 1456.211803] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1456.212517] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1456.213202] ? find_held_lock+0x2c/0x110 [ 1456.213772] ? io_submit_sqes+0x8610/0x8610 [ 1456.214387] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1456.215064] ? wait_for_completion_io+0x270/0x270 [ 1456.215743] ? rcu_read_lock_any_held+0x75/0xa0 [ 1456.216413] ? vfs_write+0x354/0xb10 [ 1456.216938] ? fput_many+0x2f/0x1a0 [ 1456.217455] ? ksys_write+0x1a9/0x260 [ 1456.217992] ? __ia32_sys_read+0xb0/0xb0 [ 1456.218567] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1456.219307] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1456.220040] do_syscall_64+0x33/0x40 [ 1456.220563] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1456.221284] RIP: 0033:0x7f67cefd1b19 [ 1456.221813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1456.224439] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1456.225519] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1456.226531] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1456.227543] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1456.228565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1456.229576] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:26:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x401) 02:26:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xbd, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x62, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:26:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x10) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:26:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x18) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0), 0x0, 0xffffffff, 0x401) 02:26:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xbd, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:26:26 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:26:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x62, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:26:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:26:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x3e) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0), 0x0, 0xffffffff, 0x401) [ 1469.060513] FAULT_INJECTION: forcing a failure. [ 1469.060513] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.063782] CPU: 0 PID: 8270 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1469.065409] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1469.067351] Call Trace: [ 1469.067980] dump_stack+0x107/0x167 [ 1469.068875] should_fail.cold+0x5/0xa [ 1469.069772] ? create_object.isra.0+0x3a/0xa20 [ 1469.071005] should_failslab+0x5/0x20 [ 1469.071959] kmem_cache_alloc+0x5b/0x310 [ 1469.072923] ? mark_held_locks+0x9e/0xe0 [ 1469.073899] create_object.isra.0+0x3a/0xa20 [ 1469.074929] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1469.076121] kmem_cache_alloc_bulk+0x168/0x320 [ 1469.077232] io_submit_sqes+0x6fe6/0x8610 [ 1469.078255] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1469.079466] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1469.080586] ? find_held_lock+0x2c/0x110 [ 1469.081525] ? io_submit_sqes+0x8610/0x8610 [ 1469.082528] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1469.083635] ? wait_for_completion_io+0x270/0x270 [ 1469.084755] ? rcu_read_lock_any_held+0x75/0xa0 [ 1469.085820] ? vfs_write+0x354/0xb10 [ 1469.086674] ? fput_many+0x2f/0x1a0 [ 1469.087513] ? ksys_write+0x1a9/0x260 [ 1469.088400] ? __ia32_sys_read+0xb0/0xb0 [ 1469.089339] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1469.090551] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1469.091736] do_syscall_64+0x33/0x40 [ 1469.092601] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1469.093779] RIP: 0033:0x7f67cefd1b19 [ 1469.094633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1469.098878] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1469.100633] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1469.102270] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1469.103951] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1469.105625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1469.107250] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:26:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0), 0x0, 0xffffffff, 0x401) 02:26:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x62, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x48) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xbd, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{0x0}], 0x1, 0xffffffff, 0x401) 02:26:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x93, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x4c) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{0x0}], 0x1, 0xffffffff, 0x401) 02:26:42 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{0x0}], 0x1, 0xffffffff, 0x401) 02:26:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:42 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:26:42 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x68) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:26:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x93, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:26:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) [ 1485.246423] FAULT_INJECTION: forcing a failure. [ 1485.246423] name failslab, interval 1, probability 0, space 0, times 0 [ 1485.249363] CPU: 0 PID: 8311 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1485.250937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1485.252872] Call Trace: [ 1485.253497] dump_stack+0x107/0x167 [ 1485.254366] should_fail.cold+0x5/0xa [ 1485.255257] ? create_object.isra.0+0x3a/0xa20 [ 1485.256316] should_failslab+0x5/0x20 [ 1485.257209] kmem_cache_alloc+0x5b/0x310 [ 1485.258154] ? mark_held_locks+0x9e/0xe0 [ 1485.259100] create_object.isra.0+0x3a/0xa20 [ 1485.260119] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1485.261328] kmem_cache_alloc_bulk+0x168/0x320 [ 1485.262400] io_submit_sqes+0x6fe6/0x8610 [ 1485.263398] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1485.264562] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1485.265707] ? io_submit_sqes+0x8610/0x8610 [ 1485.266730] ? recalibrate_cpu_khz+0x10/0x10 [ 1485.267755] ? ktime_get+0x158/0x1f0 [ 1485.268647] ? setup_APIC_eilvt+0x2f0/0x2f0 [ 1485.269664] ? clockevents_program_event+0x131/0x360 [ 1485.270848] ? tick_program_event+0xa8/0x140 [ 1485.271871] ? hrtimer_interrupt+0x771/0x9b0 [ 1485.272930] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1485.274173] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1485.275384] do_syscall_64+0x33/0x40 [ 1485.276256] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1485.277467] RIP: 0033:0x7f67cefd1b19 [ 1485.278459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1485.282942] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1485.284746] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1485.286426] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1485.288109] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1485.289797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1485.291467] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:26:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x6c) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0x93, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x0, 0x401) 02:26:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x74) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x0, 0x401) 02:26:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xab, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:43 executing program 2: timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xd}, 0x0, 0x0, 0x3, 0x7, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') timerfd_settime(r0, 0x0, &(0x7f0000000000), &(0x7f0000000080)) preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000007c0)=""/214, 0xd6}], 0x3, 0xffffffff, 0x401) 02:26:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:26:43 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 1485.753152] FAULT_INJECTION: forcing a failure. [ 1485.753152] name failslab, interval 1, probability 0, space 0, times 0 [ 1485.755667] CPU: 1 PID: 8336 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1485.757121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1485.758856] Call Trace: [ 1485.759434] dump_stack+0x107/0x167 [ 1485.760215] should_fail.cold+0x5/0xa [ 1485.761049] ? create_object.isra.0+0x3a/0xa20 [ 1485.762007] should_failslab+0x5/0x20 [ 1485.762799] kmem_cache_alloc+0x5b/0x310 [ 1485.763659] ? mark_held_locks+0x9e/0xe0 [ 1485.764549] create_object.isra.0+0x3a/0xa20 [ 1485.765477] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1485.766548] kmem_cache_alloc_bulk+0x168/0x320 [ 1485.767508] io_submit_sqes+0x6fe6/0x8610 [ 1485.768413] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1485.769469] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1485.770478] ? find_held_lock+0x2c/0x110 [ 1485.771332] ? io_submit_sqes+0x8610/0x8610 [ 1485.772241] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1485.773260] ? wait_for_completion_io+0x270/0x270 [ 1485.774271] ? rcu_read_lock_any_held+0x75/0xa0 [ 1485.775244] ? vfs_write+0x354/0xb10 [ 1485.776028] ? fput_many+0x2f/0x1a0 [ 1485.776800] ? ksys_write+0x1a9/0x260 [ 1485.777632] ? __ia32_sys_read+0xb0/0xb0 [ 1485.778512] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1485.779639] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1485.780744] do_syscall_64+0x33/0x40 [ 1485.781529] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1485.782631] RIP: 0033:0x7f67cefd1b19 [ 1485.783437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1485.787408] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1485.789087] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1485.790654] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1485.792203] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1485.793741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1485.795301] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:26:57 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:26:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:26:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x0, 0x401) 02:26:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:26:57 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x7a) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xab, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:57 executing program 2: timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xd}, 0x0, 0x0, 0x3, 0x7, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') timerfd_settime(r0, 0x0, &(0x7f0000000000), &(0x7f0000000080)) preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000007c0)=""/214, 0xd6}], 0x3, 0xffffffff, 0x401) 02:26:57 executing program 2: timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xd}, 0x0, 0x0, 0x3, 0x7, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') timerfd_settime(r0, 0x0, &(0x7f0000000000), &(0x7f0000000080)) preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000007c0)=""/214, 0xd6}], 0x3, 0xffffffff, 0x401) [ 1500.137772] FAULT_INJECTION: forcing a failure. [ 1500.137772] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.139291] CPU: 1 PID: 8358 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1500.140198] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1500.141269] Call Trace: [ 1500.141612] dump_stack+0x107/0x167 [ 1500.142081] should_fail.cold+0x5/0xa [ 1500.142581] ? create_object.isra.0+0x3a/0xa20 [ 1500.143166] should_failslab+0x5/0x20 [ 1500.143622] kmem_cache_alloc+0x5b/0x310 [ 1500.144108] ? mark_held_locks+0x9e/0xe0 [ 1500.144659] create_object.isra.0+0x3a/0xa20 [ 1500.145213] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1500.145844] kmem_cache_alloc_bulk+0x168/0x320 [ 1500.146404] io_submit_sqes+0x6fe6/0x8610 [ 1500.146927] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1500.147539] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1500.148121] ? find_held_lock+0x2c/0x110 [ 1500.148619] ? io_submit_sqes+0x8610/0x8610 [ 1500.149138] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1500.149712] ? wait_for_completion_io+0x270/0x270 [ 1500.150297] ? rcu_read_lock_any_held+0x75/0xa0 [ 1500.150849] ? vfs_write+0x354/0xb10 [ 1500.151292] ? fput_many+0x2f/0x1a0 [ 1500.151723] ? ksys_write+0x1a9/0x260 [ 1500.152179] ? __ia32_sys_read+0xb0/0xb0 [ 1500.152670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1500.153299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1500.153924] do_syscall_64+0x33/0x40 [ 1500.154369] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1500.154977] RIP: 0033:0x7f67cefd1b19 [ 1500.155422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1500.157645] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1500.158575] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1500.159426] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1500.160282] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.161165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1500.162014] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:26:58 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) 02:26:58 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x300) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:58 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x480) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:26:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xab, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xab, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:26:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:26:58 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x500) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:27:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:27:09 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:27:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:09 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x600) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xab, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xb7, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1512.168295] FAULT_INJECTION: forcing a failure. [ 1512.168295] name failslab, interval 1, probability 0, space 0, times 0 [ 1512.169599] CPU: 1 PID: 8396 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1512.170362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1512.171289] Call Trace: [ 1512.171591] dump_stack+0x107/0x167 [ 1512.172001] should_fail.cold+0x5/0xa [ 1512.172443] ? create_object.isra.0+0x3a/0xa20 [ 1512.172972] should_failslab+0x5/0x20 [ 1512.173400] kmem_cache_alloc+0x5b/0x310 [ 1512.173857] ? mark_held_locks+0x9e/0xe0 [ 1512.174326] create_object.isra.0+0x3a/0xa20 [ 1512.174817] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1512.175393] kmem_cache_alloc_bulk+0x168/0x320 [ 1512.175911] io_submit_sqes+0x6fe6/0x8610 [ 1512.176391] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1512.176957] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1512.177503] ? find_held_lock+0x2c/0x110 [ 1512.177964] ? io_submit_sqes+0x8610/0x8610 [ 1512.178454] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1512.178997] ? wait_for_completion_io+0x270/0x270 [ 1512.179542] ? rcu_read_lock_any_held+0x75/0xa0 [ 1512.180059] ? vfs_write+0x354/0xb10 [ 1512.180480] ? fput_many+0x2f/0x1a0 [ 1512.180899] ? ksys_write+0x1a9/0x260 [ 1512.181328] ? __ia32_sys_read+0xb0/0xb0 [ 1512.181787] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1512.182378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1512.182958] do_syscall_64+0x33/0x40 [ 1512.183378] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1512.183954] RIP: 0033:0x7f67cefd1b19 [ 1512.184373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1512.186439] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1512.187291] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1512.188092] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1512.188896] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1512.189696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1512.190491] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:27:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xab, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f09", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:10 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x700) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xb7, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0x0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280), &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x1800) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x0, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:27:22 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:27:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:27:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:27:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:22 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xb7, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e1316175", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) [ 1524.893849] FAULT_INJECTION: forcing a failure. [ 1524.893849] name failslab, interval 1, probability 0, space 0, times 0 [ 1524.896803] CPU: 0 PID: 8420 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1524.898381] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1524.900275] Call Trace: [ 1524.900898] dump_stack+0x107/0x167 [ 1524.901741] should_fail.cold+0x5/0xa [ 1524.902615] ? create_object.isra.0+0x3a/0xa20 [ 1524.903665] should_failslab+0x5/0x20 [ 1524.904558] kmem_cache_alloc+0x5b/0x310 [ 1524.905503] ? mark_held_locks+0x9e/0xe0 [ 1524.906449] create_object.isra.0+0x3a/0xa20 [ 1524.907462] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1524.908651] kmem_cache_alloc_bulk+0x168/0x320 [ 1524.909734] io_submit_sqes+0x6fe6/0x8610 [ 1524.910716] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1524.911872] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1524.912993] ? find_held_lock+0x2c/0x110 [ 1524.913914] ? io_submit_sqes+0x8610/0x8610 [ 1524.914902] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1524.916002] ? wait_for_completion_io+0x270/0x270 [ 1524.917106] ? rcu_read_lock_any_held+0x75/0xa0 [ 1524.918164] ? vfs_write+0x354/0xb10 [ 1524.919011] ? fput_many+0x2f/0x1a0 [ 1524.919845] ? ksys_write+0x1a9/0x260 [ 1524.920713] ? __ia32_sys_read+0xb0/0xb0 [ 1524.921647] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1524.922842] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1524.924030] do_syscall_64+0x33/0x40 [ 1524.924879] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1524.926070] RIP: 0033:0x7f67cefd1b19 02:27:22 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xbd, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) [ 1524.926917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1524.931290] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1524.933024] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1524.934670] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1524.936371] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1524.938072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1524.939753] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:27:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) unshare(0x4a060400) 02:27:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x3e00) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:22 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xbd, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:23 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x3f00) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xbd, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x4000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 1) 02:27:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:27:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x0, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:27:38 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 1540.319811] FAULT_INJECTION: forcing a failure. [ 1540.319811] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1540.322521] CPU: 0 PID: 8462 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1540.324066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1540.325953] Call Trace: [ 1540.326553] dump_stack+0x107/0x167 [ 1540.327384] should_fail.cold+0x5/0xa [ 1540.328261] _copy_from_user+0x2e/0x1b0 [ 1540.329185] iovec_from_user+0x141/0x400 [ 1540.330114] __import_iovec+0x67/0x590 [ 1540.331011] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1540.332180] import_iovec+0x83/0xb0 [ 1540.332995] vfs_readv+0xbb/0x160 [ 1540.333763] ? vfs_iter_read+0xa0/0xa0 [ 1540.334626] ? __fget_files+0x2cf/0x520 [ 1540.335503] ? lock_downgrade+0x6d0/0x6d0 [ 1540.336443] ? ksys_write+0x12d/0x260 [ 1540.337326] ? __fget_files+0x2f8/0x520 [ 1540.338238] __x64_sys_preadv+0x235/0x310 [ 1540.339175] ? __ia32_sys_writev+0xb0/0xb0 [ 1540.340135] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1540.341336] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1540.342507] do_syscall_64+0x33/0x40 [ 1540.343360] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1540.344526] RIP: 0033:0x7f15d5707b19 [ 1540.345383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1540.349500] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1540.351160] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1540.352754] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1540.354387] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1540.356036] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1540.357665] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 02:27:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x4800) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1540.436582] FAULT_INJECTION: forcing a failure. [ 1540.436582] name failslab, interval 1, probability 0, space 0, times 0 [ 1540.439168] CPU: 1 PID: 8469 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1540.440621] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1540.442400] Call Trace: [ 1540.442970] dump_stack+0x107/0x167 [ 1540.443747] should_fail.cold+0x5/0xa [ 1540.444573] ? create_object.isra.0+0x3a/0xa20 [ 1540.445562] should_failslab+0x5/0x20 [ 1540.446371] kmem_cache_alloc+0x5b/0x310 [ 1540.447257] ? mark_held_locks+0x9e/0xe0 [ 1540.448103] create_object.isra.0+0x3a/0xa20 [ 1540.449019] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1540.450093] kmem_cache_alloc_bulk+0x168/0x320 [ 1540.451055] io_submit_sqes+0x6fe6/0x8610 [ 1540.451943] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1540.452992] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1540.454027] ? find_held_lock+0x2c/0x110 [ 1540.454887] ? io_submit_sqes+0x8610/0x8610 [ 1540.455808] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1540.456831] ? wait_for_completion_io+0x270/0x270 [ 1540.457885] ? rcu_read_lock_any_held+0x75/0xa0 [ 1540.458893] ? vfs_write+0x354/0xb10 [ 1540.459689] ? fput_many+0x2f/0x1a0 [ 1540.460459] ? ksys_write+0x1a9/0x260 [ 1540.461290] ? __ia32_sys_read+0xb0/0xb0 [ 1540.462168] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1540.463293] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1540.464396] do_syscall_64+0x33/0x40 [ 1540.465199] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1540.466307] RIP: 0033:0x7f67cefd1b19 [ 1540.467108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1540.470995] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1540.472579] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1540.474101] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1540.475638] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1540.477171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1540.478695] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:27:38 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x6, &(0x7f0000000240)={0x0, 0x4, 0x0, @tid=r0}, &(0x7f00000002c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_delete(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x13, r3, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x5c, 0x1, 0x22, 0x0, 0x80000000, 0x80, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x1}, 0x10000, 0x0, 0x8eb, 0x7, 0x19, 0x7ff, 0xfffc, 0x0, 0x6, 0x0, 0x20}, r1, 0x7, r3, 0xb) sendto$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = dup(r4) recvmmsg(r5, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) 02:27:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x4c00) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 2) 02:27:38 executing program 2: clone(0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) clone(0x12040000, &(0x7f0000000180)="9f97e09ee477ab5721168d98cae6307c9521a4a89c85342aa522adbf92f6bd8357996ba9ee9a609a3b245e6a065b16a430c3cd", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="b9cd98a025fdc99942e40e7bc0699e") clone(0x40000000, &(0x7f00000013c0)="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", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) clone(0x100000, &(0x7f0000000000)="c7c6612e9aaa165d8644eb109b7d523b41e639d4b6bf7bc47b8ff5d7cef13136a1832630a90e7e55cb99aae632dbbbae23792365e2f65e24696493b4eae6c2bb390a26ca7372a183d65d5ecac1a5f60ea7f4004caac09c4e3919056bb5ac4fee92db8e090f474963f77d12a30636f52f54b13bbfdb6314ac6a2b8670733c4660211d3e4f90a3291767480d691f55102311bf65aca493d7145ab3ac5e6f3b21b6214002bbef2bda8b6094ed6293d7c92b2ceba76bbbbe41c6ef74b24770ef75a175c0f98cf2e02e84bcc60355df3cd66da891b4cc773d29c5bf352f3815", &(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)="12d763fe489f266a99c0feb07d22e592e87247cc1888de29b05a27f476064c862c09120bd50814bd76408ca8bcc4338f676f73b998a0bf4eed28899e6b656401b27a162e301cae0b67a4c85236512d0c79a5f1e150e04bdce0809c6296884f85d5d7d255451af6ec31ce6b77d1206198a0d155429a") clone(0x8c80, &(0x7f0000000280)="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", &(0x7f0000001280), &(0x7f00000012c0), &(0x7f0000001300)="384261f51046d6b62fbbcda0625cb36c724fbbd282cc3bb78deb5ea65f96ab8acf2717e9a1ac93d4c46352156b5e78b726f032025d7b95e33e05483306f190a74878439322e6892b66ab5524e578ca42a86aad4c3383d7906b27b513c14f8c1fbca0faf559136a9300e271d8094937caa7f36eb877c2b26c2497c4bca80ba539a25473d0ab408e312abf433cf158268c1561892548fae863a2ab19805ad9eec3ee4807df554ba6c8bb048c1b43b992fc9d01708d89cc4baf981c9fa576812273") [ 1540.678459] FAULT_INJECTION: forcing a failure. [ 1540.678459] name failslab, interval 1, probability 0, space 0, times 0 [ 1540.681742] CPU: 1 PID: 8490 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1540.683218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1540.685024] Call Trace: [ 1540.685598] dump_stack+0x107/0x167 [ 1540.686379] should_fail.cold+0x5/0xa [ 1540.687206] ? kvmalloc_node+0x119/0x170 [ 1540.688095] should_failslab+0x5/0x20 [ 1540.688923] __kmalloc_node+0x76/0x420 [ 1540.689777] kvmalloc_node+0x119/0x170 [ 1540.690626] seq_read_iter+0x9d6/0x12b0 [ 1540.691503] ? __might_fault+0xd3/0x180 [ 1540.692396] do_iter_readv_writev+0x57c/0x750 [ 1540.693385] ? new_sync_write+0x660/0x660 [ 1540.694288] ? fsnotify_perm.part.0+0x22d/0x620 [ 1540.695304] ? security_file_permission+0xb1/0xe0 [ 1540.696385] do_iter_read+0x301/0x760 [ 1540.697245] ? import_iovec+0x83/0xb0 [ 1540.698076] vfs_readv+0xe5/0x160 [ 1540.698829] ? vfs_iter_read+0xa0/0xa0 [ 1540.699683] ? __fget_files+0x2cf/0x520 [ 1540.700559] ? ksys_write+0x12d/0x260 [ 1540.701405] ? __fget_files+0x2f8/0x520 [ 1540.702279] __x64_sys_preadv+0x235/0x310 [ 1540.703174] ? __ia32_sys_writev+0xb0/0xb0 [ 1540.704095] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1540.705250] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1540.706382] do_syscall_64+0x33/0x40 [ 1540.707196] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1540.708305] RIP: 0033:0x7f15d5707b19 [ 1540.709122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1540.713169] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1540.714830] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1540.716412] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1540.717990] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1540.719554] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1540.721121] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 02:27:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x102) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f00000003c0)='wlan0\x00', &(0x7f0000000440)='\xd7,+[-&@\x00', &(0x7f0000000c40)='\x9c)Q#\x18?\xe1\x9d\xf8\xb6\x04\x9d\x9c\xd2\xa0\x012\x80\x8d\x83\x8d\x8d\x03\x11\xc7\xbd\xa4o\xafo\x85F\xcd\xd1\xce\x94U\x9e\xfe\xa0\x14\xa8\xb03:\xc7\xe2\xb7\xc4ux\xef7\x0f$\xf2\xe1\x98\xcb\x0e\x02\xe7=I[Bb\x86\xd3\x11\xd0\x18CS\x8euz_;\f\xdf\xa2,\x0etQ\xbc\xa8\x951=\xb2\x99v\x1d\xee\x14\xe4\xa1<+\ni&8\x1f\xc7\x8a\xcf\x90\x9e\x96\xef\xfarB\xc3\x13\f\x06\xe6X\x06\xece\x8c\x8b\x84X\x97\x03)\xdd\x9cf0V\x8cN\xab\xef\xfe\x87Q_\xaa\x9eT>\x02\xf5\xb7M\xcev\x1f\xda)V\x8a\xb9\xae\x187l\xf7t\xab\xe2\x15a\x95u^!\xa5\xfbbq\xa34\xacc1\xf2\xb2im\xfe\x15\xb0\x9d\xb0L\x99\x01k,\xc6u\xefn\x03\x17\xa1\xdc:\xf5)x\xa6\x85z\xfa\x8a2\x93/\xc0\xbe\xf2\xf3\x97\xa8\xb8-,\xf1\x87\xd1\xf9\xf4\xb9\xad\xa7\x96#\xcf\x9b\xbaI\xa5\xc6n\xc6[\xb7?\xd7\xa0\x0e\x93%@{\xce\xbf\x91]\xf4\x9d\x9a\xd9\xa1b\x8fF\xbb\xa6\xf9\x93\xa3\xc7\'\\\x95\x06\\\xcf\xf5o\xec'], &(0x7f0000000440), 0x1000) fallocate(0xffffffffffffffff, 0x78, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010e0100000000be72000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ftruncate(r0, 0x1000003) preadv(r0, &(0x7f0000000400), 0x0, 0x1, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x8, 0x2, 0x400, 0x3, 0x2, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) clone3(&(0x7f0000000740)={0x40092340, &(0x7f0000000480)=0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000500), {0x34}, &(0x7f0000000540)=""/201, 0xc9, 0x0, &(0x7f0000000700)}, 0x58) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000007c0)={0xfffffffd, 0x81, 0x667, 0x3f, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000640)=ANY=[@ANYBLOB="090000950001000001180000", @ANYRES32=r1, @ANYBLOB="0000000003002e2f666908000400c04326c01c3f9797913fe1ceec1e66493e024c1e99ce53f8010535191412c2c9f6e969b949231b7cdb48ae050067e06c099db71a710ba2d5b9d64345202f73dbb8114249789a14c1219a75884e9d734e6ee4e5eb9e92b6acbf6a0c3bcc448000000000000000"]) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000008, 0x8010, r3, 0xece17000) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth1_to_bridge\x00'}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r3, 0x89f5, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000880)={'ip6tnl0\x00', 0x0, 0x2f, 0x81, 0x2, 0x4c93, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x40, 0x10, 0x9, 0xec}}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 02:27:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:27:54 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:27:54 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x6800) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x0, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:27:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 3) [ 1556.275465] FAULT_INJECTION: forcing a failure. [ 1556.275465] name failslab, interval 1, probability 0, space 0, times 0 [ 1556.278120] CPU: 0 PID: 8526 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1556.279676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.281577] Call Trace: [ 1556.282199] dump_stack+0x107/0x167 [ 1556.283037] should_fail.cold+0x5/0xa [ 1556.283906] ? create_object.isra.0+0x3a/0xa20 [ 1556.284949] should_failslab+0x5/0x20 [ 1556.285841] kmem_cache_alloc+0x5b/0x310 [ 1556.286806] create_object.isra.0+0x3a/0xa20 [ 1556.287819] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1556.288999] __kmalloc_node+0x1ae/0x420 [ 1556.289939] kvmalloc_node+0x119/0x170 [ 1556.290829] seq_read_iter+0x9d6/0x12b0 [ 1556.291748] ? __might_fault+0xd3/0x180 [ 1556.292677] do_iter_readv_writev+0x57c/0x750 [ 1556.293732] ? new_sync_write+0x660/0x660 [ 1556.294692] ? fsnotify_perm.part.0+0x22d/0x620 [ 1556.295774] ? security_file_permission+0xb1/0xe0 [ 1556.296904] do_iter_read+0x301/0x760 [ 1556.297807] ? import_iovec+0x83/0xb0 [ 1556.298697] vfs_readv+0xe5/0x160 [ 1556.299491] ? vfs_iter_read+0xa0/0xa0 [ 1556.300403] ? __fget_files+0x2cf/0x520 [ 1556.301348] ? ksys_write+0x12d/0x260 [ 1556.302242] ? __fget_files+0x2f8/0x520 [ 1556.303183] __x64_sys_preadv+0x235/0x310 [ 1556.304144] ? __ia32_sys_writev+0xb0/0xb0 [ 1556.305156] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1556.306361] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1556.307547] do_syscall_64+0x33/0x40 [ 1556.308400] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.309572] RIP: 0033:0x7f15d5707b19 [ 1556.310425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.314684] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1556.316431] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1556.318099] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1556.319734] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.321396] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1556.323041] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 [ 1556.355233] FAULT_INJECTION: forcing a failure. [ 1556.355233] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1556.358180] CPU: 0 PID: 8518 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1556.359745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.361660] Call Trace: [ 1556.362407] dump_stack+0x107/0x167 [ 1556.363243] should_fail.cold+0x5/0xa [ 1556.364138] _copy_from_user+0x2e/0x1b0 [ 1556.365050] iovec_from_user+0x141/0x400 [ 1556.365998] __import_iovec+0x67/0x590 [ 1556.366878] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1556.368075] io_import_iovec+0x581/0x1120 [ 1556.369028] ? io_complete_rw+0x230/0x230 [ 1556.370000] ? lock_downgrade+0x6d0/0x6d0 [ 1556.370955] ? unwind_next_frame+0x13ef/0x1a90 [ 1556.372004] io_read+0xe14/0x11e0 [ 1556.372820] ? kiocb_done+0xc90/0xc90 [ 1556.373700] ? mark_lock+0xf5/0x2df0 [ 1556.374616] ? lock_chain_count+0x20/0x20 [ 1556.375566] ? lock_chain_count+0x20/0x20 [ 1556.376509] ? stack_trace_save+0x8c/0xc0 [ 1556.377477] ? stack_trace_consume_entry+0x160/0x160 [ 1556.378638] ? lock_acquire+0x197/0x470 [ 1556.379549] ? __lock_acquire+0xbb1/0x5b00 [ 1556.380515] io_issue_sqe+0x2e8a/0x77b0 [ 1556.381447] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1556.382633] ? lock_chain_count+0x20/0x20 [ 1556.383595] ? __is_insn_slot_addr+0x14c/0x290 [ 1556.384639] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1556.385850] ? io_connect+0x610/0x610 [ 1556.386720] ? lock_acquire+0x197/0x470 [ 1556.387624] ? find_held_lock+0x2c/0x110 [ 1556.388557] ? __fget_files+0x2cf/0x520 [ 1556.389474] ? lock_downgrade+0x6d0/0x6d0 [ 1556.390446] __io_queue_sqe+0x90/0x9d0 [ 1556.391372] ? io_issue_sqe+0x77b0/0x77b0 [ 1556.392311] ? __fget_files+0x2f8/0x520 [ 1556.393222] ? io_prep_rw+0x7f5/0x1050 [ 1556.394140] io_submit_sqes+0x44aa/0x8610 [ 1556.395112] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1556.396242] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1556.397348] ? find_held_lock+0x2c/0x110 [ 1556.398282] ? io_submit_sqes+0x8610/0x8610 [ 1556.399268] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1556.400366] ? wait_for_completion_io+0x270/0x270 [ 1556.401480] ? rcu_read_lock_any_held+0x75/0xa0 [ 1556.402532] ? vfs_write+0x354/0xb10 [ 1556.403388] ? fput_many+0x2f/0x1a0 [ 1556.404219] ? ksys_write+0x1a9/0x260 [ 1556.405087] ? __ia32_sys_read+0xb0/0xb0 [ 1556.406036] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1556.407228] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1556.408410] do_syscall_64+0x33/0x40 [ 1556.409263] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.410429] RIP: 0033:0x7f67cefd1b19 [ 1556.411287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.415434] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1556.417153] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1556.418772] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1556.420381] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.422002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1556.423616] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:27:54 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x6c00) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc0, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c37", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 4) 02:27:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) [ 1556.618924] FAULT_INJECTION: forcing a failure. [ 1556.618924] name failslab, interval 1, probability 0, space 0, times 0 [ 1556.622210] CPU: 1 PID: 8539 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1556.623678] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.625433] Call Trace: [ 1556.625998] dump_stack+0x107/0x167 [ 1556.626778] should_fail.cold+0x5/0xa [ 1556.627594] ? cgroup_show_path+0xc4/0x5f0 [ 1556.628493] should_failslab+0x5/0x20 [ 1556.629315] kmem_cache_alloc_trace+0x55/0x320 [ 1556.630295] cgroup_show_path+0xc4/0x5f0 [ 1556.631149] ? cgroup_file_open+0x360/0x360 [ 1556.632062] kernfs_sop_show_path+0x122/0x190 [ 1556.633013] ? kernfs_test_super+0x140/0x140 [ 1556.633963] show_mountinfo+0x23b/0xb80 [ 1556.634822] ? rwlock_bug.part.0+0x90/0x90 [ 1556.635734] ? mounts_release+0x100/0x100 [ 1556.636627] ? do_raw_spin_unlock+0x4f/0x220 [ 1556.637567] ? _raw_spin_unlock+0x1a/0x30 [ 1556.638448] traverse.part.0+0xd7/0x620 [ 1556.639295] seq_read_iter+0x934/0x12b0 [ 1556.640136] ? __might_fault+0xd3/0x180 [ 1556.640990] do_iter_readv_writev+0x57c/0x750 [ 1556.641968] ? new_sync_write+0x660/0x660 02:27:54 executing program 2: r0 = syz_io_uring_setup(0x3862, &(0x7f00000002c0)={0x0, 0x6610, 0x8, 0x2, 0x1}, &(0x7f00000a0000)=nil, &(0x7f000008d000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x1, 0x0, 0x7, 0xd8, "c9f8e650da8d1f569053e8984b83777318760a5238f6af85581608069a64b06b92de9de827a06da13dfd0a7244f9276114abb0c4ea0c40656d1732e262fd02", 0x7}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r10, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x102, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}], ['\x00']}) close_range(r10, r9, 0x2) io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r11, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(r7, r6, 0x0, 0x500000001) [ 1556.642858] ? fsnotify_perm.part.0+0x22d/0x620 [ 1556.644124] ? security_file_permission+0xb1/0xe0 [ 1556.645305] do_iter_read+0x301/0x760 [ 1556.646125] ? import_iovec+0x83/0xb0 [ 1556.646938] vfs_readv+0xe5/0x160 [ 1556.647680] ? vfs_iter_read+0xa0/0xa0 [ 1556.648509] ? __fget_files+0x2cf/0x520 [ 1556.649355] ? ksys_write+0x12d/0x260 [ 1556.650175] ? __fget_files+0x2f8/0x520 [ 1556.651029] __x64_sys_preadv+0x235/0x310 [ 1556.651900] ? __ia32_sys_writev+0xb0/0xb0 [ 1556.652797] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1556.653945] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1556.655028] do_syscall_64+0x33/0x40 [ 1556.655815] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.656889] RIP: 0033:0x7f15d5707b19 [ 1556.657677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.661560] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1556.663171] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1556.664669] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1556.666186] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.667683] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1556.669193] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 02:27:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:54 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x7400) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:27:54 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x7a00) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:27:54 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:27:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:27:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:27:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 5) 02:27:54 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RATTACH(r1, &(0x7f00000000c0)={0x14}, 0xff24) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x13, r3, 0x0) r4 = getuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {r4, 0xffffffffffffffff}}, './file0\x00'}) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/83, 0xfdef}], 0x1) recvmmsg$unix(r5, &(0x7f0000001b00)=[{{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000280)=""/198, 0xc6}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/208, 0xd0}, {&(0x7f0000000500)=""/254, 0xfe}], 0x4, &(0x7f0000000640)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000000680)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/11, 0xb}, {&(0x7f0000000740)=""/77, 0x4d}], 0x2}}, {{&(0x7f0000000800)=@abs, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000880)=""/74, 0x4a}, {&(0x7f0000000900)=""/54, 0x36}, {&(0x7f0000000940)=""/238, 0xee}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x4}}, {{&(0x7f0000000b80)=@abs, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000c00)=""/235, 0xeb}, {&(0x7f0000000d00)=""/35, 0x23}, {&(0x7f0000000d40)=""/179, 0xb3}, {&(0x7f0000000e00)=""/158, 0x9e}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000ec0)=""/160, 0xa0}, {&(0x7f0000000f80)=""/21, 0x15}, {&(0x7f0000000fc0)=""/4, 0x4}], 0x8, &(0x7f0000001080)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f00000010c0), 0x6e, &(0x7f0000001300)=[{&(0x7f0000001140)=""/132, 0x84}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000001200)=""/30, 0x1e}, {&(0x7f0000001240)=""/160, 0xa0}], 0x4, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f00000013c0)=@abs, 0x6e, &(0x7f00000014c0)=[{&(0x7f0000001440)=""/128, 0x80}], 0x1, &(0x7f0000001500)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}}, {{&(0x7f00000015c0)=@abs, 0x6e, &(0x7f0000001a00)=[{&(0x7f0000001640)=""/39, 0x27}, {&(0x7f0000001680)=""/100, 0x64}, {&(0x7f0000001700)=""/136, 0x88}, {&(0x7f00000017c0)=""/88, 0x58}, {&(0x7f0000001840)=""/174, 0xae}, {&(0x7f0000001900)=""/200, 0xc8}], 0x6, &(0x7f0000001a80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}], 0x7, 0x40002181, &(0x7f0000001cc0)) fsetxattr$trusted_overlay_nlink(r6, &(0x7f0000001d00), &(0x7f0000001d40)={'L+'}, 0x16, 0x3) fcntl$lock(r0, 0x6, &(0x7f0000000140)={0x1, 0x0, 0x7fff, 0x6}) [ 1557.101833] FAULT_INJECTION: forcing a failure. [ 1557.101833] name failslab, interval 1, probability 0, space 0, times 0 [ 1557.104135] CPU: 1 PID: 8562 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1557.105489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1557.107111] Call Trace: [ 1557.107630] dump_stack+0x107/0x167 [ 1557.108366] should_fail.cold+0x5/0xa [ 1557.109149] ? create_object.isra.0+0x3a/0xa20 [ 1557.110076] should_failslab+0x5/0x20 [ 1557.110847] kmem_cache_alloc+0x5b/0x310 [ 1557.111671] ? mark_held_locks+0x9e/0xe0 [ 1557.112494] create_object.isra.0+0x3a/0xa20 [ 1557.113389] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1557.114411] kmem_cache_alloc_bulk+0x168/0x320 [ 1557.115337] io_submit_sqes+0x6fe6/0x8610 [ 1557.116199] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1557.117198] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1557.118174] ? find_held_lock+0x2c/0x110 [ 1557.118995] ? io_submit_sqes+0x8610/0x8610 [ 1557.119865] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1557.120835] ? wait_for_completion_io+0x270/0x270 [ 1557.121813] ? rcu_read_lock_any_held+0x75/0xa0 [ 1557.122743] ? vfs_write+0x354/0xb10 [ 1557.123492] ? fput_many+0x2f/0x1a0 [ 1557.124220] ? ksys_write+0x1a9/0x260 [ 1557.124985] ? __ia32_sys_read+0xb0/0xb0 [ 1557.125801] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1557.126840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1557.127869] do_syscall_64+0x33/0x40 [ 1557.128608] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1557.129632] RIP: 0033:0x7f67cefd1b19 [ 1557.130370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1557.134074] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1557.135600] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1557.137033] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1557.138469] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1557.139899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1557.141342] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 [ 1557.180186] FAULT_INJECTION: forcing a failure. [ 1557.180186] name failslab, interval 1, probability 0, space 0, times 0 [ 1557.182543] CPU: 0 PID: 8568 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1557.183943] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1557.185661] Call Trace: [ 1557.186202] dump_stack+0x107/0x167 [ 1557.186942] should_fail.cold+0x5/0xa [ 1557.187714] ? create_object.isra.0+0x3a/0xa20 [ 1557.188644] should_failslab+0x5/0x20 [ 1557.189430] kmem_cache_alloc+0x5b/0x310 [ 1557.190260] create_object.isra.0+0x3a/0xa20 [ 1557.191150] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1557.192185] kmem_cache_alloc_trace+0x151/0x320 [ 1557.193134] cgroup_show_path+0xc4/0x5f0 [ 1557.193967] ? cgroup_file_open+0x360/0x360 [ 1557.194846] kernfs_sop_show_path+0x122/0x190 [ 1557.195760] ? kernfs_test_super+0x140/0x140 [ 1557.196655] show_mountinfo+0x23b/0xb80 [ 1557.197473] ? rwlock_bug.part.0+0x90/0x90 [ 1557.198337] ? mounts_release+0x100/0x100 [ 1557.199179] ? do_raw_spin_unlock+0x4f/0x220 [ 1557.200074] ? _raw_spin_unlock+0x1a/0x30 [ 1557.200920] traverse.part.0+0xd7/0x620 [ 1557.201744] seq_read_iter+0x934/0x12b0 [ 1557.202538] ? __might_fault+0xd3/0x180 [ 1557.203346] do_iter_readv_writev+0x57c/0x750 [ 1557.204250] ? new_sync_write+0x660/0x660 [ 1557.205082] ? fsnotify_perm.part.0+0x22d/0x620 [ 1557.206024] ? security_file_permission+0xb1/0xe0 [ 1557.206996] do_iter_read+0x301/0x760 [ 1557.207768] ? import_iovec+0x83/0xb0 [ 1557.208534] vfs_readv+0xe5/0x160 [ 1557.209227] ? vfs_iter_read+0xa0/0xa0 [ 1557.210014] ? __fget_files+0x2cf/0x520 [ 1557.210812] ? ksys_write+0x12d/0x260 [ 1557.211581] ? __fget_files+0x2f8/0x520 [ 1557.212383] __x64_sys_preadv+0x235/0x310 [ 1557.213213] ? __ia32_sys_writev+0xb0/0xb0 [ 1557.214068] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1557.215114] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1557.216151] do_syscall_64+0x33/0x40 [ 1557.216896] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1557.217931] RIP: 0033:0x7f15d5707b19 [ 1557.218678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1557.222362] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1557.223871] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1557.225304] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1557.226728] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1557.228150] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1557.229576] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 02:28:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1569.360974] FAULT_INJECTION: forcing a failure. [ 1569.360974] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.363658] CPU: 0 PID: 8582 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1569.365294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.367237] Call Trace: [ 1569.367855] dump_stack+0x107/0x167 [ 1569.368709] should_fail.cold+0x5/0xa [ 1569.369619] ? cgroup_show_path+0xc4/0x5f0 [ 1569.370603] should_failslab+0x5/0x20 [ 1569.371489] kmem_cache_alloc_trace+0x55/0x320 [ 1569.372553] cgroup_show_path+0xc4/0x5f0 [ 1569.373505] ? cgroup_file_open+0x360/0x360 [ 1569.374511] kernfs_sop_show_path+0x122/0x190 [ 1569.375545] ? kernfs_test_super+0x140/0x140 [ 1569.376561] show_mountinfo+0x23b/0xb80 [ 1569.377517] ? rwlock_bug.part.0+0x90/0x90 [ 1569.378499] ? mounts_release+0x100/0x100 [ 1569.379479] ? do_raw_spin_unlock+0x4f/0x220 [ 1569.380500] ? _raw_spin_unlock+0x1a/0x30 [ 1569.381498] traverse.part.0+0xd7/0x620 [ 1569.382435] seq_read_iter+0x934/0x12b0 [ 1569.383373] ? __might_fault+0xd3/0x180 [ 1569.384336] do_iter_readv_writev+0x57c/0x750 [ 1569.385399] ? new_sync_write+0x660/0x660 [ 1569.386396] ? fsnotify_perm.part.0+0x22d/0x620 [ 1569.387501] ? security_file_permission+0xb1/0xe0 [ 1569.388657] do_iter_read+0x301/0x760 [ 1569.389584] ? import_iovec+0x83/0xb0 [ 1569.390500] vfs_readv+0xe5/0x160 [ 1569.391327] ? vfs_iter_read+0xa0/0xa0 [ 1569.392251] ? __fget_files+0x2cf/0x520 [ 1569.393195] ? ksys_write+0x12d/0x260 [ 1569.394116] ? __fget_files+0x2f8/0x520 [ 1569.395067] __x64_sys_preadv+0x235/0x310 [ 1569.396044] ? __ia32_sys_writev+0xb0/0xb0 [ 1569.397051] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1569.398295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1569.399516] do_syscall_64+0x33/0x40 [ 1569.400395] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.401613] RIP: 0033:0x7f15d5707b19 [ 1569.402730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.407141] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1569.408936] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1569.410642] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1569.412335] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.414023] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1569.415693] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 02:28:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:28:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:28:07 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:28:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc1, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:28:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:28:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 6) 02:28:07 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x8004) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1569.444791] FAULT_INJECTION: forcing a failure. [ 1569.444791] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.448220] CPU: 0 PID: 8585 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1569.449834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.451773] Call Trace: [ 1569.452392] dump_stack+0x107/0x167 [ 1569.453237] should_fail.cold+0x5/0xa [ 1569.454133] ? create_object.isra.0+0x3a/0xa20 [ 1569.455188] should_failslab+0x5/0x20 [ 1569.456067] kmem_cache_alloc+0x5b/0x310 [ 1569.457012] create_object.isra.0+0x3a/0xa20 [ 1569.458043] kmem_cache_alloc_trace+0x151/0x320 [ 1569.459124] __iomap_dio_rw+0x1ee/0x1110 [ 1569.460073] ? lock_release+0x680/0x680 [ 1569.461004] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1569.462074] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1569.463292] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1569.464544] ? trace_hardirqs_on+0x5b/0x180 [ 1569.465608] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1569.466873] iomap_dio_rw+0x31/0x90 [ 1569.467717] ext4_file_read_iter+0x2c7/0x4c0 [ 1569.468732] ? ext4_release_file+0x380/0x380 [ 1569.469756] io_read+0x2dc/0x11e0 [ 1569.470599] ? mark_lock+0xf5/0x2df0 [ 1569.471571] ? kiocb_done+0xc90/0xc90 [ 1569.472556] ? mark_lock+0xf5/0x2df0 [ 1569.473534] ? lock_chain_count+0x20/0x20 [ 1569.474621] ? stack_trace_consume_entry+0x160/0x160 [ 1569.475933] ? lock_acquire+0x197/0x470 [ 1569.476973] ? mark_held_locks+0x9e/0xe0 [ 1569.478042] ? __lock_acquire+0xbb1/0x5b00 [ 1569.479147] io_issue_sqe+0x2e8a/0x77b0 [ 1569.480188] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1569.481554] ? lock_chain_count+0x20/0x20 [ 1569.482632] ? __is_insn_slot_addr+0x14c/0x290 [ 1569.483819] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1569.485174] ? io_connect+0x610/0x610 [ 1569.486174] ? lock_acquire+0x197/0x470 [ 1569.487203] ? find_held_lock+0x2c/0x110 [ 1569.488261] ? __fget_files+0x2cf/0x520 [ 1569.489286] ? lock_downgrade+0x6d0/0x6d0 [ 1569.490365] __io_queue_sqe+0x90/0x9d0 [ 1569.491374] ? io_issue_sqe+0x77b0/0x77b0 [ 1569.492434] ? __fget_files+0x2f8/0x520 [ 1569.493471] ? io_prep_rw+0x7f5/0x1050 [ 1569.494477] io_submit_sqes+0x44aa/0x8610 [ 1569.495571] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1569.496849] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1569.498100] ? find_held_lock+0x2c/0x110 [ 1569.499146] ? io_submit_sqes+0x8610/0x8610 [ 1569.500258] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1569.501503] ? wait_for_completion_io+0x270/0x270 [ 1569.502743] ? rcu_read_lock_any_held+0x75/0xa0 [ 1569.503934] ? vfs_write+0x354/0xb10 [ 1569.504889] ? fput_many+0x2f/0x1a0 [ 1569.505829] ? ksys_write+0x1a9/0x260 [ 1569.506798] ? __ia32_sys_read+0xb0/0xb0 [ 1569.507835] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1569.509169] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1569.510500] do_syscall_64+0x33/0x40 [ 1569.511448] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.512752] RIP: 0033:0x7f67cefd1b19 [ 1569.513718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.518432] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1569.520373] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1569.522215] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1569.524021] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.525835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1569.527643] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 [ 1582.056016] FAULT_INJECTION: forcing a failure. [ 1582.056016] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.057470] CPU: 1 PID: 8605 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1582.058321] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.059329] Call Trace: [ 1582.059657] dump_stack+0x107/0x167 [ 1582.060099] should_fail.cold+0x5/0xa [ 1582.060568] ? create_object.isra.0+0x3a/0xa20 [ 1582.061314] should_failslab+0x5/0x20 [ 1582.061925] kmem_cache_alloc+0x5b/0x310 [ 1582.062545] create_object.isra.0+0x3a/0xa20 02:28:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:28:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc1, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:28:19 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:28:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:28:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 7) 02:28:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) [ 1582.063210] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:28:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:28:19 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xff03) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1582.064042] kmem_cache_alloc_trace+0x151/0x320 [ 1582.064650] cgroup_show_path+0xc4/0x5f0 [ 1582.065145] ? cgroup_file_open+0x360/0x360 [ 1582.065685] kernfs_sop_show_path+0x122/0x190 [ 1582.066231] ? kernfs_test_super+0x140/0x140 [ 1582.066765] show_mountinfo+0x23b/0xb80 [ 1582.067248] ? rwlock_bug.part.0+0x90/0x90 [ 1582.067768] ? mounts_release+0x100/0x100 [ 1582.068278] ? do_raw_spin_unlock+0x4f/0x220 [ 1582.068813] ? _raw_spin_unlock+0x1a/0x30 [ 1582.069322] traverse.part.0+0xd7/0x620 [ 1582.069821] seq_read_iter+0x934/0x12b0 [ 1582.070304] ? __might_fault+0xd3/0x180 [ 1582.070795] do_iter_readv_writev+0x57c/0x750 [ 1582.071342] ? new_sync_write+0x660/0x660 [ 1582.071848] ? fsnotify_perm.part.0+0x22d/0x620 [ 1582.072412] ? security_file_permission+0xb1/0xe0 [ 1582.073006] do_iter_read+0x301/0x760 [ 1582.073471] ? import_iovec+0x83/0xb0 [ 1582.073943] vfs_readv+0xe5/0x160 [ 1582.074361] ? vfs_iter_read+0xa0/0xa0 [ 1582.074838] ? __fget_files+0x2cf/0x520 [ 1582.075324] ? ksys_write+0x12d/0x260 [ 1582.075791] ? __fget_files+0x2f8/0x520 [ 1582.076278] __x64_sys_preadv+0x235/0x310 [ 1582.076778] ? __ia32_sys_writev+0xb0/0xb0 [ 1582.077298] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1582.077944] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1582.078571] do_syscall_64+0x33/0x40 [ 1582.079023] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.079645] RIP: 0033:0x7f15d5707b19 [ 1582.080099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.082337] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1582.083257] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1582.084119] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1582.084983] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.085855] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1582.086722] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 [ 1582.105148] FAULT_INJECTION: forcing a failure. [ 1582.105148] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1582.106666] CPU: 1 PID: 8608 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1582.107482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.108471] Call Trace: [ 1582.108788] dump_stack+0x107/0x167 [ 1582.109226] should_fail.cold+0x5/0xa [ 1582.109693] _copy_from_user+0x2e/0x1b0 [ 1582.110163] iovec_from_user+0x141/0x400 [ 1582.110650] __import_iovec+0x67/0x590 [ 1582.111121] io_import_iovec+0x581/0x1120 [ 1582.111618] ? io_complete_rw+0x230/0x230 [ 1582.112115] ? kiocb_done+0x16b/0xc90 [ 1582.112569] io_read+0xe14/0x11e0 [ 1582.112990] ? kiocb_done+0xc90/0xc90 [ 1582.113442] ? mark_lock+0xf5/0x2df0 [ 1582.113897] ? lock_chain_count+0x20/0x20 [ 1582.114388] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1582.115007] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1582.115660] ? lock_acquire+0x197/0x470 [ 1582.116136] ? __lock_acquire+0xbb1/0x5b00 [ 1582.116647] io_issue_sqe+0x2e8a/0x77b0 [ 1582.117124] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1582.117756] ? lock_chain_count+0x20/0x20 [ 1582.118255] ? __is_insn_slot_addr+0x14c/0x290 [ 1582.118799] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1582.119427] ? io_connect+0x610/0x610 [ 1582.119882] ? lock_acquire+0x197/0x470 [ 1582.120355] ? find_held_lock+0x2c/0x110 [ 1582.120840] ? __fget_files+0x2cf/0x520 [ 1582.121311] ? lock_downgrade+0x6d0/0x6d0 [ 1582.121813] __io_queue_sqe+0x90/0x9d0 [ 1582.122277] ? io_issue_sqe+0x77b0/0x77b0 [ 1582.122766] ? __fget_files+0x2f8/0x520 [ 1582.123242] ? io_prep_rw+0x7f5/0x1050 [ 1582.123707] io_submit_sqes+0x44aa/0x8610 [ 1582.124213] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1582.124805] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1582.125376] ? find_held_lock+0x2c/0x110 [ 1582.125867] ? io_submit_sqes+0x8610/0x8610 [ 1582.126381] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1582.126954] ? wait_for_completion_io+0x270/0x270 [ 1582.127526] ? rcu_read_lock_any_held+0x75/0xa0 [ 1582.128080] ? vfs_write+0x354/0xb10 [ 1582.128521] ? fput_many+0x2f/0x1a0 [ 1582.128949] ? ksys_write+0x1a9/0x260 [ 1582.129402] ? __ia32_sys_read+0xb0/0xb0 [ 1582.129890] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1582.130511] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1582.131120] do_syscall_64+0x33/0x40 [ 1582.131558] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.132163] RIP: 0033:0x7f67cefd1b19 [ 1582.132601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.134778] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1582.135676] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1582.136515] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1582.137361] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.138208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1582.139052] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:28:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 8) 02:28:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x80000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:28:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:28:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:28:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc1, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) [ 1582.234500] FAULT_INJECTION: forcing a failure. [ 1582.234500] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.235868] CPU: 1 PID: 8618 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1582.236646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.237617] Call Trace: [ 1582.237924] dump_stack+0x107/0x167 [ 1582.238341] should_fail.cold+0x5/0xa [ 1582.238780] ? cgroup_show_path+0xc4/0x5f0 [ 1582.239262] should_failslab+0x5/0x20 [ 1582.239697] kmem_cache_alloc_trace+0x55/0x320 [ 1582.240218] cgroup_show_path+0xc4/0x5f0 [ 1582.240679] ? cgroup_file_open+0x360/0x360 [ 1582.241175] kernfs_sop_show_path+0x122/0x190 [ 1582.241692] ? kernfs_test_super+0x140/0x140 [ 1582.242191] show_mountinfo+0x23b/0xb80 [ 1582.242645] ? rwlock_bug.part.0+0x90/0x90 [ 1582.243128] ? mounts_release+0x100/0x100 [ 1582.243596] ? do_raw_spin_unlock+0x4f/0x220 [ 1582.244095] ? _raw_spin_unlock+0x1a/0x30 [ 1582.244569] traverse.part.0+0xd7/0x620 [ 1582.245024] seq_read_iter+0x934/0x12b0 [ 1582.245475] ? __might_fault+0xd3/0x180 [ 1582.245944] do_iter_readv_writev+0x57c/0x750 [ 1582.246457] ? new_sync_write+0x660/0x660 [ 1582.246929] ? fsnotify_perm.part.0+0x22d/0x620 [ 1582.247459] ? security_file_permission+0xb1/0xe0 [ 1582.248008] do_iter_read+0x301/0x760 [ 1582.248444] ? import_iovec+0x83/0xb0 [ 1582.248877] vfs_readv+0xe5/0x160 [ 1582.249272] ? vfs_iter_read+0xa0/0xa0 [ 1582.249724] ? __fget_files+0x2cf/0x520 [ 1582.250179] ? ksys_write+0x12d/0x260 [ 1582.250615] ? __fget_files+0x2f8/0x520 [ 1582.251072] __x64_sys_preadv+0x235/0x310 [ 1582.251539] ? __ia32_sys_writev+0xb0/0xb0 [ 1582.252024] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1582.252618] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1582.253205] do_syscall_64+0x33/0x40 [ 1582.253632] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.254213] RIP: 0033:0x7f15d5707b19 [ 1582.254637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.256727] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1582.257591] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1582.258409] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1582.259220] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.260027] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1582.260835] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 02:28:20 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:28:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:28:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 9) 02:28:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1582.379038] FAULT_INJECTION: forcing a failure. [ 1582.379038] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.380350] CPU: 1 PID: 8628 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1582.381123] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.382071] Call Trace: [ 1582.382376] dump_stack+0x107/0x167 [ 1582.382790] should_fail.cold+0x5/0xa [ 1582.383228] ? __iomap_dio_rw+0x1ee/0x1110 [ 1582.383709] should_failslab+0x5/0x20 [ 1582.384141] kmem_cache_alloc_trace+0x55/0x320 [ 1582.384672] __iomap_dio_rw+0x1ee/0x1110 [ 1582.385138] ? lock_release+0x680/0x680 [ 1582.385593] ? fsnotify+0x1570/0x1570 [ 1582.386034] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1582.386558] ? down_read_trylock+0x193/0x350 [ 1582.387059] ? ext4_file_read_iter+0x356/0x4c0 [ 1582.387576] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1582.388137] iomap_dio_rw+0x31/0x90 [ 1582.388551] ext4_file_read_iter+0x2c7/0x4c0 [ 1582.389055] ? ext4_release_file+0x380/0x380 [ 1582.389560] io_read+0x2dc/0x11e0 [ 1582.389970] ? kiocb_done+0xc90/0xc90 [ 1582.390402] ? mark_lock+0xf5/0x2df0 [ 1582.390830] ? lock_chain_count+0x20/0x20 [ 1582.391309] ? stack_trace_consume_entry+0x160/0x160 [ 1582.391886] ? lock_acquire+0x197/0x470 [ 1582.392340] ? lock_acquire+0x197/0x470 [ 1582.392796] ? __lock_acquire+0xbb1/0x5b00 [ 1582.393280] io_issue_sqe+0x2e8a/0x77b0 [ 1582.393744] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1582.394335] ? lock_chain_count+0x20/0x20 [ 1582.394809] ? __is_insn_slot_addr+0x14c/0x290 [ 1582.395328] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1582.395920] ? io_connect+0x610/0x610 [ 1582.396354] ? lock_acquire+0x197/0x470 [ 1582.396805] ? find_held_lock+0x2c/0x110 [ 1582.397270] ? __fget_files+0x2cf/0x520 [ 1582.397728] ? lock_downgrade+0x6d0/0x6d0 [ 1582.398205] __io_queue_sqe+0x90/0x9d0 [ 1582.398652] ? io_issue_sqe+0x77b0/0x77b0 [ 1582.399119] ? __fget_files+0x2f8/0x520 [ 1582.399572] ? io_prep_rw+0x7f5/0x1050 [ 1582.400016] io_submit_sqes+0x44aa/0x8610 [ 1582.400503] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1582.401070] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1582.401629] ? find_held_lock+0x2c/0x110 [ 1582.402096] ? io_submit_sqes+0x8610/0x8610 [ 1582.402593] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1582.403142] ? wait_for_completion_io+0x270/0x270 [ 1582.403690] ? rcu_read_lock_any_held+0x75/0xa0 [ 1582.404221] ? vfs_write+0x354/0xb10 [ 1582.404645] ? fput_many+0x2f/0x1a0 [ 1582.405063] ? ksys_write+0x1a9/0x260 [ 1582.405497] ? __ia32_sys_read+0xb0/0xb0 [ 1582.405967] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1582.406566] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1582.407150] do_syscall_64+0x33/0x40 [ 1582.407575] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.408155] RIP: 0033:0x7f67cefd1b19 [ 1582.408577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.410673] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1582.411540] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1582.412349] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1582.413158] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.413979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1582.414791] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:28:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xfffff) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1582.456671] FAULT_INJECTION: forcing a failure. [ 1582.456671] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.458084] CPU: 1 PID: 8635 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1582.458859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.459809] Call Trace: [ 1582.460118] dump_stack+0x107/0x167 [ 1582.460532] should_fail.cold+0x5/0xa [ 1582.460965] ? create_object.isra.0+0x3a/0xa20 [ 1582.461482] should_failslab+0x5/0x20 [ 1582.461924] kmem_cache_alloc+0x5b/0x310 [ 1582.462384] create_object.isra.0+0x3a/0xa20 [ 1582.462895] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1582.463494] kmem_cache_alloc_trace+0x151/0x320 [ 1582.464055] cgroup_show_path+0xc4/0x5f0 [ 1582.464524] ? cgroup_file_open+0x360/0x360 [ 1582.465027] kernfs_sop_show_path+0x122/0x190 [ 1582.465564] ? kernfs_test_super+0x140/0x140 [ 1582.466079] show_mountinfo+0x23b/0xb80 [ 1582.466532] ? rwlock_bug.part.0+0x90/0x90 [ 1582.467019] ? mounts_release+0x100/0x100 [ 1582.467487] ? do_raw_spin_unlock+0x4f/0x220 [ 1582.467997] ? _raw_spin_unlock+0x1a/0x30 [ 1582.468474] traverse.part.0+0xd7/0x620 [ 1582.468933] seq_read_iter+0x934/0x12b0 [ 1582.469384] ? __might_fault+0xd3/0x180 [ 1582.469857] do_iter_readv_writev+0x57c/0x750 [ 1582.470371] ? new_sync_write+0x660/0x660 [ 1582.470849] ? fsnotify_perm.part.0+0x22d/0x620 [ 1582.471381] ? security_file_permission+0xb1/0xe0 [ 1582.471936] do_iter_read+0x301/0x760 [ 1582.472371] ? import_iovec+0x83/0xb0 [ 1582.472804] vfs_readv+0xe5/0x160 [ 1582.473199] ? vfs_iter_read+0xa0/0xa0 [ 1582.473651] ? __fget_files+0x2cf/0x520 [ 1582.474106] ? ksys_write+0x12d/0x260 [ 1582.474541] ? __fget_files+0x2f8/0x520 [ 1582.475006] __x64_sys_preadv+0x235/0x310 [ 1582.475475] ? __ia32_sys_writev+0xb0/0xb0 [ 1582.475964] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1582.476559] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1582.477145] do_syscall_64+0x33/0x40 [ 1582.477567] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.478156] RIP: 0033:0x7f15d5707b19 [ 1582.478579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.480672] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1582.481541] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1582.482353] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1582.483166] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.483975] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1582.484782] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 02:28:34 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:28:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:28:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x400000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:28:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 10) 02:28:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:28:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:28:34 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:28:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1596.479549] FAULT_INJECTION: forcing a failure. [ 1596.479549] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.482193] CPU: 1 PID: 8660 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1596.483736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.485588] Call Trace: [ 1596.486185] dump_stack+0x107/0x167 [ 1596.487005] should_fail.cold+0x5/0xa [ 1596.487867] ? cgroup_show_path+0xc4/0x5f0 [ 1596.488833] should_failslab+0x5/0x20 [ 1596.489721] kmem_cache_alloc_trace+0x55/0x320 [ 1596.490789] cgroup_show_path+0xc4/0x5f0 [ 1596.491736] ? cgroup_file_open+0x360/0x360 [ 1596.492745] kernfs_sop_show_path+0x122/0x190 [ 1596.493773] ? kernfs_test_super+0x140/0x140 [ 1596.494785] show_mountinfo+0x23b/0xb80 [ 1596.495687] ? rwlock_bug.part.0+0x90/0x90 [ 1596.496642] ? mounts_release+0x100/0x100 [ 1596.497579] ? do_raw_spin_unlock+0x4f/0x220 [ 1596.498575] ? _raw_spin_unlock+0x1a/0x30 [ 1596.499519] traverse.part.0+0xd7/0x620 [ 1596.500426] seq_read_iter+0x934/0x12b0 [ 1596.501330] ? __might_fault+0xd3/0x180 [ 1596.502266] do_iter_readv_writev+0x57c/0x750 [ 1596.503322] ? new_sync_write+0x660/0x660 [ 1596.504257] ? fsnotify_perm.part.0+0x22d/0x620 [ 1596.505315] ? security_file_permission+0xb1/0xe0 [ 1596.506447] do_iter_read+0x301/0x760 [ 1596.507344] ? import_iovec+0x83/0xb0 [ 1596.508209] vfs_readv+0xe5/0x160 [ 1596.509017] ? vfs_iter_read+0xa0/0xa0 [ 1596.509939] ? __fget_files+0x2cf/0x520 [ 1596.510821] ? ksys_write+0x12d/0x260 [ 1596.511673] ? __fget_files+0x2f8/0x520 [ 1596.512563] __x64_sys_preadv+0x235/0x310 [ 1596.513478] ? __ia32_sys_writev+0xb0/0xb0 [ 1596.514429] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.515603] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.516743] do_syscall_64+0x33/0x40 [ 1596.517565] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1596.518706] RIP: 0033:0x7f15d5707b19 [ 1596.519532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1596.523655] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1596.524227] FAULT_INJECTION: forcing a failure. [ 1596.524227] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.525338] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1596.525393] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1596.525404] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1596.525416] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1596.525427] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 [ 1596.537081] CPU: 0 PID: 8652 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1596.538679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.540592] Call Trace: [ 1596.541217] dump_stack+0x107/0x167 [ 1596.542068] should_fail.cold+0x5/0xa [ 1596.542949] ? create_object.isra.0+0x3a/0xa20 [ 1596.544001] should_failslab+0x5/0x20 [ 1596.544880] kmem_cache_alloc+0x5b/0x310 [ 1596.545830] create_object.isra.0+0x3a/0xa20 [ 1596.546839] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1596.548018] kmem_cache_alloc_trace+0x151/0x320 [ 1596.549098] __iomap_dio_rw+0x1ee/0x1110 [ 1596.550058] ? lock_release+0x680/0x680 [ 1596.550982] ? fsnotify+0x1570/0x1570 [ 1596.551870] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1596.552934] ? down_read_trylock+0x193/0x350 [ 1596.553956] ? ext4_file_read_iter+0x356/0x4c0 [ 1596.555012] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1596.556145] iomap_dio_rw+0x31/0x90 [ 1596.556983] ext4_file_read_iter+0x2c7/0x4c0 [ 1596.558003] ? ext4_release_file+0x380/0x380 [ 1596.559013] io_read+0x2dc/0x11e0 [ 1596.559823] ? kiocb_done+0xc90/0xc90 [ 1596.560702] ? mark_lock+0xf5/0x2df0 [ 1596.561568] ? lock_chain_count+0x20/0x20 [ 1596.562544] ? stack_trace_consume_entry+0x160/0x160 [ 1596.563725] ? lock_acquire+0x197/0x470 [ 1596.564646] ? __lock_acquire+0xbb1/0x5b00 [ 1596.565621] io_issue_sqe+0x2e8a/0x77b0 [ 1596.566556] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1596.567757] ? lock_chain_count+0x20/0x20 [ 1596.568708] ? lock_chain_count+0x20/0x20 [ 1596.569663] ? __is_insn_slot_addr+0x14c/0x290 [ 1596.570723] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1596.571925] ? io_connect+0x610/0x610 [ 1596.572805] ? lock_acquire+0x197/0x470 [ 1596.573716] ? find_held_lock+0x2c/0x110 [ 1596.574663] ? __fget_files+0x2cf/0x520 [ 1596.575576] ? lock_downgrade+0x6d0/0x6d0 [ 1596.576545] __io_queue_sqe+0x90/0x9d0 [ 1596.577446] ? io_issue_sqe+0x77b0/0x77b0 [ 1596.578402] ? __fget_files+0x2f8/0x520 [ 1596.579321] ? io_prep_rw+0x7f5/0x1050 [ 1596.580225] io_submit_sqes+0x44aa/0x8610 [ 1596.581207] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1596.582356] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1596.583472] ? find_held_lock+0x2c/0x110 [ 1596.584411] ? io_submit_sqes+0x8610/0x8610 [ 1596.585408] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1596.586529] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.587733] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1596.588973] ? trace_hardirqs_on+0x5b/0x180 [ 1596.589992] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1596.591242] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.592432] do_syscall_64+0x33/0x40 [ 1596.593300] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1596.594490] RIP: 0033:0x7f67cefd1b19 [ 1596.595353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1596.599615] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1596.601366] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1596.603023] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1596.604690] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1596.606350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1596.607998] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:28:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x1000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:28:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:28:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:28:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 11) 02:28:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1596.748722] FAULT_INJECTION: forcing a failure. [ 1596.748722] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.751238] CPU: 1 PID: 8672 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1596.752700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.754476] Call Trace: [ 1596.755035] dump_stack+0x107/0x167 [ 1596.755810] should_fail.cold+0x5/0xa [ 1596.756627] ? create_object.isra.0+0x3a/0xa20 [ 1596.757598] should_failslab+0x5/0x20 [ 1596.758404] kmem_cache_alloc+0x5b/0x310 [ 1596.759262] create_object.isra.0+0x3a/0xa20 [ 1596.760205] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1596.761293] kmem_cache_alloc_trace+0x151/0x320 [ 1596.762288] cgroup_show_path+0xc4/0x5f0 [ 1596.763165] ? cgroup_file_open+0x360/0x360 [ 1596.764094] kernfs_sop_show_path+0x122/0x190 [ 1596.765036] ? kernfs_test_super+0x140/0x140 [ 1596.765980] show_mountinfo+0x23b/0xb80 [ 1596.766828] ? rwlock_bug.part.0+0x90/0x90 [ 1596.767737] ? mounts_release+0x100/0x100 [ 1596.768621] ? do_raw_spin_unlock+0x4f/0x220 [ 1596.769564] ? _raw_spin_unlock+0x1a/0x30 [ 1596.770450] traverse.part.0+0xd7/0x620 [ 1596.771300] seq_read_iter+0x934/0x12b0 [ 1596.772148] ? __might_fault+0xd3/0x180 [ 1596.773002] do_iter_readv_writev+0x57c/0x750 [ 1596.773966] ? new_sync_write+0x660/0x660 [ 1596.774862] ? fsnotify_perm.part.0+0x22d/0x620 [ 1596.775852] ? security_file_permission+0xb1/0xe0 [ 1596.776873] do_iter_read+0x301/0x760 [ 1596.777678] ? import_iovec+0x83/0xb0 [ 1596.778486] vfs_readv+0xe5/0x160 [ 1596.779212] ? vfs_iter_read+0xa0/0xa0 [ 1596.780029] ? __fget_files+0x2cf/0x520 [ 1596.780863] ? ksys_write+0x12d/0x260 [ 1596.781679] ? __fget_files+0x2f8/0x520 [ 1596.782529] __x64_sys_preadv+0x235/0x310 [ 1596.783406] ? __ia32_sys_writev+0xb0/0xb0 [ 1596.784304] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.785423] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.786514] do_syscall_64+0x33/0x40 [ 1596.787303] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1596.788413] RIP: 0033:0x7f15d5707b19 [ 1596.789199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1596.793141] RSP: 002b:00007f15d2c7d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1596.794772] RAX: ffffffffffffffda RBX: 00007f15d581af60 RCX: 00007f15d5707b19 [ 1596.796279] RDX: 0000000000000001 RSI: 00000000200008c0 RDI: 0000000000000003 [ 1596.797804] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1596.799331] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1596.800846] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 02:28:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x2000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:28:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:28:47 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:28:47 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x3000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:28:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:28:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:28:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:28:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) (fail_nth: 12) 02:28:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) [ 1609.996041] FAULT_INJECTION: forcing a failure. [ 1609.996041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1609.998163] CPU: 0 PID: 8699 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 1609.999405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1610.000909] Call Trace: [ 1610.001418] dump_stack+0x107/0x167 [ 1610.002121] should_fail.cold+0x5/0xa [ 1610.002824] _copy_to_user+0x2e/0x180 [ 1610.003480] simple_read_from_buffer+0xcc/0x160 [ 1610.004281] proc_fail_nth_read+0x198/0x230 [ 1610.005003] ? proc_sessionid_read+0x230/0x230 [ 1610.005772] ? security_file_permission+0xb1/0xe0 [ 1610.006612] ? proc_sessionid_read+0x230/0x230 [ 1610.007372] vfs_read+0x228/0x620 [ 1610.007966] ksys_read+0x12d/0x260 [ 1610.008548] ? vfs_write+0xb10/0xb10 [ 1610.009185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1610.010092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1610.010963] do_syscall_64+0x33/0x40 [ 1610.011590] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1610.012447] RIP: 0033:0x7f15d56ba69c [ 1610.013076] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1610.016170] RSP: 002b:00007f15d2c7d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1610.017456] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f15d56ba69c [ 1610.018714] RDX: 000000000000000f RSI: 00007f15d2c7d1e0 RDI: 0000000000000004 [ 1610.019940] RBP: 00007f15d2c7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1610.021164] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1610.022394] R13: 00007fffe9943f1f R14: 00007f15d2c7d300 R15: 0000000000022000 [ 1610.056781] FAULT_INJECTION: forcing a failure. [ 1610.056781] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1610.059313] CPU: 1 PID: 8693 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1610.060751] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1610.062523] Call Trace: [ 1610.063084] dump_stack+0x107/0x167 [ 1610.063860] should_fail.cold+0x5/0xa [ 1610.064684] _copy_from_user+0x2e/0x1b0 [ 1610.065529] iovec_from_user+0x141/0x400 [ 1610.066411] __import_iovec+0x67/0x590 [ 1610.067245] io_import_iovec+0x581/0x1120 [ 1610.068135] ? io_complete_rw+0x230/0x230 [ 1610.069021] ? kiocb_done+0x16b/0xc90 [ 1610.069827] io_read+0xe14/0x11e0 [ 1610.070582] ? kiocb_done+0xc90/0xc90 02:28:47 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x4000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1610.071389] ? mark_lock+0xf5/0x2df0 [ 1610.072389] ? lock_chain_count+0x20/0x20 [ 1610.073276] ? stack_trace_consume_entry+0x160/0x160 [ 1610.074368] ? lock_acquire+0x197/0x470 [ 1610.075221] ? __lock_acquire+0xbb1/0x5b00 [ 1610.076117] io_issue_sqe+0x2e8a/0x77b0 [ 1610.076975] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1610.078090] ? lock_chain_count+0x20/0x20 [ 1610.078968] ? __is_insn_slot_addr+0x14c/0x290 [ 1610.079934] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1610.081046] ? io_connect+0x610/0x610 [ 1610.081855] ? lock_acquire+0x197/0x470 [ 1610.082701] ? find_held_lock+0x2c/0x110 [ 1610.083567] ? __fget_files+0x2cf/0x520 [ 1610.084406] ? lock_downgrade+0x6d0/0x6d0 [ 1610.085282] __io_queue_sqe+0x90/0x9d0 [ 1610.086123] ? io_issue_sqe+0x77b0/0x77b0 [ 1610.086996] ? __fget_files+0x2f8/0x520 [ 1610.087847] ? io_prep_rw+0x7f5/0x1050 [ 1610.088677] io_submit_sqes+0x44aa/0x8610 [ 1610.089576] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1610.090630] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1610.091655] ? find_held_lock+0x2c/0x110 [ 1610.092512] ? io_submit_sqes+0x8610/0x8610 [ 1610.093424] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1610.094450] ? wait_for_completion_io+0x270/0x270 [ 1610.095464] ? rcu_read_lock_any_held+0x75/0xa0 [ 1610.096447] ? vfs_write+0x354/0xb10 [ 1610.097231] ? fput_many+0x2f/0x1a0 [ 1610.098011] ? ksys_write+0x1a9/0x260 [ 1610.098815] ? __ia32_sys_read+0xb0/0xb0 [ 1610.099680] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1610.100794] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1610.101886] do_syscall_64+0x33/0x40 [ 1610.102687] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1610.103759] RIP: 0033:0x7f67cefd1b19 [ 1610.104545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1610.108442] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1610.110061] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 02:28:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) [ 1610.111571] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1610.113300] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1610.114825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1610.116329] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:28:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:28:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:28:48 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x5000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:28:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:28:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0x20000608}], 0x1, 0xffffffff, 0x0) 02:28:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:29:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:29:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x6000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:29:03 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:29:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0x7ffff000}], 0x1, 0xffffffff, 0x0) 02:29:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) [ 1625.788097] FAULT_INJECTION: forcing a failure. [ 1625.788097] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.790525] CPU: 1 PID: 8738 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1625.791975] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.793733] Call Trace: [ 1625.794312] dump_stack+0x107/0x167 [ 1625.795079] should_fail.cold+0x5/0xa [ 1625.795889] ? __iomap_dio_rw+0x1ee/0x1110 [ 1625.796784] should_failslab+0x5/0x20 [ 1625.797591] kmem_cache_alloc_trace+0x55/0x320 [ 1625.798578] __iomap_dio_rw+0x1ee/0x1110 [ 1625.799432] ? lock_release+0x680/0x680 [ 1625.800283] ? fsnotify+0x1570/0x1570 [ 1625.801088] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1625.802057] ? down_read_trylock+0x193/0x350 [ 1625.802994] ? ext4_file_read_iter+0x356/0x4c0 [ 1625.803967] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1625.805012] iomap_dio_rw+0x31/0x90 [ 1625.805780] ext4_file_read_iter+0x2c7/0x4c0 [ 1625.806727] ? ext4_release_file+0x380/0x380 [ 1625.807652] io_read+0x2dc/0x11e0 [ 1625.808398] ? kiocb_done+0xc90/0xc90 [ 1625.809203] ? mark_lock+0xf5/0x2df0 [ 1625.810000] ? lock_chain_count+0x20/0x20 [ 1625.810897] ? stack_trace_consume_entry+0x160/0x160 [ 1625.812009] ? lock_acquire+0x197/0x470 [ 1625.812853] ? __lock_acquire+0xbb1/0x5b00 [ 1625.813764] io_issue_sqe+0x2e8a/0x77b0 [ 1625.814638] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1625.815769] ? lock_chain_count+0x20/0x20 [ 1625.816665] ? __is_insn_slot_addr+0x14c/0x290 [ 1625.817646] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1625.818774] ? io_connect+0x610/0x610 [ 1625.819577] ? lock_acquire+0x197/0x470 [ 1625.820407] ? find_held_lock+0x2c/0x110 [ 1625.821274] ? __fget_files+0x2cf/0x520 [ 1625.822119] ? lock_downgrade+0x6d0/0x6d0 [ 1625.823004] __io_queue_sqe+0x90/0x9d0 [ 1625.823830] ? io_issue_sqe+0x77b0/0x77b0 [ 1625.824725] ? __fget_files+0x2f8/0x520 [ 1625.825598] ? io_prep_rw+0x7f5/0x1050 [ 1625.826448] io_submit_sqes+0x44aa/0x8610 [ 1625.827375] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1625.828453] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1625.829465] ? find_held_lock+0x2c/0x110 [ 1625.830332] ? io_submit_sqes+0x8610/0x8610 [ 1625.831248] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1625.832280] ? wait_for_completion_io+0x270/0x270 [ 1625.833289] ? rcu_read_lock_any_held+0x75/0xa0 [ 1625.834298] ? vfs_write+0x354/0xb10 [ 1625.835097] ? fput_many+0x2f/0x1a0 [ 1625.835872] ? ksys_write+0x1a9/0x260 [ 1625.836696] ? __ia32_sys_read+0xb0/0xb0 [ 1625.837579] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1625.838714] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.839816] do_syscall_64+0x33/0x40 [ 1625.840610] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.841700] RIP: 0033:0x7f67cefd1b19 [ 1625.842502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.846441] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1625.848040] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1625.849556] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1625.851054] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1625.852550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1625.854029] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:29:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x7000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x2, 0xffffffff, 0x0) 02:29:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x5, 0xffffffff, 0x0) 02:29:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x10000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:29:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:29:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:16 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x6, 0xffffffff, 0x0) 02:29:16 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:29:16 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:29:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x18000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x0, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) [ 1639.189325] FAULT_INJECTION: forcing a failure. [ 1639.189325] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.191975] CPU: 1 PID: 8778 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1639.193441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.195259] Call Trace: [ 1639.195830] dump_stack+0x107/0x167 [ 1639.196613] should_fail.cold+0x5/0xa [ 1639.197431] ? create_object.isra.0+0x3a/0xa20 [ 1639.198436] should_failslab+0x5/0x20 [ 1639.199258] kmem_cache_alloc+0x5b/0x310 [ 1639.200125] create_object.isra.0+0x3a/0xa20 [ 1639.201058] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1639.202154] kmem_cache_alloc_trace+0x151/0x320 [ 1639.203169] __iomap_dio_rw+0x1ee/0x1110 [ 1639.204045] ? lock_release+0x680/0x680 [ 1639.204896] ? fsnotify+0x1570/0x1570 [ 1639.205706] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1639.206717] ? down_read_trylock+0x193/0x350 [ 1639.207655] ? ext4_file_read_iter+0x356/0x4c0 [ 1639.208625] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1639.209674] iomap_dio_rw+0x31/0x90 [ 1639.210469] ext4_file_read_iter+0x2c7/0x4c0 [ 1639.211404] ? ext4_release_file+0x380/0x380 [ 1639.212338] io_read+0x2dc/0x11e0 [ 1639.213088] ? kiocb_done+0xc90/0xc90 [ 1639.213998] ? mark_lock+0xf5/0x2df0 [ 1639.214922] ? lock_chain_count+0x20/0x20 [ 1639.216081] ? stack_trace_consume_entry+0x160/0x160 [ 1639.217477] ? lock_acquire+0x197/0x470 [ 1639.218622] ? __lock_acquire+0xbb1/0x5b00 [ 1639.219790] io_issue_sqe+0x2e8a/0x77b0 [ 1639.220891] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1639.222068] ? lock_chain_count+0x20/0x20 [ 1639.223024] ? __is_insn_slot_addr+0x14c/0x290 [ 1639.224157] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1639.225365] ? io_connect+0x610/0x610 [ 1639.226213] ? lock_acquire+0x197/0x470 [ 1639.227078] ? find_held_lock+0x2c/0x110 [ 1639.227953] ? __fget_files+0x2cf/0x520 [ 1639.228804] ? lock_downgrade+0x6d0/0x6d0 [ 1639.229692] __io_queue_sqe+0x90/0x9d0 [ 1639.230556] ? io_issue_sqe+0x77b0/0x77b0 [ 1639.231453] ? __fget_files+0x2f8/0x520 [ 1639.232313] ? io_prep_rw+0x7f5/0x1050 [ 1639.233175] io_submit_sqes+0x44aa/0x8610 [ 1639.234092] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1639.235168] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1639.236218] ? find_held_lock+0x2c/0x110 [ 1639.237251] ? io_submit_sqes+0x8610/0x8610 [ 1639.238291] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.239353] ? wait_for_completion_io+0x270/0x270 [ 1639.240384] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.241381] ? vfs_write+0x354/0xb10 [ 1639.242202] ? fput_many+0x2f/0x1a0 [ 1639.243003] ? ksys_write+0x1a9/0x260 [ 1639.243820] ? __ia32_sys_read+0xb0/0xb0 [ 1639.244703] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.245827] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.246961] do_syscall_64+0x33/0x40 [ 1639.247763] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1639.248858] RIP: 0033:0x7f67cefd1b19 [ 1639.249656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.253641] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1639.255277] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1639.256795] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1639.258317] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.259856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.261371] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:29:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x8, 0xffffffff, 0x0) 02:29:17 executing program 2: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file1\x00', 0x6000, 0x40) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x6000, @fd_index=0x1, 0xc4d, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_OPENAT2={0x1c, 0x5, 0x0, 0xffffffffffffff9c, &(0x7f0000000100)={0x80000, 0x13, 0x6}, &(0x7f0000000180)='./file0\x00', 0x18, 0x0, 0x12345, {0x0, r4}}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x10480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000140)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x6000, @fd_index=0x1, 0xc4d, 0x0, 0x0, 0x1, 0x0, {0x0, r5}}, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x0, r5) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r7, &(0x7f0000000600)=[{{&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000500)=""/206, 0xce}], 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c00e600000000000100000002000000fae54e3867a3d73591f33212957717e6014e8f333f528e828538a8d816ca1b0dfbfc7c2de9c42dc16d3ac2d1f5b304b4e13d723c9744b6079b9eb8315e9d6a2614ecf25e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x80}}], 0x1, 0x120, &(0x7f0000000640)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000680)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r8, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r3}}, 0x240) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@cache_mmap}, {@uname={'uname', 0x3d, '\xdc.:-\xbd'}}]}}) openat(r6, &(0x7f0000000200)='./file2\x00', 0x101003, 0x80) 02:29:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x0, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:17 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x3e000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x12, 0xffffffff, 0x0) 02:29:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:29:31 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:29:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:29:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x0, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x3f000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:29:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x300, 0xffffffff, 0x0) 02:29:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1653.847503] FAULT_INJECTION: forcing a failure. [ 1653.847503] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1653.849078] CPU: 0 PID: 8820 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1653.849954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1653.851011] Call Trace: [ 1653.851355] dump_stack+0x107/0x167 [ 1653.851823] should_fail.cold+0x5/0xa [ 1653.852327] _copy_from_user+0x2e/0x1b0 [ 1653.852833] iovec_from_user+0x141/0x400 [ 1653.853346] __import_iovec+0x67/0x590 [ 1653.853848] io_import_iovec+0x581/0x1120 [ 1653.854374] ? io_complete_rw+0x230/0x230 [ 1653.854903] ? kiocb_done+0x16b/0xc90 [ 1653.855397] io_read+0xe14/0x11e0 [ 1653.855832] ? kiocb_done+0xc90/0xc90 [ 1653.856311] ? mark_lock+0xf5/0x2df0 [ 1653.856770] ? lock_chain_count+0x20/0x20 [ 1653.857301] ? stack_trace_consume_entry+0x160/0x160 [ 1653.857917] ? lock_acquire+0x197/0x470 [ 1653.858418] ? lock_acquire+0x197/0x470 [ 1653.858917] ? __lock_acquire+0xbb1/0x5b00 [ 1653.859465] io_issue_sqe+0x2e8a/0x77b0 [ 1653.859962] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1653.860632] ? lock_chain_count+0x20/0x20 [ 1653.861151] ? __is_insn_slot_addr+0x14c/0x290 [ 1653.861726] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1653.862382] ? io_connect+0x610/0x610 [ 1653.862873] ? lock_acquire+0x197/0x470 [ 1653.863367] ? find_held_lock+0x2c/0x110 [ 1653.863877] ? __fget_files+0x2cf/0x520 [ 1653.864379] ? lock_downgrade+0x6d0/0x6d0 [ 1653.864905] __io_queue_sqe+0x90/0x9d0 [ 1653.865409] ? io_issue_sqe+0x77b0/0x77b0 [ 1653.865918] ? __fget_files+0x2f8/0x520 [ 1653.866411] ? io_prep_rw+0x7f5/0x1050 [ 1653.866899] io_submit_sqes+0x44aa/0x8610 [ 1653.867435] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1653.868057] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1653.868650] ? find_held_lock+0x2c/0x110 [ 1653.869155] ? io_submit_sqes+0x8610/0x8610 [ 1653.869694] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1653.870304] ? wait_for_completion_io+0x270/0x270 [ 1653.870906] ? rcu_read_lock_any_held+0x75/0xa0 [ 1653.871490] ? vfs_write+0x354/0xb10 [ 1653.871956] ? fput_many+0x2f/0x1a0 [ 1653.872412] ? ksys_write+0x1a9/0x260 [ 1653.872885] ? __ia32_sys_read+0xb0/0xb0 [ 1653.873389] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1653.874047] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1653.874681] do_syscall_64+0x33/0x40 [ 1653.875161] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1653.875782] RIP: 0033:0x7f67cefd1b19 [ 1653.876240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1653.878484] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1653.879424] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1653.880305] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1653.881176] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1653.882100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1653.883013] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:29:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0xfa4, 0xffffffff, 0x0) 02:29:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x48000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0xfb6, 0xffffffff, 0x0) 02:29:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:29:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0xfb7, 0xffffffff, 0x0) 02:29:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:29:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xa3, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c3"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:29:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0xff3, 0xffffffff, 0x0) 02:29:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, 0x0, 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:45 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x4c000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:45 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:29:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) [ 1667.263375] FAULT_INJECTION: forcing a failure. [ 1667.263375] name failslab, interval 1, probability 0, space 0, times 0 [ 1667.266071] CPU: 1 PID: 8858 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1667.267665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1667.269582] Call Trace: [ 1667.270205] dump_stack+0x107/0x167 [ 1667.271061] should_fail.cold+0x5/0xa [ 1667.271948] ? __iomap_dio_rw+0x1ee/0x1110 [ 1667.272924] should_failslab+0x5/0x20 [ 1667.273786] kmem_cache_alloc_trace+0x55/0x320 [ 1667.274823] ? finish_task_switch+0x126/0x5d0 [ 1667.275844] __iomap_dio_rw+0x1ee/0x1110 [ 1667.276767] ? lock_release+0x680/0x680 [ 1667.277666] ? fsnotify+0x1570/0x1570 [ 1667.278531] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1667.279591] ? down_read_trylock+0x193/0x350 [ 1667.280607] ? ext4_file_read_iter+0x356/0x4c0 [ 1667.281651] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1667.282780] iomap_dio_rw+0x31/0x90 [ 1667.283623] ext4_file_read_iter+0x2c7/0x4c0 [ 1667.284643] ? ext4_release_file+0x380/0x380 [ 1667.285660] io_read+0x2dc/0x11e0 [ 1667.286453] ? __is_insn_slot_addr+0x14c/0x290 [ 1667.287494] ? kiocb_done+0xc90/0xc90 [ 1667.288355] ? mark_lock+0xf5/0x2df0 [ 1667.289191] ? register_lock_class+0xbb/0x17b0 [ 1667.290220] ? arch_stack_walk+0x99/0xf0 [ 1667.291144] ? lock_chain_count+0x20/0x20 [ 1667.292077] ? is_dynamic_key+0x1e0/0x1e0 [ 1667.293054] ? __lock_acquire+0x1657/0x5b00 [ 1667.294054] ? __lock_acquire+0xbb1/0x5b00 [ 1667.295039] io_issue_sqe+0x2e8a/0x77b0 [ 1667.295942] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1667.297121] ? lock_chain_count+0x20/0x20 [ 1667.298079] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1667.299315] ? io_connect+0x610/0x610 [ 1667.300195] ? lock_acquire+0x197/0x470 [ 1667.301097] ? find_held_lock+0x2c/0x110 [ 1667.302016] ? __fget_files+0x2cf/0x520 [ 1667.302935] ? lock_downgrade+0x6d0/0x6d0 [ 1667.303878] __io_queue_sqe+0x90/0x9d0 [ 1667.304769] ? io_issue_sqe+0x77b0/0x77b0 [ 1667.305707] ? __fget_files+0x2f8/0x520 [ 1667.306607] ? io_prep_rw+0x7f5/0x1050 [ 1667.307502] io_submit_sqes+0x44aa/0x8610 [ 1667.308470] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1667.309589] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1667.310703] ? find_held_lock+0x2c/0x110 [ 1667.311630] ? io_submit_sqes+0x8610/0x8610 [ 1667.312623] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1667.313713] ? wait_for_completion_io+0x270/0x270 [ 1667.314810] ? rcu_read_lock_any_held+0x75/0xa0 [ 1667.315854] ? vfs_write+0x354/0xb10 [ 1667.316693] ? fput_many+0x2f/0x1a0 [ 1667.317513] ? ksys_write+0x1a9/0x260 [ 1667.318389] ? __ia32_sys_read+0xb0/0xb0 [ 1667.319325] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1667.320515] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1667.321683] do_syscall_64+0x33/0x40 [ 1667.322535] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1667.323704] RIP: 0033:0x7f67cefd1b19 [ 1667.324551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1667.328737] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1667.330472] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1667.332111] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1667.333737] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1667.335367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 02:29:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) [ 1667.336996] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:29:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0xff4, 0xffffffff, 0x0) 02:29:45 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_open_dev$sg(0x0, 0x9e, 0x4a4043) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0xc4c03d09, 0x0) syz_io_uring_setup(0x48d, &(0x7f0000000200)={0x0, 0x0, 0x4}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff4000/0x4000)=nil, 0x0, &(0x7f0000000940)) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) recvmmsg(0xffffffffffffffff, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}, 0x4}], 0x1, 0x20000002, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="3e000400"/16]}) sendto(r2, &(0x7f0000000000)="4f015c00472a72899c", 0x9, 0x4080, &(0x7f0000000080)=@ethernet={0x6, @remote}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 02:29:45 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x68000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0xff5, 0xffffffff, 0x0) 02:29:45 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x6c000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xa3, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c3"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:29:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, 0x0, 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:29:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xa3, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c3"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:29:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xa3, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c3"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:29:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:29:59 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x74000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:59 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:29:59 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0xff7, 0xffffffff, 0x0) [ 1681.909505] FAULT_INJECTION: forcing a failure. [ 1681.909505] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.912451] CPU: 1 PID: 8913 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1681.914113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1681.916146] Call Trace: [ 1681.916787] dump_stack+0x107/0x167 [ 1681.917671] should_fail.cold+0x5/0xa [ 1681.918601] ? create_object.isra.0+0x3a/0xa20 [ 1681.919735] should_failslab+0x5/0x20 [ 1681.920671] kmem_cache_alloc+0x5b/0x310 [ 1681.921679] create_object.isra.0+0x3a/0xa20 [ 1681.922741] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1681.924001] kmem_cache_alloc_trace+0x151/0x320 [ 1681.925164] __iomap_dio_rw+0x1ee/0x1110 [ 1681.926168] ? lock_release+0x680/0x680 [ 1681.927165] ? fsnotify+0x1570/0x1570 [ 1681.928102] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1681.929236] ? down_read_trylock+0x193/0x350 [ 1681.930302] ? ext4_file_read_iter+0x356/0x4c0 [ 1681.931430] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1681.932644] iomap_dio_rw+0x31/0x90 [ 1681.933537] ext4_file_read_iter+0x2c7/0x4c0 [ 1681.934598] ? ext4_release_file+0x380/0x380 [ 1681.935695] io_read+0x2dc/0x11e0 [ 1681.936561] ? kiocb_done+0xc90/0xc90 [ 1681.937488] ? mark_lock+0xf5/0x2df0 [ 1681.938392] ? lock_chain_count+0x20/0x20 [ 1681.939417] ? stack_trace_consume_entry+0x160/0x160 [ 1681.940650] ? lock_acquire+0x197/0x470 [ 1681.941624] ? __lock_acquire+0xbb1/0x5b00 [ 1681.942651] io_issue_sqe+0x2e8a/0x77b0 [ 1681.943637] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1681.944910] ? lock_chain_count+0x20/0x20 [ 1681.945913] ? __is_insn_slot_addr+0x14c/0x290 [ 1681.947028] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1681.948288] ? io_connect+0x610/0x610 [ 1681.949206] ? lock_acquire+0x197/0x470 [ 1681.950178] ? find_held_lock+0x2c/0x110 [ 1681.951174] ? __fget_files+0x2cf/0x520 [ 1681.952127] ? lock_downgrade+0x6d0/0x6d0 [ 1681.953140] __io_queue_sqe+0x90/0x9d0 [ 1681.954075] ? io_issue_sqe+0x77b0/0x77b0 [ 1681.955085] ? __fget_files+0x2f8/0x520 [ 1681.956045] ? io_prep_rw+0x7f5/0x1050 [ 1681.956974] io_submit_sqes+0x44aa/0x8610 [ 1681.958005] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1681.959222] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1681.960380] ? find_held_lock+0x2c/0x110 [ 1681.961369] ? io_submit_sqes+0x8610/0x8610 [ 1681.962421] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1681.963589] ? wait_for_completion_io+0x270/0x270 [ 1681.964750] ? rcu_read_lock_any_held+0x75/0xa0 [ 1681.965873] ? vfs_write+0x354/0xb10 [ 1681.966765] ? fput_many+0x2f/0x1a0 [ 1681.967642] ? ksys_write+0x1a9/0x260 [ 1681.968560] ? __ia32_sys_read+0xb0/0xb0 [ 1681.969541] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1681.970801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1681.972052] do_syscall_64+0x33/0x40 [ 1681.972946] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1681.974175] RIP: 0033:0x7f67cefd1b19 [ 1681.975074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1681.979480] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1681.981298] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1681.983034] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1681.984725] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1681.986437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1681.988153] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:29:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:29:59 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0xff9, 0xffffffff, 0x0) 02:29:59 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x7a000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:29:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0xffd, 0xffffffff, 0x0) 02:30:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:30:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xaf, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:30:00 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x80040000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:13 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x581302, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000540)={{'\x00', 0x3}, {0x5}, 0x20, 0x0, 0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)="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", 0x138, 0x0, &(0x7f0000000440)={0x2, 0x8e, {0x0, 0xc, 0x38, "c396819282e7bd10064e01bb5ad19b8f9e1eab4eca00aa91842e95decd650e99a073c9480fc4e7351e1143dd87499580219ff7d8f4954530", 0x49, "8275c2537846850c3e90dc663ab55292c6722975b93a7bc735c576c2590fbdc9c58086dd85e9c015b7fb7699d94063dd899f90c970623377373c7a209eebad1fec744ade84f99b5076"}, 0x4e, "6a900feaf9625ec3e9cfcf7dfed29108b0d05fc5a2a19266924720abc4b61fc63986308e04e87f7ae9ba2cb2874a8f30161ab2b0f63893be2d21b8f35724ed34d463b1692e0b46f6d208de9bea99"}, 0xe8}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0, {0x200}}, './file0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000600)={{0x4, 0x2}, {0x1, 0xff}, 0x1000, 0x3, 0xfc}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0x74000000, 0x4) sendto(r3, &(0x7f0000000040)="5ea18a99", 0x4, 0x0, &(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000680)=[0x0, 0x7fffffff]) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000140)) recvmmsg(r3, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x35f, 0x10062, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000240)={0x29, @local, 0x4e21, 0x0, 'sh\x00', 0x52, 0x3ff, 0x1d}, 0x2c) openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0xa6001, 0x0) 02:30:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xaf, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:30:13 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:30:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x8cffffff) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x39, 0x0) 02:30:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:30:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:30:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x9f, 0x0) [ 1695.941170] FAULT_INJECTION: forcing a failure. [ 1695.941170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1695.943881] CPU: 0 PID: 8951 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1695.945423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1695.947304] Call Trace: [ 1695.947901] dump_stack+0x107/0x167 [ 1695.948732] should_fail.cold+0x5/0xa [ 1695.949595] _copy_from_user+0x2e/0x1b0 [ 1695.950490] iovec_from_user+0x141/0x400 [ 1695.951413] __import_iovec+0x67/0x590 [ 1695.952299] io_import_iovec+0x581/0x1120 [ 1695.953238] ? io_complete_rw+0x230/0x230 [ 1695.954198] ? kiocb_done+0x16b/0xc90 [ 1695.955066] io_read+0xe14/0x11e0 [ 1695.955863] ? kiocb_done+0xc90/0xc90 [ 1695.956720] ? mark_lock+0xf5/0x2df0 [ 1695.957566] ? lock_chain_count+0x20/0x20 [ 1695.958505] ? stack_trace_consume_entry+0x160/0x160 [ 1695.959665] ? lock_acquire+0x197/0x470 [ 1695.960568] ? __lock_acquire+0xbb1/0x5b00 [ 1695.961520] io_issue_sqe+0x2e8a/0x77b0 [ 1695.962441] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1695.963654] ? lock_chain_count+0x20/0x20 [ 1695.964590] ? __is_insn_slot_addr+0x14c/0x290 [ 1695.965633] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1695.966808] ? io_connect+0x610/0x610 [ 1695.967726] ? lock_acquire+0x197/0x470 [ 1695.968631] ? find_held_lock+0x2c/0x110 [ 1695.969559] ? __fget_files+0x2cf/0x520 [ 1695.970485] ? lock_downgrade+0x6d0/0x6d0 [ 1695.971411] __io_queue_sqe+0x90/0x9d0 [ 1695.972271] ? io_issue_sqe+0x77b0/0x77b0 [ 1695.973176] ? __fget_files+0x2f8/0x520 [ 1695.974055] ? io_prep_rw+0x7f5/0x1050 [ 1695.974910] io_submit_sqes+0x44aa/0x8610 [ 1695.975867] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1695.976966] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1695.978042] ? io_submit_sqes+0x8610/0x8610 [ 1695.978996] ? recalibrate_cpu_khz+0x10/0x10 [ 1695.979963] ? ktime_get+0x158/0x1f0 [ 1695.980800] ? setup_APIC_eilvt+0x2f0/0x2f0 [ 1695.981756] ? clockevents_program_event+0x131/0x360 [ 1695.982885] ? tick_program_event+0xa8/0x140 [ 1695.983867] ? hrtimer_interrupt+0x771/0x9b0 [ 1695.984855] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1695.986036] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1695.987221] do_syscall_64+0x33/0x40 [ 1695.988069] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1695.989229] RIP: 0033:0x7f67cefd1b19 [ 1695.990066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1695.994197] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1695.995900] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1695.997481] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1695.999080] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1696.000662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1696.002256] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:30:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xf6ffffff) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:30:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xe1, 0x0) 02:30:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xfeffffff) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:27 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:30:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xff030000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:30:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:30:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x14b, 0x0) 02:30:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xaf, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) [ 1709.480790] FAULT_INJECTION: forcing a failure. [ 1709.480790] name failslab, interval 1, probability 0, space 0, times 0 [ 1709.482226] CPU: 0 PID: 8985 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1709.483043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1709.484059] Call Trace: [ 1709.484382] dump_stack+0x107/0x167 [ 1709.484823] should_fail.cold+0x5/0xa [ 1709.485280] ? __iomap_dio_rw+0x1ee/0x1110 [ 1709.485783] should_failslab+0x5/0x20 [ 1709.486244] kmem_cache_alloc_trace+0x55/0x320 [ 1709.486789] ? finish_task_switch+0x126/0x5d0 [ 1709.487341] __iomap_dio_rw+0x1ee/0x1110 [ 1709.487832] ? lock_release+0x680/0x680 [ 1709.488307] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1709.488957] ? fsnotify+0x1570/0x1570 [ 1709.489418] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1709.489972] ? down_read_trylock+0x193/0x350 [ 1709.490494] ? ext4_file_read_iter+0x356/0x4c0 [ 1709.491044] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1709.491643] iomap_dio_rw+0x31/0x90 [ 1709.492089] ext4_file_read_iter+0x2c7/0x4c0 [ 1709.492616] ? ext4_release_file+0x380/0x380 [ 1709.493155] io_read+0x2dc/0x11e0 [ 1709.493580] ? kiocb_done+0xc90/0xc90 [ 1709.494033] ? mark_lock+0xf5/0x2df0 [ 1709.494492] ? lock_chain_count+0x20/0x20 [ 1709.494993] ? stack_trace_consume_entry+0x160/0x160 [ 1709.495618] ? lock_acquire+0x197/0x470 [ 1709.496100] ? __lock_acquire+0xbb1/0x5b00 [ 1709.496606] io_issue_sqe+0x2e8a/0x77b0 [ 1709.497097] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1709.497726] ? lock_chain_count+0x20/0x20 [ 1709.498223] ? __is_insn_slot_addr+0x14c/0x290 [ 1709.498782] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1709.499414] ? io_connect+0x610/0x610 [ 1709.499877] ? lock_acquire+0x197/0x470 [ 1709.500354] ? find_held_lock+0x2c/0x110 [ 1709.500847] ? __fget_files+0x2cf/0x520 [ 1709.501321] ? lock_downgrade+0x6d0/0x6d0 [ 1709.501817] __io_queue_sqe+0x90/0x9d0 [ 1709.502292] ? io_issue_sqe+0x77b0/0x77b0 [ 1709.502784] ? __fget_files+0x2f8/0x520 [ 1709.503279] ? io_prep_rw+0x7f5/0x1050 [ 1709.503747] io_submit_sqes+0x44aa/0x8610 [ 1709.504268] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1709.504860] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1709.505442] ? find_held_lock+0x2c/0x110 [ 1709.505944] ? io_submit_sqes+0x8610/0x8610 [ 1709.506472] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1709.507048] ? wait_for_completion_io+0x270/0x270 [ 1709.507647] ? rcu_read_lock_any_held+0x75/0xa0 [ 1709.508203] ? vfs_write+0x354/0xb10 [ 1709.508652] ? fput_many+0x2f/0x1a0 [ 1709.509092] ? ksys_write+0x1a9/0x260 [ 1709.509545] ? __ia32_sys_read+0xb0/0xb0 [ 1709.510039] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1709.510667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1709.511298] do_syscall_64+0x33/0x40 [ 1709.511743] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1709.512359] RIP: 0033:0x7f67cefd1b19 [ 1709.512809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1709.515012] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1709.515931] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1709.516800] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1709.517647] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1709.518499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1709.519380] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:30:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x1a3, 0x0) 02:30:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xffff0f00) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:30:27 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000000c0)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_RESIZEX(r1, 0x4b68, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x4, &(0x7f0000000180)={0x0, 0x28, 0x4}, &(0x7f0000000240)) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x281428, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cachetag={'cachetag', 0x3d, ':'}}, {@nodevmap}, {@cache_none}, {@version_L}, {@nodevmap}, {@nodevmap}], [{@appraise}, {@dont_measure}, {@smackfstransmute={'smackfstransmute', 0x3d, '^/+!%*,'}}]}}) timer_create(0x7, &(0x7f0000000400)={0x0, 0x3f, 0x1}, &(0x7f0000000440)=0x0) timer_gettime(r4, &(0x7f0000000340)) r5 = socket$netlink(0x10, 0x3, 0x0) timer_gettime(0x0, &(0x7f00000003c0)) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="cbc39c9a22849479000000000000000000000080"], 0x14}}, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000100)) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000002c0)=""/75) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:30:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xffffff8c) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xa3, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c3"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x1fa, 0x0) 02:30:40 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xfffffff6) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r4, 0x800000000000202) 02:30:40 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x2}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000040)={0x0, 0xea60}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x14) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup2(r2, r1) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x6, @mcast2, 0x3f}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0xa, &(0x7f0000000240)=0x81, 0x4) r4 = accept4$packet(r3, 0x0, &(0x7f0000000180), 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r4, 0xc0109428, &(0x7f0000000200)={0x3, 0x1}) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044001) 02:30:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb5, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dc"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:30:40 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x23e, 0x0) 02:30:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xa3, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c3"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:40 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:30:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x0, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) [ 1722.311681] FAULT_INJECTION: forcing a failure. [ 1722.311681] name failslab, interval 1, probability 0, space 0, times 0 [ 1722.314625] CPU: 1 PID: 9028 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1722.315498] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1722.316538] Call Trace: [ 1722.316876] dump_stack+0x107/0x167 [ 1722.317335] should_fail.cold+0x5/0xa [ 1722.317816] ? create_object.isra.0+0x3a/0xa20 [ 1722.318390] should_failslab+0x5/0x20 [ 1722.318869] kmem_cache_alloc+0x5b/0x310 [ 1722.319391] create_object.isra.0+0x3a/0xa20 [ 1722.319941] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1722.320579] kmem_cache_alloc_trace+0x151/0x320 [ 1722.321176] __iomap_dio_rw+0x1ee/0x1110 [ 1722.321695] ? lock_release+0x680/0x680 [ 1722.322209] ? fsnotify+0x1570/0x1570 [ 1722.322691] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1722.323271] ? down_read_trylock+0x193/0x350 [ 1722.323832] ? ext4_file_read_iter+0x356/0x4c0 [ 1722.324409] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1722.325029] iomap_dio_rw+0x31/0x90 [ 1722.325490] ext4_file_read_iter+0x2c7/0x4c0 [ 1722.326049] ? ext4_release_file+0x380/0x380 [ 1722.326603] io_read+0x2dc/0x11e0 [ 1722.327048] ? kiocb_done+0xc90/0xc90 [ 1722.327534] ? mark_lock+0xf5/0x2df0 [ 1722.328005] ? lock_chain_count+0x20/0x20 [ 1722.328540] ? stack_trace_consume_entry+0x160/0x160 [ 1722.329182] ? lock_acquire+0x197/0x470 [ 1722.329687] ? __lock_acquire+0xbb1/0x5b00 [ 1722.330224] io_issue_sqe+0x2e8a/0x77b0 [ 1722.330732] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1722.331404] ? lock_chain_count+0x20/0x20 [ 1722.331930] ? __is_insn_slot_addr+0x14c/0x290 [ 1722.332508] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1722.333162] ? io_connect+0x610/0x610 [ 1722.333645] ? lock_acquire+0x197/0x470 [ 1722.334144] ? find_held_lock+0x2c/0x110 [ 1722.334660] ? __fget_files+0x2cf/0x520 [ 1722.335158] ? lock_downgrade+0x6d0/0x6d0 [ 1722.335692] __io_queue_sqe+0x90/0x9d0 [ 1722.336180] ? io_issue_sqe+0x77b0/0x77b0 [ 1722.336694] ? __fget_files+0x2f8/0x520 [ 1722.337194] ? io_prep_rw+0x7f5/0x1050 [ 1722.337686] io_submit_sqes+0x44aa/0x8610 [ 1722.338221] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1722.338841] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1722.339459] ? find_held_lock+0x2c/0x110 [ 1722.339970] ? io_submit_sqes+0x8610/0x8610 [ 1722.340516] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1722.341125] ? wait_for_completion_io+0x270/0x270 [ 1722.341729] ? rcu_read_lock_any_held+0x75/0xa0 [ 1722.342311] ? vfs_write+0x354/0xb10 [ 1722.342777] ? fput_many+0x2f/0x1a0 [ 1722.343231] ? ksys_write+0x1a9/0x260 [ 1722.343714] ? __ia32_sys_read+0xb0/0xb0 [ 1722.344222] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1722.344882] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1722.345527] do_syscall_64+0x33/0x40 [ 1722.345993] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1722.346637] RIP: 0033:0x7f67cefd1b19 [ 1722.347100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1722.349414] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1722.350368] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1722.351265] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1722.352167] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1722.353057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1722.353959] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:30:40 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xfffffffe) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xa3, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c3"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:40 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x2bc, 0x0) 02:30:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:30:40 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x30d, 0x0) 02:30:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r4, 0x800000000000202) 02:30:40 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:30:40 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x1000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xaf, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:40 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x35b, 0x0) [ 1722.605260] FAULT_INJECTION: forcing a failure. [ 1722.605260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1722.606669] CPU: 1 PID: 9056 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1722.607478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1722.608444] Call Trace: [ 1722.608757] dump_stack+0x107/0x167 [ 1722.609190] should_fail.cold+0x5/0xa [ 1722.609639] _copy_from_user+0x2e/0x1b0 [ 1722.610109] iovec_from_user+0x141/0x400 [ 1722.610586] __import_iovec+0x67/0x590 [ 1722.611055] io_import_iovec+0x581/0x1120 [ 1722.611557] ? io_complete_rw+0x230/0x230 [ 1722.612040] ? kiocb_done+0x16b/0xc90 [ 1722.612491] io_read+0xe14/0x11e0 [ 1722.612906] ? kiocb_done+0xc90/0xc90 [ 1722.613353] ? mark_lock+0xf5/0x2df0 [ 1722.613791] ? lock_chain_count+0x20/0x20 [ 1722.614286] ? stack_trace_consume_entry+0x160/0x160 [ 1722.614888] ? lock_acquire+0x197/0x470 [ 1722.615360] ? __lock_acquire+0xbb1/0x5b00 [ 1722.615869] io_issue_sqe+0x2e8a/0x77b0 [ 1722.616343] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1722.616956] ? lock_chain_count+0x20/0x20 [ 1722.617443] ? __is_insn_slot_addr+0x14c/0x290 [ 1722.617975] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1722.618588] ? io_connect+0x610/0x610 [ 1722.619036] ? lock_acquire+0x197/0x470 [ 1722.619505] ? find_held_lock+0x2c/0x110 [ 1722.619991] ? __fget_files+0x2cf/0x520 [ 1722.620457] ? lock_downgrade+0x6d0/0x6d0 [ 1722.620945] __io_queue_sqe+0x90/0x9d0 [ 1722.621405] ? io_issue_sqe+0x77b0/0x77b0 [ 1722.621890] ? __fget_files+0x2f8/0x520 [ 1722.622366] ? io_prep_rw+0x7f5/0x1050 [ 1722.622823] io_submit_sqes+0x44aa/0x8610 [ 1722.623324] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1722.623915] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1722.624481] ? find_held_lock+0x2c/0x110 [ 1722.624959] ? io_submit_sqes+0x8610/0x8610 [ 1722.625470] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1722.626035] ? wait_for_completion_io+0x270/0x270 [ 1722.626603] ? rcu_read_lock_any_held+0x75/0xa0 [ 1722.627152] ? vfs_write+0x354/0xb10 [ 1722.627596] ? fput_many+0x2f/0x1a0 [ 1722.628025] ? ksys_write+0x1a9/0x260 [ 1722.628474] ? __ia32_sys_read+0xb0/0xb0 [ 1722.628951] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1722.629566] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1722.630175] do_syscall_64+0x33/0x40 [ 1722.630616] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1722.631216] RIP: 0033:0x7f67cefd1b19 [ 1722.631669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1722.633830] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1722.634722] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1722.635563] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1722.636372] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1722.637186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1722.638001] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:30:40 executing program 2: r0 = fsopen(&(0x7f00000002c0)='securityfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r2 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.parent_freezing\x00', 0x0, 0x0) r3 = fork() kcmp(r2, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 02:30:55 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:30:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r4, 0x800000000000202) 02:30:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000c000200080009007a48d8f5"], 0x1c}}, 0x0) 02:30:55 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x8000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x3a5, 0x0) 02:30:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:30:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xaf, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb5, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dc"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:30:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x3f7, 0x0) [ 1738.050797] FAULT_INJECTION: forcing a failure. [ 1738.050797] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.053552] CPU: 0 PID: 9077 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1738.055109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.056981] Call Trace: [ 1738.057578] dump_stack+0x107/0x167 [ 1738.058400] should_fail.cold+0x5/0xa [ 1738.059256] ? __iomap_dio_rw+0x1ee/0x1110 [ 1738.060229] should_failslab+0x5/0x20 [ 1738.061090] kmem_cache_alloc_trace+0x55/0x320 [ 1738.062119] __iomap_dio_rw+0x1ee/0x1110 [ 1738.063037] ? lock_release+0x680/0x680 [ 1738.063942] ? fsnotify+0x1570/0x1570 [ 1738.064795] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1738.065822] ? down_read_trylock+0x193/0x350 [ 1738.066807] ? ext4_file_read_iter+0x356/0x4c0 [ 1738.067832] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1738.068946] iomap_dio_rw+0x31/0x90 [ 1738.069762] ext4_file_read_iter+0x2c7/0x4c0 [ 1738.070757] ? ext4_release_file+0x380/0x380 [ 1738.071771] io_read+0x2dc/0x11e0 [ 1738.072570] ? kiocb_done+0xc90/0xc90 [ 1738.073441] ? mark_lock+0xf5/0x2df0 [ 1738.074291] ? lock_chain_count+0x20/0x20 [ 1738.075241] ? stack_trace_consume_entry+0x160/0x160 [ 1738.076421] ? lock_acquire+0x197/0x470 [ 1738.077341] ? __lock_acquire+0xbb1/0x5b00 [ 1738.078302] io_issue_sqe+0x2e8a/0x77b0 [ 1738.079216] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1738.080416] ? lock_chain_count+0x20/0x20 [ 1738.081353] ? __is_insn_slot_addr+0x14c/0x290 [ 1738.082391] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1738.083585] ? io_connect+0x610/0x610 [ 1738.084455] ? lock_acquire+0x197/0x470 [ 1738.085362] ? find_held_lock+0x2c/0x110 [ 1738.086287] ? __fget_files+0x2cf/0x520 [ 1738.087198] ? lock_downgrade+0x6d0/0x6d0 [ 1738.088157] __io_queue_sqe+0x90/0x9d0 [ 1738.089041] ? io_issue_sqe+0x77b0/0x77b0 [ 1738.089987] ? __fget_files+0x2f8/0x520 [ 1738.090887] ? io_prep_rw+0x7f5/0x1050 [ 1738.091787] io_submit_sqes+0x44aa/0x8610 [ 1738.092759] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1738.093882] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1738.094973] ? find_held_lock+0x2c/0x110 [ 1738.095898] ? io_submit_sqes+0x8610/0x8610 [ 1738.096894] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1738.098004] ? wait_for_completion_io+0x270/0x270 [ 1738.099108] ? rcu_read_lock_any_held+0x75/0xa0 [ 1738.100176] ? vfs_write+0x354/0xb10 [ 1738.101024] ? fput_many+0x2f/0x1a0 [ 1738.101853] ? ksys_write+0x1a9/0x260 [ 1738.102718] ? __ia32_sys_read+0xb0/0xb0 [ 1738.103647] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1738.104828] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1738.105999] do_syscall_64+0x33/0x40 [ 1738.106851] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1738.108018] RIP: 0033:0x7f67cefd1b19 [ 1738.108851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.113067] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1738.114783] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1738.116400] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1738.118030] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.119672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.121289] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:30:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r5 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000240)="a1ae8fb5c4de3f79ba461cafc93df8e6f89cb9482ccd4c", 0x17}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x101, 0xffff}) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r6, r4, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r2, 0x4c07, 0x0, 0x0, &(0x7f0000000300), 0x8) lseek(r2, 0x4, 0x1) syz_io_uring_setup(0xb9f, &(0x7f0000000080)={0x0, 0xabd7, 0x0, 0x0, 0x36a}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000340)) r8 = creat(&(0x7f0000000640)='./file0\x00', 0x13b) r9 = syz_io_uring_setup(0x67be, &(0x7f0000000380)={0x0, 0x22cc, 0x2, 0x3, 0x249, 0x0, r2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000400), &(0x7f0000000440)=0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r8, 0xc0189378, &(0x7f0000000540)=ANY=[@ANYBLOB="0100000ae47dff9dd4b2ecce080000", @ANYRES32=r9, @ANYRES32=r1, @ANYBLOB="0000003f022f66696c653000"]) syz_io_uring_submit(r7, r10, &(0x7f0000000500)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x80000000) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x10, r9, 0x10000000) 02:30:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xaf, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:30:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x40000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:30:56 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x458, 0x0) 02:30:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r4, 0x800000000000202) 02:31:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb5, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dc"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:31:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb5, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dc"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:31:10 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:31:10 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x8, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd21}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/fib_trie\x00') munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3e4bed71894973fa) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') creat(&(0x7f0000000140)='./file0\x00', 0x120) mlock(&(0x7f0000ffa000/0x6000)=nil, 0x6000) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="090000000000f3002e2f6603968e0b0c"]) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000180)=0x6, 0x7, 0x3) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) fsmount(0xffffffffffffffff, 0x1, 0x71) syz_io_uring_complete(0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x1, &(0x7f0000ffc000/0x1000)=nil, 0x4) 02:31:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x49d, 0x0) 02:31:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:31:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r4, 0x800000000000202) 02:31:10 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x100000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1752.318786] FAULT_INJECTION: forcing a failure. [ 1752.318786] name failslab, interval 1, probability 0, space 0, times 0 [ 1752.321611] CPU: 0 PID: 9125 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1752.323235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1752.325214] Call Trace: [ 1752.325827] dump_stack+0x107/0x167 [ 1752.326669] should_fail.cold+0x5/0xa [ 1752.327554] ? create_object.isra.0+0x3a/0xa20 [ 1752.328612] should_failslab+0x5/0x20 [ 1752.329480] kmem_cache_alloc+0x5b/0x310 [ 1752.330416] create_object.isra.0+0x3a/0xa20 [ 1752.331412] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1752.332598] kmem_cache_alloc_trace+0x151/0x320 [ 1752.333670] __iomap_dio_rw+0x1ee/0x1110 [ 1752.334612] ? lock_release+0x680/0x680 [ 1752.335534] ? fsnotify+0x1570/0x1570 [ 1752.336424] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1752.337486] ? down_read_trylock+0x193/0x350 [ 1752.338487] ? ext4_file_read_iter+0x356/0x4c0 [ 1752.339528] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1752.340661] iomap_dio_rw+0x31/0x90 [ 1752.341500] ext4_file_read_iter+0x2c7/0x4c0 [ 1752.342505] ? ext4_release_file+0x380/0x380 [ 1752.343505] io_read+0x2dc/0x11e0 [ 1752.344320] ? kiocb_done+0xc90/0xc90 [ 1752.345191] ? mark_lock+0xf5/0x2df0 [ 1752.346043] ? lock_chain_count+0x20/0x20 [ 1752.346996] ? stack_trace_consume_entry+0x160/0x160 [ 1752.348171] ? lock_acquire+0x197/0x470 [ 1752.349085] ? __lock_acquire+0xbb1/0x5b00 [ 1752.350054] io_issue_sqe+0x2e8a/0x77b0 [ 1752.350971] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1752.352181] ? lock_chain_count+0x20/0x20 [ 1752.353128] ? __is_insn_slot_addr+0x14c/0x290 [ 1752.354170] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1752.355364] ? io_connect+0x610/0x610 [ 1752.356255] ? lock_acquire+0x197/0x470 [ 1752.357159] ? find_held_lock+0x2c/0x110 [ 1752.358093] ? __fget_files+0x2cf/0x520 [ 1752.358997] ? lock_downgrade+0x6d0/0x6d0 [ 1752.359962] __io_queue_sqe+0x90/0x9d0 [ 1752.360859] ? io_issue_sqe+0x77b0/0x77b0 [ 1752.361803] ? __fget_files+0x2f8/0x520 [ 1752.362722] ? io_prep_rw+0x7f5/0x1050 [ 1752.363617] io_submit_sqes+0x44aa/0x8610 [ 1752.364601] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1752.365741] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1752.366861] ? find_held_lock+0x2c/0x110 [ 1752.367839] ? io_submit_sqes+0x8610/0x8610 [ 1752.368827] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1752.369923] ? wait_for_completion_io+0x270/0x270 [ 1752.371013] ? rcu_read_lock_any_held+0x75/0xa0 [ 1752.372081] ? vfs_write+0x354/0xb10 [ 1752.372923] ? fput_many+0x2f/0x1a0 [ 1752.373748] ? ksys_write+0x1a9/0x260 [ 1752.374649] ? __ia32_sys_read+0xb0/0xb0 [ 1752.375620] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1752.376819] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1752.377998] do_syscall_64+0x33/0x40 [ 1752.378884] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1752.380116] RIP: 0033:0x7f67cefd1b19 [ 1752.380960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1752.385263] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1752.387028] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1752.388696] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1752.390371] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1752.392012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1752.393663] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:31:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r4, 0x800000000000202) 02:31:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x4e7, 0x0) 02:31:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) unshare(0x4a060400) 02:31:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb5, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dc"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:31:10 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x200000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:31:10 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x8, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd21}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/fib_trie\x00') munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3e4bed71894973fa) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') creat(&(0x7f0000000140)='./file0\x00', 0x120) mlock(&(0x7f0000ffa000/0x6000)=nil, 0x6000) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="090000000000f3002e2f6603968e0b0c"]) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000180)=0x6, 0x7, 0x3) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) fsmount(0xffffffffffffffff, 0x1, 0x71) syz_io_uring_complete(0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x1, &(0x7f0000ffc000/0x1000)=nil, 0x4) 02:31:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb8, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a0"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:31:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x548, 0x0) 02:31:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) 02:31:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x5ad, 0x0) 02:31:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x300000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:31:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb8, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a0"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:31:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) 02:31:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb5, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dc"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:31:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x60b, 0x0) 02:31:25 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:31:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) unshare(0x4a060400) 02:31:25 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000000c0)="a3", 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, 0x0) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x5c, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x2}, @NL80211_ATTR_USER_PRIO={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = dup2(r3, r2) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/1020], 0x3fd) 02:31:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) 02:31:25 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000000c0)="a3", 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, 0x0) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x5c, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x2}, @NL80211_ATTR_USER_PRIO={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = dup2(r3, r2) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/1020], 0x3fd) [ 1767.545544] FAULT_INJECTION: forcing a failure. [ 1767.545544] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1767.548064] CPU: 1 PID: 9172 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1767.549508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1767.551249] Call Trace: [ 1767.551809] dump_stack+0x107/0x167 [ 1767.552593] should_fail.cold+0x5/0xa [ 1767.553402] _copy_from_user+0x2e/0x1b0 [ 1767.554244] iovec_from_user+0x141/0x400 [ 1767.555105] __import_iovec+0x67/0x590 [ 1767.555946] io_import_iovec+0x581/0x1120 [ 1767.556830] ? io_complete_rw+0x230/0x230 [ 1767.557715] ? kiocb_done+0x16b/0xc90 [ 1767.558518] io_read+0xe14/0x11e0 [ 1767.559270] ? kiocb_done+0xc90/0xc90 [ 1767.560088] ? mark_lock+0xf5/0x2df0 [ 1767.560885] ? lock_chain_count+0x20/0x20 [ 1767.561776] ? stack_trace_consume_entry+0x160/0x160 [ 1767.562858] ? lock_acquire+0x197/0x470 [ 1767.563696] ? __lock_acquire+0xbb1/0x5b00 [ 1767.564607] io_issue_sqe+0x2e8a/0x77b0 [ 1767.565457] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1767.566568] ? lock_chain_count+0x20/0x20 [ 1767.567445] ? __is_insn_slot_addr+0x14c/0x290 [ 1767.568424] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1767.569527] ? io_connect+0x610/0x610 [ 1767.570337] ? lock_acquire+0x197/0x470 [ 1767.571175] ? find_held_lock+0x2c/0x110 [ 1767.572046] ? __fget_files+0x2cf/0x520 [ 1767.572892] ? lock_downgrade+0x6d0/0x6d0 [ 1767.573778] __io_queue_sqe+0x90/0x9d0 [ 1767.574606] ? io_issue_sqe+0x77b0/0x77b0 [ 1767.575496] ? __fget_files+0x2f8/0x520 [ 1767.576347] ? io_prep_rw+0x7f5/0x1050 [ 1767.577175] io_submit_sqes+0x44aa/0x8610 [ 1767.578077] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1767.579127] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1767.580160] ? find_held_lock+0x2c/0x110 [ 1767.581031] ? io_submit_sqes+0x8610/0x8610 [ 1767.581944] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1767.582964] ? wait_for_completion_io+0x270/0x270 [ 1767.583990] ? rcu_read_lock_any_held+0x75/0xa0 [ 1767.584976] ? vfs_write+0x354/0xb10 [ 1767.585762] ? fput_many+0x2f/0x1a0 [ 1767.586531] ? ksys_write+0x1a9/0x260 [ 1767.587346] ? __ia32_sys_read+0xb0/0xb0 [ 1767.588221] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1767.589331] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1767.590420] do_syscall_64+0x33/0x40 [ 1767.591217] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1767.592313] RIP: 0033:0x7f67cefd1b19 [ 1767.593102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1767.596992] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1767.598595] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1767.600105] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1767.601609] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1767.603124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1767.604640] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:31:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x659, 0x0) 02:31:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb8, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a0"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:31:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x400000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:31:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x0) 02:31:25 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000000c0)="a3", 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, 0x0) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x5c, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x2}, @NL80211_ATTR_USER_PRIO={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = dup2(r3, r2) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/1020], 0x3fd) 02:31:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) unshare(0x4a060400) 02:31:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb8, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a0"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:31:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x0, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:31:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x6a5, 0x0) 02:31:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb8, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a0"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:31:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x500000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:31:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x0) 02:31:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb8, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a0"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:31:38 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000000c0)="a3", 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, 0x0) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x5c, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x2}, @NL80211_ATTR_USER_PRIO={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = dup2(r3, r2) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/1020], 0x3fd) 02:31:38 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 1780.364670] FAULT_INJECTION: forcing a failure. [ 1780.364670] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.366367] CPU: 0 PID: 9205 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1780.367231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1780.368303] Call Trace: [ 1780.368648] dump_stack+0x107/0x167 [ 1780.369126] should_fail.cold+0x5/0xa [ 1780.369618] ? __iomap_dio_rw+0x1ee/0x1110 [ 1780.370163] should_failslab+0x5/0x20 [ 1780.370655] kmem_cache_alloc_trace+0x55/0x320 [ 1780.371246] __iomap_dio_rw+0x1ee/0x1110 [ 1780.371774] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1780.372373] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1780.373071] ? trace_hardirqs_on+0x5b/0x180 [ 1780.373628] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1780.374330] ? ext4_inode_journal_mode+0x1c0/0x4f0 [ 1780.374969] iomap_dio_rw+0x31/0x90 [ 1780.375441] ext4_file_read_iter+0x2c7/0x4c0 [ 1780.376029] ? ext4_release_file+0x380/0x380 [ 1780.376596] io_read+0x2dc/0x11e0 [ 1780.377060] ? kiocb_done+0xc90/0xc90 [ 1780.377555] ? mark_lock+0xf5/0x2df0 [ 1780.378041] ? lock_chain_count+0x20/0x20 [ 1780.378577] ? stack_trace_consume_entry+0x160/0x160 [ 1780.379220] ? lock_acquire+0x197/0x470 [ 1780.379736] ? __lock_acquire+0xbb1/0x5b00 [ 1780.380288] io_issue_sqe+0x2e8a/0x77b0 [ 1780.380778] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1780.381451] ? lock_chain_count+0x20/0x20 [ 1780.381986] ? __is_insn_slot_addr+0x14c/0x290 [ 1780.382569] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1780.383242] ? io_connect+0x610/0x610 [ 1780.383733] ? lock_acquire+0x197/0x470 [ 1780.384260] ? find_held_lock+0x2c/0x110 [ 1780.384794] ? __fget_files+0x2cf/0x520 [ 1780.385308] ? lock_downgrade+0x6d0/0x6d0 [ 1780.385838] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1780.386533] __io_queue_sqe+0x90/0x9d0 [ 1780.387036] ? io_issue_sqe+0x77b0/0x77b0 [ 1780.387564] ? __fget_files+0x2f8/0x520 [ 1780.388088] ? io_prep_rw+0x7f5/0x1050 [ 1780.388592] io_submit_sqes+0x44aa/0x8610 [ 1780.389151] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1780.389790] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1780.390423] ? find_held_lock+0x2c/0x110 [ 1780.390965] ? io_submit_sqes+0x8610/0x8610 [ 1780.391533] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1780.392156] ? wait_for_completion_io+0x270/0x270 [ 1780.392774] ? rcu_read_lock_any_held+0x75/0xa0 [ 1780.393363] ? vfs_write+0x354/0xb10 [ 1780.393838] ? fput_many+0x2f/0x1a0 [ 1780.394314] ? ksys_write+0x1a9/0x260 [ 1780.394800] ? __ia32_sys_read+0xb0/0xb0 [ 1780.395330] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1780.396027] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1780.396708] do_syscall_64+0x33/0x40 [ 1780.397201] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1780.397855] RIP: 0033:0x7f67cefd1b19 [ 1780.398335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.400761] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1780.401727] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1780.402635] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1780.403512] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.404433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.405354] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:31:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x707, 0x0) 02:31:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x600000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:31:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb9, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:31:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x0, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:31:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb9, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:31:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x0) 02:31:38 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000000c0)="a3", 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, 0x0) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x5c, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x2}, @NL80211_ATTR_USER_PRIO={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = dup2(r3, r2) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/1020], 0x3fd) 02:31:53 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x700000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:31:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x7070000, 0x0) 02:31:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x0, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) unshare(0x4a060400) 02:31:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) (fail_nth: 1) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:31:53 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:31:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb9, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:31:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) 02:31:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb9, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1795.653459] FAULT_INJECTION: forcing a failure. [ 1795.653459] name failslab, interval 1, probability 0, space 0, times 0 [ 1795.655906] CPU: 1 PID: 9252 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1795.657340] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1795.659112] Call Trace: [ 1795.659666] dump_stack+0x107/0x167 [ 1795.660449] should_fail.cold+0x5/0xa [ 1795.661245] ? __alloc_file+0x21/0x320 [ 1795.662080] should_failslab+0x5/0x20 [ 1795.662174] FAULT_INJECTION: forcing a failure. [ 1795.662174] name failslab, interval 1, probability 0, space 0, times 0 [ 1795.662875] kmem_cache_alloc+0x5b/0x310 [ 1795.662898] __alloc_file+0x21/0x320 [ 1795.662924] alloc_empty_file+0x6d/0x170 [ 1795.667083] dentry_open+0x4c/0x190 [ 1795.667865] ptm_open_peer+0x1af/0x290 [ 1795.668703] ? pty_unix98_compat_ioctl+0x50/0x50 [ 1795.669708] ? find_held_lock+0x2c/0x110 [ 1795.670567] tty_ioctl+0xdec/0x18b0 [ 1795.671337] ? tty_fasync+0x390/0x390 [ 1795.672155] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1795.673379] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1795.674469] ? do_vfs_ioctl+0x283/0x10d0 [ 1795.675329] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1795.676448] ? generic_block_fiemap+0x60/0x60 [ 1795.677395] ? lock_downgrade+0x6d0/0x6d0 [ 1795.678295] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1795.679307] ? wait_for_completion_io+0x270/0x270 [ 1795.680345] ? selinux_file_ioctl+0xb6/0x270 [ 1795.681271] ? tty_fasync+0x390/0x390 [ 1795.682070] __x64_sys_ioctl+0x19a/0x210 [ 1795.682936] do_syscall_64+0x33/0x40 [ 1795.683719] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1795.684803] RIP: 0033:0x7fa96e0c9b19 [ 1795.685589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1795.689509] RSP: 002b:00007fa96b63f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1795.691126] RAX: ffffffffffffffda RBX: 00007fa96e1dcf60 RCX: 00007fa96e0c9b19 [ 1795.692637] RDX: 0000000000000004 RSI: 0000000000005441 RDI: 0000000000000004 [ 1795.694146] RBP: 00007fa96b63f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1795.695647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1795.697157] R13: 00007fff1e33c42f R14: 00007fa96b63f300 R15: 0000000000022000 [ 1795.698681] CPU: 0 PID: 9246 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1795.699739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1795.700976] Call Trace: [ 1795.701371] dump_stack+0x107/0x167 [ 1795.701908] should_fail.cold+0x5/0xa [ 1795.702490] ? create_object.isra.0+0x3a/0xa20 [ 1795.703160] should_failslab+0x5/0x20 [ 1795.703719] kmem_cache_alloc+0x5b/0x310 [ 1795.704348] create_object.isra.0+0x3a/0xa20 [ 1795.704994] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1795.705751] kmem_cache_alloc_trace+0x151/0x320 [ 1795.706442] __iomap_dio_rw+0x1ee/0x1110 [ 1795.707049] ? lock_release+0x680/0x680 [ 1795.707661] ? fsnotify+0x1570/0x1570 [ 1795.708231] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1795.708920] ? down_read_trylock+0x193/0x350 [ 1795.709565] ? ext4_file_read_iter+0x356/0x4c0 [ 1795.710244] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1795.710970] iomap_dio_rw+0x31/0x90 [ 1795.711510] ext4_file_read_iter+0x2c7/0x4c0 [ 1795.712156] ? ext4_release_file+0x380/0x380 [ 1795.712806] io_read+0x2dc/0x11e0 [ 1795.713324] ? kiocb_done+0xc90/0xc90 [ 1795.713883] ? mark_lock+0xf5/0x2df0 [ 1795.714441] ? lock_chain_count+0x20/0x20 [ 1795.715059] ? stack_trace_consume_entry+0x160/0x160 [ 1795.715823] ? lock_acquire+0x197/0x470 [ 1795.716424] ? __lock_acquire+0xbb1/0x5b00 [ 1795.717077] io_issue_sqe+0x2e8a/0x77b0 [ 1795.717677] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1795.718452] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1795.719257] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1795.720046] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1795.720847] ? io_connect+0x610/0x610 [ 1795.721407] ? lock_acquire+0x197/0x470 [ 1795.721995] ? find_held_lock+0x2c/0x110 [ 1795.722618] ? __fget_files+0x2cf/0x520 [ 1795.723215] ? lock_downgrade+0x6d0/0x6d0 [ 1795.723835] __io_queue_sqe+0x90/0x9d0 [ 1795.724424] ? io_issue_sqe+0x77b0/0x77b0 [ 1795.725037] ? __fget_files+0x2f8/0x520 [ 1795.725618] ? io_prep_rw+0x7f5/0x1050 [ 1795.726202] io_submit_sqes+0x44aa/0x8610 [ 1795.726830] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1795.727555] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1795.728258] ? find_held_lock+0x2c/0x110 [ 1795.728856] ? io_submit_sqes+0x8610/0x8610 [ 1795.729495] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1795.730209] ? wait_for_completion_io+0x270/0x270 [ 1795.730910] ? rcu_read_lock_any_held+0x75/0xa0 [ 1795.731589] ? vfs_write+0x354/0xb10 [ 1795.732139] ? fput_many+0x2f/0x1a0 [ 1795.732676] ? ksys_write+0x1a9/0x260 [ 1795.733236] ? __ia32_sys_read+0xb0/0xb0 [ 1795.733838] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1795.734612] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1795.735373] do_syscall_64+0x33/0x40 [ 1795.735922] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1795.736704] RIP: 0033:0x7f67cefd1b19 [ 1795.737260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1795.739959] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1795.741077] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1795.742134] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1795.743195] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1795.744235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1795.745280] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:31:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xb060000, 0x0) 02:31:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb9, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:31:53 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(0x0, 0x0, 0x2001) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f00000004c0)={{r2}, "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"}) r3 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414f1, {0x2, 0x0, @broadcast}}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x602, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, 0x800, 0x0, {0x0, r4}}, 0xfffffe93) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x4e21, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) readv(0xffffffffffffffff, &(0x7f0000003700)=[{&(0x7f0000000200)=""/214, 0xd6}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f00000014c0)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}], 0x4) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="000000000000aba3e7ef75041c3162857b120cf34dbabe15760500f1010502020085c4232c386a9b64088db3c32c46fa42c039bd"]) 02:31:53 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x1000000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:31:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:32:08 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:32:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001080)=[{{&(0x7f0000000a80)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000b40)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}], 0x2, 0x20000000) 02:32:08 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x1800000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:32:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) (fail_nth: 2) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:32:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xd030000, 0x0) 02:32:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:32:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xb9, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:32:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1}) unshare(0x4a060400) [ 1810.921641] FAULT_INJECTION: forcing a failure. [ 1810.921641] name failslab, interval 1, probability 0, space 0, times 0 [ 1810.924594] CPU: 0 PID: 9286 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1810.926134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1810.928015] Call Trace: [ 1810.928630] dump_stack+0x107/0x167 [ 1810.929458] should_fail.cold+0x5/0xa [ 1810.930321] ? create_object.isra.0+0x3a/0xa20 [ 1810.931357] should_failslab+0x5/0x20 [ 1810.932216] kmem_cache_alloc+0x5b/0x310 [ 1810.933147] create_object.isra.0+0x3a/0xa20 [ 1810.934140] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1810.935294] kmem_cache_alloc+0x159/0x310 [ 1810.936230] __alloc_file+0x21/0x320 [ 1810.937079] alloc_empty_file+0x6d/0x170 [ 1810.937995] dentry_open+0x4c/0x190 [ 1810.938824] ptm_open_peer+0x1af/0x290 [ 1810.939706] ? pty_unix98_compat_ioctl+0x50/0x50 [ 1810.940797] ? find_held_lock+0x2c/0x110 [ 1810.941713] tty_ioctl+0xdec/0x18b0 [ 1810.942533] ? tty_fasync+0x390/0x390 [ 1810.943398] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1810.944721] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1810.945879] ? do_vfs_ioctl+0x283/0x10d0 [ 1810.946817] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1810.948007] ? generic_block_fiemap+0x60/0x60 [ 1810.949024] ? lock_downgrade+0x6d0/0x6d0 [ 1810.949962] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1810.951048] ? wait_for_completion_io+0x270/0x270 [ 1810.952146] ? selinux_file_ioctl+0xb6/0x270 [ 1810.953156] ? tty_fasync+0x390/0x390 [ 1810.954021] __x64_sys_ioctl+0x19a/0x210 [ 1810.954945] do_syscall_64+0x33/0x40 [ 1810.955057] FAULT_INJECTION: forcing a failure. [ 1810.955057] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1810.955788] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1810.955801] RIP: 0033:0x7fa96e0c9b19 [ 1810.955825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1810.964350] RSP: 002b:00007fa96b63f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1810.966069] RAX: ffffffffffffffda RBX: 00007fa96e1dcf60 RCX: 00007fa96e0c9b19 [ 1810.967677] RDX: 0000000000000004 RSI: 0000000000005441 RDI: 0000000000000004 [ 1810.969284] RBP: 00007fa96b63f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1810.970890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1810.972510] R13: 00007fff1e33c42f R14: 00007fa96b63f300 R15: 0000000000022000 [ 1810.974147] CPU: 1 PID: 9289 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1810.975594] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1810.977351] Call Trace: [ 1810.977902] dump_stack+0x107/0x167 [ 1810.978680] should_fail.cold+0x5/0xa [ 1810.979483] _copy_from_user+0x2e/0x1b0 [ 1810.980324] iovec_from_user+0x141/0x400 [ 1810.981193] __import_iovec+0x67/0x590 [ 1810.982024] io_import_iovec+0x581/0x1120 [ 1810.982901] ? io_complete_rw+0x230/0x230 [ 1810.983776] ? kiocb_done+0x16b/0xc90 [ 1810.984589] io_read+0xe14/0x11e0 [ 1810.985327] ? __is_insn_slot_addr+0x14c/0x290 [ 1810.986291] ? kiocb_done+0xc90/0xc90 [ 1810.987099] ? mark_lock+0xf5/0x2df0 [ 1810.987892] ? register_lock_class+0xbb/0x17b0 [ 1810.988862] ? arch_stack_walk+0x99/0xf0 [ 1810.989715] ? lock_chain_count+0x20/0x20 [ 1810.990592] ? mark_held_locks+0x9e/0xe0 [ 1810.991462] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1810.992573] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1810.993714] ? trace_hardirqs_on+0x5b/0x180 [ 1810.994626] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1810.995787] ? __lock_acquire+0xbb1/0x5b00 [ 1810.996695] io_issue_sqe+0x2e8a/0x77b0 [ 1810.997544] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1810.998647] ? lock_chain_count+0x20/0x20 [ 1810.999526] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1811.000634] ? io_connect+0x610/0x610 [ 1811.001442] ? lock_acquire+0x197/0x470 [ 1811.002291] ? find_held_lock+0x2c/0x110 [ 1811.003153] ? __fget_files+0x2cf/0x520 [ 1811.003998] ? lock_downgrade+0x6d0/0x6d0 [ 1811.004886] __io_queue_sqe+0x90/0x9d0 [ 1811.005710] ? io_issue_sqe+0x77b0/0x77b0 [ 1811.006581] ? __fget_files+0x2f8/0x520 [ 1811.007430] ? io_prep_rw+0x7f5/0x1050 [ 1811.008262] io_submit_sqes+0x44aa/0x8610 [ 1811.009363] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1811.010450] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1811.011491] ? find_held_lock+0x2c/0x110 [ 1811.012380] ? io_submit_sqes+0x8610/0x8610 [ 1811.013337] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1811.014376] ? wait_for_completion_io+0x270/0x270 [ 1811.015405] ? rcu_read_lock_any_held+0x75/0xa0 [ 1811.016425] ? vfs_write+0x354/0xb10 [ 1811.017234] ? fput_many+0x2f/0x1a0 [ 1811.018015] ? ksys_write+0x1a9/0x260 [ 1811.018845] ? __ia32_sys_read+0xb0/0xb0 [ 1811.019722] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1811.020848] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1811.021954] do_syscall_64+0x33/0x40 [ 1811.022839] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1811.024182] RIP: 0033:0x7f67cefd1b19 [ 1811.025173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1811.029187] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1811.030816] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1811.032352] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1811.033891] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1811.035448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1811.037002] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:32:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x39000000, 0x0) 02:32:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, r0, 0x10000000) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x13, r1, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000080)=""/84, 0x54}], 0x1) 02:32:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:32:09 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x3e00000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:32:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x3e020000, 0x0) 02:32:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) (fail_nth: 3) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) [ 1811.277504] FAULT_INJECTION: forcing a failure. [ 1811.277504] name failslab, interval 1, probability 0, space 0, times 0 [ 1811.280275] CPU: 1 PID: 9305 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1811.281757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1811.283525] Call Trace: [ 1811.284091] dump_stack+0x107/0x167 [ 1811.284888] should_fail.cold+0x5/0xa [ 1811.285713] ? security_file_alloc+0x34/0x170 [ 1811.286686] should_failslab+0x5/0x20 [ 1811.287504] kmem_cache_alloc+0x5b/0x310 [ 1811.288380] security_file_alloc+0x34/0x170 [ 1811.289311] __alloc_file+0xb7/0x320 [ 1811.290116] alloc_empty_file+0x6d/0x170 [ 1811.290995] dentry_open+0x4c/0x190 [ 1811.291776] ptm_open_peer+0x1af/0x290 [ 1811.292693] ? pty_unix98_compat_ioctl+0x50/0x50 [ 1811.294003] ? find_held_lock+0x2c/0x110 [ 1811.295103] tty_ioctl+0xdec/0x18b0 [ 1811.296039] ? tty_fasync+0x390/0x390 [ 1811.297023] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1811.298453] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1811.299547] ? do_vfs_ioctl+0x283/0x10d0 [ 1811.300416] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1811.301550] ? generic_block_fiemap+0x60/0x60 [ 1811.302529] ? lock_downgrade+0x6d0/0x6d0 [ 1811.303411] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1811.304444] ? wait_for_completion_io+0x270/0x270 [ 1811.305502] ? selinux_file_ioctl+0xb6/0x270 [ 1811.306460] ? tty_fasync+0x390/0x390 [ 1811.307276] __x64_sys_ioctl+0x19a/0x210 [ 1811.308133] do_syscall_64+0x33/0x40 [ 1811.308951] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1811.310038] RIP: 0033:0x7fa96e0c9b19 [ 1811.310841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1811.314771] RSP: 002b:00007fa96b63f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1811.316399] RAX: ffffffffffffffda RBX: 00007fa96e1dcf60 RCX: 00007fa96e0c9b19 [ 1811.317912] RDX: 0000000000000004 RSI: 0000000000005441 RDI: 0000000000000004 [ 1811.319436] RBP: 00007fa96b63f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1811.320951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1811.322489] R13: 00007fff1e33c42f R14: 00007fa96b63f300 R15: 0000000000022000 02:32:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r3, 0x800000000000202) 02:32:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1}) unshare(0x4a060400) 02:32:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x48050000, 0x0) 02:32:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) (fail_nth: 4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:32:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) ioprio_set$pid(0x2, r1, 0x4000) r2 = getpgrp(r1) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000080)={0xffffffffffffffff, r0, 0xfffffffa}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="03d17c610000002a0c00002e2f66696c65300089d4d881db032f5aeeac687fb94d0282542b4325535f00466c2db334cb"]) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x81, 0x0, 0x53, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x7}, 0x80, 0x5, 0x5, 0x5, 0x6, 0x0, 0x5, 0x0, 0x100, 0x0, 0x8039}, r1, 0xe, r3, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) 02:32:24 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x3f00000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:32:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r3, 0x800000000000202) 02:32:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:32:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1}) unshare(0x4a060400) 02:32:24 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:32:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x4b010000, 0x0) [ 1827.099809] FAULT_INJECTION: forcing a failure. [ 1827.099809] name failslab, interval 1, probability 0, space 0, times 0 [ 1827.103171] CPU: 0 PID: 9322 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1827.104863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1827.106926] Call Trace: [ 1827.107582] dump_stack+0x107/0x167 [ 1827.108480] should_fail.cold+0x5/0xa [ 1827.109421] ? create_object.isra.0+0x3a/0xa20 [ 1827.110563] should_failslab+0x5/0x20 [ 1827.111506] kmem_cache_alloc+0x5b/0x310 [ 1827.112505] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1827.113871] create_object.isra.0+0x3a/0xa20 [ 1827.114952] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1827.116211] kmem_cache_alloc+0x159/0x310 [ 1827.117241] security_file_alloc+0x34/0x170 [ 1827.118306] __alloc_file+0xb7/0x320 [ 1827.119214] alloc_empty_file+0x6d/0x170 [ 1827.120215] dentry_open+0x4c/0x190 [ 1827.121130] ptm_open_peer+0x1af/0x290 [ 1827.122089] ? pty_unix98_compat_ioctl+0x50/0x50 [ 1827.123248] ? find_held_lock+0x2c/0x110 [ 1827.124243] tty_ioctl+0xdec/0x18b0 [ 1827.125148] ? tty_fasync+0x390/0x390 [ 1827.126091] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1827.127505] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1827.128036] FAULT_INJECTION: forcing a failure. [ 1827.128036] name failslab, interval 1, probability 0, space 0, times 0 [ 1827.128768] ? do_vfs_ioctl+0x283/0x10d0 [ 1827.131028] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1827.132299] ? generic_block_fiemap+0x60/0x60 [ 1827.133401] ? lock_downgrade+0x6d0/0x6d0 [ 1827.134415] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1827.135594] ? wait_for_completion_io+0x270/0x270 [ 1827.136791] ? selinux_file_ioctl+0xb6/0x270 [ 1827.137871] ? tty_fasync+0x390/0x390 [ 1827.138805] __x64_sys_ioctl+0x19a/0x210 [ 1827.139802] do_syscall_64+0x33/0x40 [ 1827.140722] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1827.141976] RIP: 0033:0x7fa96e0c9b19 [ 1827.142893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1827.147417] RSP: 002b:00007fa96b63f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1827.149288] RAX: ffffffffffffffda RBX: 00007fa96e1dcf60 RCX: 00007fa96e0c9b19 [ 1827.151037] RDX: 0000000000000004 RSI: 0000000000005441 RDI: 0000000000000004 [ 1827.152804] RBP: 00007fa96b63f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1827.154551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1827.156311] R13: 00007fff1e33c42f R14: 00007fa96b63f300 R15: 0000000000022000 [ 1827.158090] CPU: 1 PID: 9335 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1827.158926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1827.159901] Call Trace: [ 1827.160232] dump_stack+0x107/0x167 [ 1827.160677] should_fail.cold+0x5/0xa [ 1827.161160] ? create_object.isra.0+0x3a/0xa20 [ 1827.161716] should_failslab+0x5/0x20 [ 1827.162166] kmem_cache_alloc+0x5b/0x310 [ 1827.162646] create_object.isra.0+0x3a/0xa20 [ 1827.163163] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1827.163757] kmem_cache_alloc_trace+0x151/0x320 [ 1827.164313] __iomap_dio_rw+0x1ee/0x1110 [ 1827.164938] ? lock_release+0x680/0x680 [ 1827.165550] ? fsnotify+0x1570/0x1570 [ 1827.166073] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1827.166725] ? down_read_trylock+0x193/0x350 [ 1827.167392] ? ext4_file_read_iter+0x356/0x4c0 [ 1827.168104] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1827.168905] iomap_dio_rw+0x31/0x90 [ 1827.169397] ext4_file_read_iter+0x2c7/0x4c0 [ 1827.169985] ? ext4_release_file+0x380/0x380 [ 1827.170506] io_read+0x2dc/0x11e0 [ 1827.171062] ? __is_insn_slot_addr+0x14c/0x290 [ 1827.171762] ? kiocb_done+0xc90/0xc90 [ 1827.172350] ? mark_lock+0xf5/0x2df0 [ 1827.172793] ? register_lock_class+0xbb/0x17b0 [ 1827.173332] ? arch_stack_walk+0x99/0xf0 [ 1827.173809] ? lock_chain_count+0x20/0x20 [ 1827.174299] ? is_dynamic_key+0x1e0/0x1e0 [ 1827.174790] ? __lock_acquire+0x1657/0x5b00 [ 1827.175303] ? __lock_acquire+0xbb1/0x5b00 [ 1827.175801] io_issue_sqe+0x2e8a/0x77b0 [ 1827.176279] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1827.176906] ? lock_chain_count+0x20/0x20 [ 1827.177395] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1827.178010] ? io_connect+0x610/0x610 [ 1827.178451] ? lock_acquire+0x197/0x470 [ 1827.178918] ? find_held_lock+0x2c/0x110 [ 1827.179402] ? __fget_files+0x2cf/0x520 [ 1827.179867] ? lock_downgrade+0x6d0/0x6d0 [ 1827.180378] __io_queue_sqe+0x90/0x9d0 [ 1827.180859] ? io_issue_sqe+0x77b0/0x77b0 [ 1827.181359] ? __fget_files+0x2f8/0x520 [ 1827.181817] ? io_prep_rw+0x7f5/0x1050 [ 1827.182298] io_submit_sqes+0x44aa/0x8610 [ 1827.182801] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1827.183388] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1827.183941] ? find_held_lock+0x2c/0x110 [ 1827.184424] ? io_submit_sqes+0x8610/0x8610 [ 1827.184949] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1827.185516] ? wait_for_completion_io+0x270/0x270 [ 1827.186105] ? rcu_read_lock_any_held+0x75/0xa0 [ 1827.186648] ? vfs_write+0x354/0xb10 [ 1827.187097] ? fput_many+0x2f/0x1a0 [ 1827.187533] ? ksys_write+0x1a9/0x260 [ 1827.187985] ? __ia32_sys_read+0xb0/0xb0 [ 1827.188473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1827.189125] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1827.189755] do_syscall_64+0x33/0x40 [ 1827.190193] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1827.190793] RIP: 0033:0x7f67cefd1b19 [ 1827.191232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1827.193454] RSP: 002b:00007f67cc526188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1827.194348] RAX: ffffffffffffffda RBX: 00007f67cf0e5020 RCX: 00007f67cefd1b19 [ 1827.195187] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1827.196029] RBP: 00007f67cc5261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1827.196871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1827.197713] R13: 00007ffe172b891f R14: 00007f67cc526300 R15: 0000000000022000 02:32:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x4800000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:32:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:32:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) (fail_nth: 5) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:32:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r3, 0x800000000000202) [ 1827.343158] FAULT_INJECTION: forcing a failure. [ 1827.343158] name failslab, interval 1, probability 0, space 0, times 0 [ 1827.344590] CPU: 1 PID: 9350 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1827.345421] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1827.346421] Call Trace: [ 1827.346743] dump_stack+0x107/0x167 [ 1827.347188] should_fail.cold+0x5/0xa [ 1827.347649] ? tty_open+0x13f/0x13e0 [ 1827.348103] should_failslab+0x5/0x20 [ 1827.348563] kmem_cache_alloc_trace+0x55/0x320 [ 1827.349121] ? lock_acquire+0x197/0x470 [ 1827.349601] tty_open+0x13f/0x13e0 [ 1827.350015] ? tty_init_dev+0x80/0x80 [ 1827.350471] ? rwlock_bug.part.0+0x90/0x90 [ 1827.350958] ? tty_init_dev+0x80/0x80 [ 1827.351417] chrdev_open+0x268/0x6e0 [ 1827.351865] ? __unregister_chrdev+0x110/0x110 [ 1827.352416] ? fsnotify_perm.part.0+0x22d/0x620 [ 1827.352988] do_dentry_open+0x4b7/0x1090 [ 1827.353480] ? __unregister_chrdev+0x110/0x110 [ 1827.354033] dentry_open+0x10a/0x190 [ 1827.354485] ptm_open_peer+0x1af/0x290 [ 1827.354957] ? pty_unix98_compat_ioctl+0x50/0x50 [ 1827.355528] ? find_held_lock+0x2c/0x110 [ 1827.356020] tty_ioctl+0xdec/0x18b0 [ 1827.356458] ? tty_fasync+0x390/0x390 [ 1827.356925] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1827.357618] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1827.358209] ? do_vfs_ioctl+0x283/0x10d0 [ 1827.358697] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1827.359300] ? generic_block_fiemap+0x60/0x60 [ 1827.359840] ? lock_downgrade+0x6d0/0x6d0 [ 1827.360316] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1827.360903] ? wait_for_completion_io+0x270/0x270 [ 1827.361486] ? selinux_file_ioctl+0xb6/0x270 [ 1827.362018] ? tty_fasync+0x390/0x390 [ 1827.362475] __x64_sys_ioctl+0x19a/0x210 [ 1827.362968] do_syscall_64+0x33/0x40 [ 1827.363414] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1827.364031] RIP: 0033:0x7fa96e0c9b19 [ 1827.364478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1827.366690] RSP: 002b:00007fa96b63f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1827.367573] RAX: ffffffffffffffda RBX: 00007fa96e1dcf60 RCX: 00007fa96e0c9b19 [ 1827.368436] RDX: 0000000000000004 RSI: 0000000000005441 RDI: 0000000000000004 [ 1827.369302] RBP: 00007fa96b63f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1827.370163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1827.370977] R13: 00007fff1e33c42f R14: 00007fa96b63f300 R15: 0000000000022000 02:32:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x58040000, 0x0) 02:32:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:32:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x4c00000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:32:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) unshare(0x4a060400) 02:32:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r3, 0x800000000000202) 02:32:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) (fail_nth: 6) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:32:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x6800000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1827.600295] FAULT_INJECTION: forcing a failure. [ 1827.600295] name failslab, interval 1, probability 0, space 0, times 0 [ 1827.601739] CPU: 1 PID: 9365 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1827.602584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1827.603612] Call Trace: [ 1827.603923] dump_stack+0x107/0x167 [ 1827.604361] should_fail.cold+0x5/0xa [ 1827.604808] ? create_object.isra.0+0x3a/0xa20 [ 1827.605384] should_failslab+0x5/0x20 [ 1827.605841] kmem_cache_alloc+0x5b/0x310 [ 1827.606335] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1827.606974] create_object.isra.0+0x3a/0xa20 [ 1827.607508] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1827.608123] kmem_cache_alloc_trace+0x151/0x320 [ 1827.608704] tty_open+0x13f/0x13e0 [ 1827.609142] ? tty_init_dev+0x80/0x80 [ 1827.609599] ? tty_init_dev+0x80/0x80 [ 1827.610085] ? tty_init_dev+0x80/0x80 [ 1827.610550] chrdev_open+0x268/0x6e0 [ 1827.611005] ? __unregister_chrdev+0x110/0x110 [ 1827.611548] ? fsnotify_perm.part.0+0x22d/0x620 [ 1827.612119] do_dentry_open+0x4b7/0x1090 [ 1827.612606] ? __unregister_chrdev+0x110/0x110 [ 1827.613179] dentry_open+0x10a/0x190 [ 1827.613623] ptm_open_peer+0x1af/0x290 [ 1827.614105] ? pty_unix98_compat_ioctl+0x50/0x50 [ 1827.614678] ? find_held_lock+0x2c/0x110 [ 1827.615166] tty_ioctl+0xdec/0x18b0 [ 1827.615605] ? tty_fasync+0x390/0x390 [ 1827.616062] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1827.616746] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1827.617400] ? do_vfs_ioctl+0x283/0x10d0 [ 1827.617889] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1827.618533] ? generic_block_fiemap+0x60/0x60 [ 1827.619076] ? lock_downgrade+0x6d0/0x6d0 [ 1827.619561] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1827.620170] ? wait_for_completion_io+0x270/0x270 [ 1827.620739] ? selinux_file_ioctl+0xb6/0x270 [ 1827.621265] ? tty_fasync+0x390/0x390 [ 1827.621716] __x64_sys_ioctl+0x19a/0x210 [ 1827.622208] do_syscall_64+0x33/0x40 [ 1827.622636] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1827.623237] RIP: 0033:0x7fa96e0c9b19 [ 1827.623677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1827.625848] RSP: 002b:00007fa96b63f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1827.626754] RAX: ffffffffffffffda RBX: 00007fa96e1dcf60 RCX: 00007fa96e0c9b19 [ 1827.627595] RDX: 0000000000000004 RSI: 0000000000005441 RDI: 0000000000000004 [ 1827.628442] RBP: 00007fa96b63f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1827.629306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1827.630128] R13: 00007fff1e33c42f R14: 00007fa96b63f300 R15: 0000000000022000 02:32:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x59060000, 0x0) 02:32:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10010, r4, 0x800000000000202) unshare(0x4a060400) 02:32:38 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:32:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) unshare(0x4a060400) 02:32:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) (fail_nth: 7) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:32:38 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_setup(0x130c, &(0x7f00000003c0)={0x0, 0x0, 0x20, 0x3, 0x37e}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, &(0x7f0000000500)) syz_io_uring_submit(r1, r2, &(0x7f0000000600)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000005c0)=[{0x0, 0x49}], 0x1}, 0x0, 0x4084}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x80010, r0, 0x10000000) syz_io_uring_submit(r1, r7, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x4, 0x4000, @fd=r4, 0x8, &(0x7f00000006c0)="649e5364181c696b8ad9f1d8a46432b665ebf1926736484ef8d9b918377c62103be99bdf7b8de6951c1026e37c82500b8901327a71aa139e376c859ad662a72935141bce35bc1485d684edfae86f7d759978f106a18229f5226bd99f7dc85f5334ec19080762ac90e4aa1b75b54c3a37b06ed4bce1a4eebf916d16c3a8602fdd124149e8f4857a8be3d3", 0x8a, 0x1, 0x0, {0x0, r6}}, 0x1) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) sendmmsg$inet(r4, &(0x7f00000032c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000780)="b7ce1fe74c3fe0c42b492c25cdf825e2bbed6b5e84903ea96abc7bd14fbaf32f6b0194b757b2f140425af22d30ff03c20401acd2075e10902ed52f63018922f490bf91c9cb5badbb06a404b917a69bd534649c8c4dce7ed8a01e0a70795e35d89e2be0ff784f6a6f8287278949c477f087b867d78f844e29f96cac0e2d99ca0db334cec784fbbdfa64452112af7b282493b41c097008a677ca0ef7d12e8f85850257c410dd6859babacf50c5bbe34b66acb81deaff08c384e4f069b6114c76f34ad4e6f2e1bb6b884541ffc17943cb", 0xcf}], 0x1, &(0x7f0000000240)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010101, @private=0xfffffffe}}}], 0x38}}, {{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000300)="ad2094444704a262966bdc689b75cf9efea2f3cd4949dfd8110d81b037d9b60cf8d7775dec5d2c1a4e", 0x29}, {&(0x7f0000000880)="6fd5a2c5f87eaa58d325162bddbe2f941e1b1f1d930344b8c0f05257f3733ba792eb2231c199b709eda012c46013fefb0e8dce220e4cc3397a419a4cb3a5fa3ff3e346e84a64b16a67ce6f6c86a76086fcc70e6024d3a050f9bfad911ec1fdab435be8615b5776f5d01bd4b0b82ff3f29a4f4dfb8266ae273ac47b8608e917399e9e55b3e9af1d333dd061756573ba23ca3811913c9797932954a560c219bef0cf906a118ab58deed4dc50482801b485dee8ab801963cca958f33c0e02ec6da9ad154e9691e53c66ef4950741b3740459efbd6ad32b2cc1565be721a0362de3964fcf10a6405636ef1a4b5662f7ed6f87135be78921b47ba496f07b8dbc1577f5e16d2260c39b9736e2212f016ac311a26fcaf5e4fe1a8a77345fa60d18651f341db51c851b81e4d53b02d76553d7f16e5d195fe92f1696fd80d875e0340d72a453bb39b1b332e7f26e69f1fddf14e65fb6eb596a23d931d6bfb86c61f78e8a2e0eef43f5f2896a551a692b5f02e522b8073bee9eb7e4c07b561e4a00b65eafa979f0964a11e3ce28cd651c95487c1b757a80ece111e87bb5e1dd0dac4cfe23dabf1c15b55b4881f4b912b35e51043b75d7b9e97ab55c34122a3a4d443e6fb18cafffb5afc4288605d74fdad17a96437b7a5e77d25176a3fbeb3592ddd75f1fa15eec191907e1879ce82a87122c7e7c329ceb30257daf9ad43d79696229b061b3971f737bb5d9bba1b55429937d807ed14a6a6340f47e6dd70833e02c32e98f8254d2050c58d84354711e76f48d6681032da05fee8e6fd6651f513c4e232a51b8cb47093a085bfb2b9b8e5986c85f10f03fc48ab7392901bdc5200edf4bf9dbe3b9d34ae144d966742812663844e0c07bdff0b8742a4e05695a3fe85282bd6e516a2a48082a28739a7c72644b30961f98765c117b06557b6232623046e4fc6b59b9e915932c388ee89cd8a56822456de04b951e62ff50482def82349f7e2bc861245ddfaef224a945cf6535c0337d9956717fa7ec1aa6ac224d9fb06962ee302d60c58d02c424aa80f1f28bea19798bb332780fe29281142cd73e36b8ae0b7b75394e03eb8e5c9cd8a9320bf97d621e404e4f2119a8806f3ad57634586a481b402623d38194baed526c1f85a39047436f4fbfa530292a3e9f3ba2bead22710cc0c23e569034b55ee0a065b4242b92a16504a2c02afe83f0921c070c15ac3044f25d52254e52c05ff3eee43169a25d9c4baeafc848fbdf40aac3de2f8ead6414ee20fc85d4061f13307c21a53c2a742bbb6aba13772eb1260462f262a858b33a7343b01dd4adfe57d9dc24500f6bdb4c12450353497c6e0f3e90f94a9ce6ac737cdf8f8b10ec59b552870ad1378490d3dfad12ec9783b2afff640965ec2ee317035707c9c9cfd8df69976a2508d58e63babe4da6aeeb3fda8c6dffaed8e83d543acf582d5b2b2475cd3f9a9c87ccd981533f22c8c937c26eb712e6864a593efece4003fee5322e86468ab047aefeadc3859eadf624f848b6c8880efd6cf2afe8925b58d8bd21b0b716c9c2b4db2b9ea3a9bc0263c44fdf998c6a19d7ede49d463884882e8604aa25b5e6459a89961b119f6cc0a319ccb0976827cf00745321eff12db3bc11213f23c1b94ad2bce53e67429e70db0433dc743291a86fc8668c2cf70263f42bc329ecb182cc892b0769a37a37ce77470dbfbc1d09db03ac0947bef5e58fe49812e2e2375107319f8db718436d9803b55ef1c30f926f5d53e4f2e24e09f52b16b0074d2c71c85496824e7b9d6f7882d02f3b4b11dbc7a119f530d82da3c3d0d2d77a2877650367c12e462d9fdfedbb1cab7342555f743a0aa3854aa5a10ec1baede1082e2c48a6c9c7e285704de7e0199bde50d3d63b19ba9d2edb244b2ba0ca59a2c9b8cb13f906e68e632b0a5b3b7b3e45dd9e55007b62e69713dce7bfedf220dcb842ce6603455ff2ed9487a591c70673e50b2c2aae04d1a16b47b3304247d4aa12f377bd62a0bb96912fb0d2f3d53b5fde5f6477f7f52de20f3970e5111fc982cd24a855dc9b5b07e131a9d29ee2afc3bbf8b89ed2256b5c6c00cc6d1cca176da39b013b44b60995936da5bdc8e067638db6157085eef3a2a5493fe36c09d472323f3147ab87d810be5d081d6c49d7e60bb01ed470ad49ccb1cf5d7d4d20ce771517463bd70cf541531d20f71d5d40e6b8c970afa05e7d91b2fd2f6afea77650d5d96030abceab8764e7c89d96456d9dd06c379234d5acdee5dc7807b1bfe26b37e83e0b33ff3900e99961f1da9c0a342f27a869ecd1443ab9227337a666afb4031d38e198483c67ea42ffa07915b48f93cb2944b05c744eb12da8868ac3f58cba6fcb73d99ca2a53709e5b9654a808b629b02651a6550a438fc8899801595f266a82229431393c18bbb3bd4a950ef631f273e7033b128a14075b9c858a39cd579a23e532878408cebc8c17f86d98aaec5db6a11afa7e7e996b12151cefa2f9b2546f0e83d7b1d6ae533ca1af7afe658a4c3d7a11002040507b0c10c492f63b4979e7c980f7816fd36e98dc4b44ae07a941ef249d7d044a43738ad158f2030231e09c0b23f2e0585d5208523105da939606848cd8490b18dd56eece3b4564cbaba42348c38c714287c55550ad7d0eb2d7d13afef153930012e8d6d42d4b20622bb943b102b0b1761ca99103e5451d9f219629162ec4bcd871d9b51b15b66f6ccbdc013d01e783f09beff15989026a2465090aad52e66cb8dc982358673beed5a443dbefb6bf0e3b3cf4357c404ce5b7380cbb8ad8c39aaa7ae736b19c6ca3d97a5dd9d41c583b40645c81b5b8f5f1781e0a5ccdc57fa29bbc4aef913b75b739da24d88dcb25b4e7919479415370a49fdea99bee8ed5b6d1c945618db2ab122a37d5d19b43c6b19f536a1835feef8f32fbd403d5ecd7ac482fe0356aa9ecba89415954a370fd175d811ece67605f683bde9238a469132c0badf1513e12cf4cfdb7891aff4456cb16feaed8c493d8c3c586ac926a5398293c5e7c9c2923ba6480034b34f76ec0a7a832e5f747a901598befc2c33db6e989cda5ee9f40ed5cab2bfcb89933d3187c3327ed628f806c8f4d738e55248a5cb5724e63706c7487291ea2e8e9bded46777a5173b7400127df31c81fc979bcca02bace6327b0e3ab4826e90c9ad40e5c8a194faae13e43f8b59c162cf225d9e49d27533ee5e962f84ebd1e1ac299678fa9f50b5aa585e5e47e6e638a4a2933212ff7775a1d1142accfcb0a61cc301fc712cf8d7d03ac23c1a1441dabbcd5d65651c5a6af079ebf38bce7cc1fba355c71df7b04bcf72dd74197a7e6f8fa6f9eee7bb0c99333eb5602581b904da1bb7b1beadb5ee99200b81034d74af5032bff64961b910abe9c578a140d3e6d761362d507fdabf758e86dd1c10dc1f370d175730beb1cbcb75039ac048a6c8bcee7309742e71fae41d145c8f041328144727dde315a8915bc9dd4e4373af296d719b1fb9e3d37a3b31de9833a00efdde7db1080468a622748e48b228a0aea0bd0cc2a6e411f645f660df5014a69bc1222c998cb35fbf204c6f7f4b3658179176af30c5dd5381744986eeccc1cb3c729c81480d347868d2eb30dc1d4b922b13e7901e9425d6cecacd65e5e286408d7c5eba4f3ba728db6c32fa018c69a1ca1f67fd82d1296b6222765bf94b1b0daf228ed7fb5fe0c9bc5f44d33a38f7b72cbbf85c69452d60d4442d4865bfaa137c42b3c2f9131edb421c07745accb3b6bac1b9047f2b103ea86aa3fbc8be6bc0fe1414363ea0e1d37dde06102d5285a03661696e0ce8cd18d09eb2317afa2e8e21da53038fb5da2f0d971ed54a092c5a7cb4c8088c848f4300862d94f7698a9bee784012ab2da38fdb9d4cdd6d84e033e4c23d5559cb828796f5a6ef2e6e4ad79cdae4987b6b43be70e04a05469a12c47215646f5e215fe5ce9559446648301d810cf3cf44fc2d0249c87b10cf615ebbf9cb1e7b55af84e99f9456fb535a00581417bb836ccebfd2bd0145cba09a74f4d147199f9017dd4c23798027299ce63b048931c59bdcb39eaf50711c7b8e26fcff5b4c2540f5ef318f66b79331722fddffc15e9b9e7c44a4d67625417332bc6ab98905b5cf6a3017a31246c9a064e10581769f0679d4476a99a8d49fff548ce892f9c769fd5c98a21f3d50e38436ccf41fb618634cf4a3c9b203cd6791908bd782fbe60ac53e53801d96c71a665d46a0f9dcf7880ec5e63863ac6ff30d98aa5e82c5d9763ffb9d7e4f412bc3aa8995bc531bdf54ac9a8a3443527aaa89eea6f1a059b96791ef99b5b954fd5e61c5ae25ec866c8c3d4146f8771a5f3692b9cbdf36fe7e8edf0edff07c750a59b8f3016db9d838cf836a182b0c0422afad7c0abf08d1248e2a40d0a618b372152bb53110c60373b31c43679c7c6fe90f626fe4fdcc8b38628b69204502e8d75fd94d49636f8bdc9422857e58147a9783b07d045af1e7617d2fc443136fa3ec0b34098339d7184354f166930b73e60c58560a16ab14f96421e7934fb98d0ff4dddb1a523c0b21c1b2b9de1654f154109b1c7bfde9a0180271a87a55781ddf5c33274bb4082a46cedf2de419959c151b11e72a040172b2d176b31f049ea317a838b17969a872a6fc182721df1b5c456149163039dc2dcc89ec4d69b35ac2f583e5a4a87cc8dbf35d391d7c1e975cc83a37678e201aeab48ee900bc94478ea4bf46901d55aa47870119ac829eab9dc95277de9936f63ff72d929b05e1af20b2e3410df8539789fd699fe96e0f518652c8b8bf3e79a3362a62d1d46c293621c5b45f47927d65fab04a7d6ea86b6a0d7e09a6b127f9433e7e073243a76f0dfc6b65eaedc0d52872ad6ace3bdf970014a56f8c95a8fe5480f0a7e37cdea2b685040d35e53c452b3456befffe9b21ef0a0e1c705bf2175187574712a8a91fa5bbb8f7420d3c59fdbafea3a0edfd1f3bfe3320cf75d3a67d912ffc8e495dfbbca7e2debb76c82f857801c94b4b0a799e3777a7978d3e620ca23a00e964bfc3fe58bd38f58fe3245982462fd6d0f133655e906d257620700fc4b20e126760fc2c3e13e29094be3f29e7e24c9dbef6f507e3ee97ccef3a7be870210d311549f0ddfcc99d0cf174559a020f4bda3d153a34f19b5d6d3fb4f9f3f133550b8f7323c8a683b12a8e5d64663992b690132b64a05070fc47191371b454693f298c4e98e7ef07d7b2a9c295b31b774d8a9c5bd27b121f0b1356e87fee09973b951f1c85afb386ca8b31d6b9b46804b3b426d46b2f267e036fa5ca3a01a66cc93a692ee034d7d15df5bda56576ed63eb79a827012420434cb7cf11975bd51c7bc36531008edfda3e64c8f91d8d85d484fde4dc696fa2b43b24c58d73347eec33a0ee8ab406ae3c4582b1ef7a7d2e63fccac78b14c542694845718dccc46194b7d84126694144aac384613a389a4683912bf670f698314925c9ba98cfa1dcc9590facc385981f8c27494648e2fe8f6c492452f4555d235e12a33d3b4083569beb8943e06ffd3a8570f215ac7dc5e75e6c72879e1a7090d0cb28b8be684f1ac88bc75cb762e3450fb78c546ecdc93b6582ebac1aea26a1317fb64bd0b8c5aa3919d8808e0af32df550190baa8ff9db633715032e6e1c027c4f79c9bb89efeecad69820501a8ce4dacd5b02133024b1e0ea27e2c488edb2d1881f2db6e893f4e4962f210724fd8f863e2a78944a0a093feaa7a2fc3125244f56d40dc75dae7e2db7f1cc9782fe63affa10610ab8a79b3dec224c1069be04caa", 0x1000}, {&(0x7f0000000540)="94101c46586a573d720c07e49bb5581cb7b77c30535a5d560626774657a496817a7c9ca3311da89e23dae7b1004ac91da2e47b39614940a2661bd1fc723b487a84585389055ade426e2be0a5", 0x4c}, {&(0x7f0000000380)="65184d2c98662cc7a7745ce9da7aaf72285ac4287e560d3d373ca489473715fd6e7d8502157563abe4", 0x29}, {&(0x7f0000001880)="1ecdca6c6d0473dfa3896a8259cf8e6f03e3e712aa17acad4f61346fdbac30c8e8b628fce05ae712d307eb69826e7149fb3a6cdc72e11b382955af9b385006afde111d66e83c7949df10a66668bac77e58a8421d1b369f41b426f328af382370c9aa99512e87243a134d4f9c42", 0x6d}, {&(0x7f0000001900)="beeda88aac78bb5a321e1eed627c6b96c771f9fea9b1c5f14546845512c45419f62b05a46ea402e65afef2ecc74fb5113bb018a67291750943ec8aae6e5ef3231b2ca433285952dae4f3", 0x4a}, {&(0x7f0000001980)="351d062a634da3a051ead23e746f32ebe3d0fe95549d5a4022573f9256b1d38f8ec252752a1b5206315e667715eb3f2e3c88a79513c1c215b2fe2d619116754da1c0b91ca4d3be8a699b5298a57030e43e9ced2f93612ffb9ded6aa336cf99c8aea1c3502e16bac7b24c156c08f5", 0x6e}], 0x7, &(0x7f0000001a80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7b}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_retopts={{0x8c, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0x7e, [@private=0xa010101, @private=0xa010101, @multicast1]}, @noop, @generic={0x94, 0x9, "43d251aefc085e"}, @ssrr={0x89, 0x2b, 0x27, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x38}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @local, @loopback]}, @timestamp={0x44, 0x2c, 0xf9, 0x0, 0x6, [0xff, 0x0, 0x8001, 0x7fff, 0x4, 0x200, 0x45a, 0x9, 0x466, 0x3]}, @generic={0x89, 0xb, "aeef469c96a7ed2a83"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffffffff}}], 0xf0}}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000001b80)="ff39a9423c924ea25e7f39b598288871b9676df1606ee4d5b3e1e61296000f98606bdbdcb354f17670fe151207f48f46888a577cd314dee47b98d09de6d2c45a53ce6900dd88e537b306d767a2efb4beb66bab347548f9e83e2491af9506d3a32475c44569c6a474b90d912437a37a29be7d66b716d555e0a406c08aa8382653baeec71baee140f8e359ed20eff36d46227b92fb245e83a0fdb737d874f5ba29c960030a57abf5ddf5a64e2d6b6520f72a73953917b239987624e59f3c8387f1580e6f86290f4c4456568aa94431ca", 0xcf}, {&(0x7f0000000440)}], 0x2, &(0x7f0000001cc0)=[@ip_retopts={{0x48, 0x0, 0x7, {[@generic={0x82, 0x4, "e3ca"}, @ssrr={0x89, 0x2b, 0xf4, [@broadcast, @remote, @dev={0xac, 0x14, 0x14, 0x40}, @empty, @broadcast, @empty, @broadcast, @multicast2, @empty, @private=0xa010101]}, @ssrr={0x89, 0x7, 0xe, [@loopback]}]}}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x14, 0xd8, 0x3, 0x6, [{@loopback, 0x545}, {@broadcast, 0x1}]}, @ssrr={0x89, 0x17, 0xc2, [@multicast1, @private=0xa010100, @loopback, @loopback, @broadcast]}]}}}], 0x88}}, {{&(0x7f0000001d80)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000003040)=[{&(0x7f0000001dc0)="5a6d14917fb3dcb646c9ca7b250962a8d0638929369d109b918eae5475ed32f4033686a4bfe2563147aa89a65ad3d967ca57d5382e6963eac1e89a7836662811464a92718cd8673e399212bf384a6772c3f4e77455f2f7274385c732483ff94c6680a1c456cf28db98ebc00f63389040b64b3873bee1a9f50bea", 0x7a}, {&(0x7f0000001e40)="fea7874dbd936269b44feabac9f3d80dcd8e19d926ad0455646f0b650ff4f8407da0077780ec1afcc00cf81bf7a9e5f44d930fd331679016d2724067568d8d498d66a922f0b0a7bb08fc88cee1e3fef26150709058692416d5dcc42297a548ce46070f34803f6459380de8f225e3534c5ab983a80559e8b36c3da92b817a1118413772342ff5dde71b5cc135286da81d548e3e79941656ce11017f15c6027f144d92d36237d07a8aa482e64e7375c1ea75fdcb546e12635814d3cda146bf9bae4e6320f054af510b4348486659b8385f092a826415b4934f15bd9ff23f6a7a6127ff26292e9f1ce99eecdf6567", 0xed}, {&(0x7f0000001f40)="4f129c71db45e62d1c739c95a57ce54707b3b9fe34b2f08a9436899a11abafc82625fa413c84ae114af547cd13b713c8013bd43c55b8a929b4e70f081d47cc6c3538cad1d783f772a8b6e9edc246d751596d8b3a46c7a0a8c80c0bb68c3b2dc9cc145801315f36d1ca5441df256b8d42242cc094526b831d7a335018f6e9179e1e7bebd9334b53736d551dcc277b9047dafb73cc57093377a4a3d745b56bf04f13ee08ca3affeaa766e34f3d7aa84f4856cc5d3a1c02e9f25d7e351583b1ab6bca7c45a96842de", 0xc7}, {&(0x7f0000002040)="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", 0x1000}], 0x4, &(0x7f0000003080)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x7, 0x82, [@private=0xa010102]}, @generic={0x86, 0x8, "a9b9f3b2956e"}, @ssrr={0x89, 0xf, 0x60, [@rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x12}, @rand_addr=0x64010102]}, @timestamp={0x44, 0x24, 0x6e, 0x0, 0x2, [0x80, 0x3, 0x8, 0x4, 0x7fff, 0x585e, 0x8c, 0xfffffffa]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xdb}}], 0x88}}, {{&(0x7f0000003140)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000003240)=[{&(0x7f0000003180)="daf5bb713a1b8d01ed42115305750a6e5dc73a6117b74c046057c08d7effd60bf7c6d35badcc9688ee1ce1a352e7f408f4acedc4a431fd66bc159d841aaa455c9e5ac4cdd50b0196a5cf26e4223e1f7203b41fab61db32276625275d3264b82216db3468fc5f6b92bf7063dd6272be426a7ca3e3e0ba965dbe68f1f43c7148ef03e9", 0x82}], 0x1, &(0x7f0000003280)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x18}}], 0x5, 0x4000015) syz_io_uring_submit(r8, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) stat(&(0x7f0000000340)='.\x00', 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xb, 0x10010, r5, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 02:32:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x6c00000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:32:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r3, 0x800000000000202) 02:32:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x5b030000, 0x0) [ 1840.289131] FAULT_INJECTION: forcing a failure. [ 1840.289131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1840.290637] CPU: 1 PID: 9381 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1840.291444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1840.292422] Call Trace: [ 1840.292740] dump_stack+0x107/0x167 [ 1840.293183] should_fail.cold+0x5/0xa [ 1840.293637] _copy_to_user+0x2e/0x180 [ 1840.294105] simple_read_from_buffer+0xcc/0x160 [ 1840.294663] proc_fail_nth_read+0x198/0x230 [ 1840.295214] ? proc_sessionid_read+0x230/0x230 [ 1840.295759] ? security_file_permission+0xb1/0xe0 [ 1840.296335] ? proc_sessionid_read+0x230/0x230 [ 1840.296895] vfs_read+0x228/0x620 [ 1840.297311] ksys_read+0x12d/0x260 [ 1840.297736] ? vfs_write+0xb10/0xb10 [ 1840.298184] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1840.298807] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1840.299419] do_syscall_64+0x33/0x40 [ 1840.299863] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1840.300489] RIP: 0033:0x7fa96e07c69c [ 1840.300967] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1840.303182] RSP: 002b:00007fa96b63f170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1840.304082] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fa96e07c69c [ 1840.304937] RDX: 000000000000000f RSI: 00007fa96b63f1e0 RDI: 0000000000000005 [ 1840.305784] RBP: 00007fa96b63f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1840.306624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1840.307472] R13: 00007fff1e33c42f R14: 00007fa96b63f300 R15: 0000000000022000 [ 1840.327246] FAULT_INJECTION: forcing a failure. [ 1840.327246] name failslab, interval 1, probability 0, space 0, times 0 [ 1840.328744] CPU: 1 PID: 9385 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1840.329633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1840.330624] Call Trace: [ 1840.330959] dump_stack+0x107/0x167 [ 1840.331401] should_fail.cold+0x5/0xa [ 1840.331864] ? create_object.isra.0+0x3a/0xa20 [ 1840.332400] should_failslab+0x5/0x20 [ 1840.332854] kmem_cache_alloc+0x5b/0x310 [ 1840.333340] create_object.isra.0+0x3a/0xa20 [ 1840.333854] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1840.334453] kmem_cache_alloc_trace+0x151/0x320 [ 1840.335004] __iomap_dio_rw+0x1ee/0x1110 [ 1840.335482] ? lock_release+0x680/0x680 [ 1840.335955] ? fsnotify+0x1570/0x1570 [ 1840.336398] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1840.336945] ? down_read_trylock+0x193/0x350 [ 1840.337456] ? ext4_file_read_iter+0x356/0x4c0 [ 1840.337991] ? rwsem_can_spin_on_owner+0x250/0x250 [ 1840.338565] iomap_dio_rw+0x31/0x90 [ 1840.338999] ext4_file_read_iter+0x2c7/0x4c0 [ 1840.339512] ? ext4_release_file+0x380/0x380 [ 1840.340026] io_read+0x2dc/0x11e0 [ 1840.340441] ? kiocb_done+0xc90/0xc90 [ 1840.340895] ? mark_lock+0xf5/0x2df0 [ 1840.341335] ? lock_chain_count+0x20/0x20 [ 1840.341824] ? stack_trace_consume_entry+0x160/0x160 [ 1840.342425] ? lock_acquire+0x197/0x470 [ 1840.342896] ? __lock_acquire+0xbb1/0x5b00 [ 1840.343391] io_issue_sqe+0x2e8a/0x77b0 [ 1840.343862] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1840.344476] ? lock_chain_count+0x20/0x20 [ 1840.344971] ? __is_insn_slot_addr+0x14c/0x290 [ 1840.345507] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1840.346120] ? io_connect+0x610/0x610 [ 1840.346565] ? lock_acquire+0x197/0x470 [ 1840.347028] ? find_held_lock+0x2c/0x110 [ 1840.347502] ? __fget_files+0x2cf/0x520 [ 1840.347967] ? lock_downgrade+0x6d0/0x6d0 [ 1840.348446] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1840.349072] __io_queue_sqe+0x90/0x9d0 [ 1840.349529] ? io_issue_sqe+0x77b0/0x77b0 [ 1840.350012] ? __fget_files+0x2f8/0x520 [ 1840.350476] ? io_prep_rw+0x7f5/0x1050 [ 1840.350931] io_submit_sqes+0x44aa/0x8610 [ 1840.351431] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1840.352010] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1840.352594] ? find_held_lock+0x2c/0x110 [ 1840.353098] ? io_submit_sqes+0x8610/0x8610 [ 1840.353607] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1840.354191] ? wait_for_completion_io+0x270/0x270 [ 1840.354755] ? rcu_read_lock_any_held+0x75/0xa0 [ 1840.355294] ? vfs_write+0x354/0xb10 [ 1840.355730] ? fput_many+0x2f/0x1a0 [ 1840.356168] ? ksys_write+0x1a9/0x260 [ 1840.356632] ? __ia32_sys_read+0xb0/0xb0 [ 1840.357122] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1840.357727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1840.358323] do_syscall_64+0x33/0x40 [ 1840.358752] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1840.359342] RIP: 0033:0x7f67cefd1b19 [ 1840.359771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1840.361900] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1840.362776] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1840.363602] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1840.364418] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1840.365252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1840.366072] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:32:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x7400000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:32:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x9d040000, 0x0) 02:32:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:32:38 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:32:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r3, 0x800000000000202) 02:32:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x2, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) [ 1840.582582] FAULT_INJECTION: forcing a failure. [ 1840.582582] name failslab, interval 1, probability 0, space 0, times 0 [ 1840.586237] CPU: 0 PID: 9405 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1840.587798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1840.589677] Call Trace: [ 1840.590276] dump_stack+0x107/0x167 [ 1840.591104] should_fail.cold+0x5/0xa [ 1840.591963] should_failslab+0x5/0x20 [ 1840.592824] kmem_cache_alloc_bulk+0x4b/0x320 [ 1840.593854] io_submit_sqes+0x6fe6/0x8610 [ 1840.594821] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1840.595954] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1840.597049] ? find_held_lock+0x2c/0x110 [ 1840.597979] ? io_submit_sqes+0x8610/0x8610 [ 1840.598953] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1840.600057] ? wait_for_completion_io+0x270/0x270 [ 1840.601160] ? rcu_read_lock_any_held+0x75/0xa0 [ 1840.602203] ? vfs_write+0x354/0xb10 [ 1840.603041] ? fput_many+0x2f/0x1a0 [ 1840.603869] ? ksys_write+0x1a9/0x260 [ 1840.604735] ? __ia32_sys_read+0xb0/0xb0 [ 1840.605680] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1840.606879] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1840.608080] do_syscall_64+0x33/0x40 [ 1840.608936] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1840.610091] RIP: 0033:0x7f67cefd1b19 [ 1840.610946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1840.615122] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1840.616849] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1840.618452] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1840.620061] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1840.621670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1840.623286] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:32:50 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:32:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x7a00000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:32:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x4b47, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:32:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) unshare(0x4a060400) 02:32:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x5d, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe"}) unshare(0x4a060400) 02:32:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x9f000000, 0x0) 02:32:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r4, 0x800000000000202) unshare(0x4a060400) 02:32:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) 02:32:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x8004000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1852.748558] FAULT_INJECTION: forcing a failure. [ 1852.748558] name failslab, interval 1, probability 0, space 0, times 0 [ 1852.750204] CPU: 0 PID: 9432 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1852.751116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1852.752220] Call Trace: [ 1852.752583] dump_stack+0x107/0x167 [ 1852.753066] should_fail.cold+0x5/0xa [ 1852.753562] ? create_object.isra.0+0x3a/0xa20 [ 1852.754153] should_failslab+0x5/0x20 [ 1852.754627] kmem_cache_alloc+0x5b/0x310 [ 1852.755156] create_object.isra.0+0x3a/0xa20 [ 1852.755723] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1852.756381] kmem_cache_alloc_bulk+0x168/0x320 [ 1852.756976] io_submit_sqes+0x6fe6/0x8610 [ 1852.757537] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1852.758184] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1852.758814] ? find_held_lock+0x2c/0x110 [ 1852.759346] ? io_submit_sqes+0x8610/0x8610 [ 1852.759907] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1852.760533] ? wait_for_completion_io+0x270/0x270 [ 1852.761165] ? rcu_read_lock_any_held+0x75/0xa0 [ 1852.761765] ? vfs_write+0x354/0xb10 [ 1852.762247] ? fput_many+0x2f/0x1a0 [ 1852.762716] ? ksys_write+0x1a9/0x260 [ 1852.763210] ? __ia32_sys_read+0xb0/0xb0 [ 1852.763734] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1852.764416] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1852.765089] do_syscall_64+0x33/0x40 [ 1852.765566] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1852.766229] RIP: 0033:0x7f67cefd1b19 [ 1852.766685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1852.769058] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1852.770042] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1852.770917] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1852.771836] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1852.772759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1852.773649] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:32:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) 02:32:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xa3010000, 0x0) 02:32:50 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x9d040000, 0x0) 02:32:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x4b49, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:32:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r4, 0x800000000000202) unshare(0x4a060400) 02:32:50 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x9d040000, 0x0) 02:32:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x8cffffff00000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:33:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xa5030000, 0x0) 02:33:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r4, 0x800000000000202) unshare(0x4a060400) 02:33:03 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:33:03 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0x9d040000, 0x0) 02:33:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) unshare(0x4a060400) 02:33:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) 02:33:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xf6ffffff00000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:33:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5409, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:33:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r4, 0x800000000000202) unshare(0x4a060400) 02:33:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x0) [ 1865.950872] FAULT_INJECTION: forcing a failure. [ 1865.950872] name failslab, interval 1, probability 0, space 0, times 0 [ 1865.953808] CPU: 0 PID: 9470 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1865.955356] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1865.957260] Call Trace: [ 1865.957862] dump_stack+0x107/0x167 [ 1865.958691] should_fail.cold+0x5/0xa [ 1865.959559] ? create_object.isra.0+0x3a/0xa20 [ 1865.960596] should_failslab+0x5/0x20 [ 1865.961468] kmem_cache_alloc+0x5b/0x310 [ 1865.962396] create_object.isra.0+0x3a/0xa20 [ 1865.963392] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1865.964548] kmem_cache_alloc_bulk+0x168/0x320 [ 1865.965613] io_submit_sqes+0x6fe6/0x8610 [ 1865.966597] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1865.967732] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1865.968840] ? find_held_lock+0x2c/0x110 [ 1865.969792] ? io_submit_sqes+0x8610/0x8610 [ 1865.970802] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1865.971922] ? wait_for_completion_io+0x270/0x270 [ 1865.973025] ? rcu_read_lock_any_held+0x75/0xa0 [ 1865.974098] ? vfs_write+0x354/0xb10 [ 1865.974954] ? fput_many+0x2f/0x1a0 [ 1865.975792] ? ksys_write+0x1a9/0x260 [ 1865.976679] ? __ia32_sys_read+0xb0/0xb0 [ 1865.977642] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.978880] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1865.980061] do_syscall_64+0x33/0x40 [ 1865.980915] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1865.982128] RIP: 0033:0x7f67cefd1b19 [ 1865.983014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1865.987339] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1865.989098] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1865.990747] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1865.992402] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1865.994059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1865.995736] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:33:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xfeffffff00000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:33:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x540b, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:33:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xa5060000, 0x0) 02:33:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x0) 02:33:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xff03000000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:33:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) unshare(0x4a060400) 02:33:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x540c, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:33:18 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:33:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10, r4, 0x800000000000202) unshare(0x4a060400) 02:33:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xad050000, 0x0) 02:33:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) unshare(0x4a060400) 02:33:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x0) 02:33:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xffff0f0000000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) [ 1880.463627] FAULT_INJECTION: forcing a failure. [ 1880.463627] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.465075] CPU: 1 PID: 9509 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1880.465926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1880.466950] Call Trace: [ 1880.467298] dump_stack+0x107/0x167 [ 1880.467738] should_fail.cold+0x5/0xa [ 1880.468200] should_failslab+0x5/0x20 [ 1880.468655] kmem_cache_alloc_bulk+0x4b/0x320 [ 1880.469207] io_submit_sqes+0x6fe6/0x8610 [ 1880.469724] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1880.470346] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1880.470926] ? find_held_lock+0x2c/0x110 [ 1880.471440] ? io_submit_sqes+0x8610/0x8610 [ 1880.471963] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1880.472539] ? wait_for_completion_io+0x270/0x270 [ 1880.473123] ? rcu_read_lock_any_held+0x75/0xa0 [ 1880.473684] ? vfs_write+0x354/0xb10 [ 1880.474133] ? fput_many+0x2f/0x1a0 [ 1880.474566] ? ksys_write+0x1a9/0x260 [ 1880.475021] ? __ia32_sys_read+0xb0/0xb0 [ 1880.475508] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1880.476147] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1880.476766] do_syscall_64+0x33/0x40 [ 1880.477211] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1880.477845] RIP: 0033:0x7f67cefd1b19 [ 1880.478314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1880.480508] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1880.481445] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1880.482290] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1880.483164] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1880.484027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1880.484885] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 02:33:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xbc020000, 0x0) 02:33:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1880.571514] FAULT_INJECTION: forcing a failure. [ 1880.571514] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.573573] CPU: 1 PID: 9519 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1880.574388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1880.575375] Call Trace: [ 1880.575682] dump_stack+0x107/0x167 [ 1880.576103] should_fail.cold+0x5/0xa [ 1880.576543] ? file_tty_write.constprop.0+0x707/0x910 [ 1880.577143] should_failslab+0x5/0x20 [ 1880.577599] __kmalloc+0x72/0x390 [ 1880.577995] ? mutex_trylock+0x237/0x2b0 [ 1880.578459] ? file_tty_write.constprop.0+0x29f/0x910 [ 1880.579056] file_tty_write.constprop.0+0x707/0x910 [ 1880.579631] ? lock_acquire+0x197/0x470 [ 1880.580086] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1880.580650] ? find_held_lock+0x2c/0x110 [ 1880.581122] new_sync_write+0x42c/0x660 [ 1880.581591] ? new_sync_read+0x6f0/0x6f0 [ 1880.582062] ? avc_policy_seqno+0x9/0x70 [ 1880.582534] ? selinux_file_permission+0x92/0x520 [ 1880.583090] ? security_file_permission+0xb1/0xe0 [ 1880.583650] vfs_write+0x7c0/0xb10 [ 1880.584068] ksys_write+0x12d/0x260 [ 1880.584494] ? __ia32_sys_read+0xb0/0xb0 [ 1880.584962] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1880.585582] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1880.586172] do_syscall_64+0x33/0x40 [ 1880.586596] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1880.587188] RIP: 0033:0x7f0e035e8b19 [ 1880.587622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1880.589746] RSP: 002b:00007f0e00b5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1880.590667] RAX: ffffffffffffffda RBX: 00007f0e036fbf60 RCX: 00007f0e035e8b19 [ 1880.591536] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1880.592385] RBP: 00007f0e00b5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1880.593238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1880.594095] R13: 00007fff692ece1f R14: 00007f0e00b5e300 R15: 0000000000022000 02:33:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xe1000000, 0x0) 02:33:18 executing program 2: io_setup(0x10000, &(0x7f00000003c0)=0x0) io_cancel(0x0, 0x0, 0x0) io_setup(0x400, &(0x7f0000000600)) socketpair(0x1f, 0x5, 0x82, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x13, r5, 0x0) r6 = open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x8000) r7 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000340)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x9, r5, &(0x7f0000000180)="62d7c34be85906b74f215a448c890eef0c83e9bf41d0b13cc3841f41c1b98a00109ed33edea9f3540afcebe2846c7a95b5dc9cd2b450d6a3c9ee8d2d866519b516f3585fb7b5bf587ba78fe48d9559bfdd680613727b2b2c8c78c9b993561e124321604690de930a176589f241673aa922455e67c658f3104c3de47c2ecb11dc13da516ca2eb535a9bd04ba010b19309a4a4fa3b775a3939005251c5de9a20b10ede7fe6f88ed5c4a153", 0xaa, 0x7, 0x0, 0x3, r6}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x4, r7, &(0x7f00000002c0), 0x0, 0x4, 0x0, 0x1}]) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000900)={0x2c, r2, 0x1, 0x0, 0x0, {0x8}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4, 0x2}]}]}]}, 0x2c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6gre0\x00', r8, 0x2f, 0x3f, 0x3, 0x8, 0x10, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @remote, 0x8000, 0x80, 0xfffffff7, 0x101}}) syz_mount_image$nfs(&(0x7f0000000c40), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:33:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xe7040000, 0x0) 02:33:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0xffffffff00000000) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:33:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x540d, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:33:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 2) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) [ 1880.760505] FAULT_INJECTION: forcing a failure. [ 1880.760505] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.762086] CPU: 1 PID: 9535 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1880.762869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1880.763815] Call Trace: [ 1880.764127] dump_stack+0x107/0x167 [ 1880.764543] should_fail.cold+0x5/0xa [ 1880.764977] ? create_object.isra.0+0x3a/0xa20 [ 1880.765501] should_failslab+0x5/0x20 [ 1880.765937] kmem_cache_alloc+0x5b/0x310 [ 1880.766412] create_object.isra.0+0x3a/0xa20 [ 1880.766919] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1880.767505] __kmalloc+0x16e/0x390 [ 1880.767918] file_tty_write.constprop.0+0x707/0x910 [ 1880.768487] ? lock_acquire+0x197/0x470 [ 1880.768948] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1880.769530] ? find_held_lock+0x2c/0x110 [ 1880.770003] new_sync_write+0x42c/0x660 [ 1880.770457] ? new_sync_read+0x6f0/0x6f0 [ 1880.770926] ? avc_policy_seqno+0x9/0x70 [ 1880.771394] ? selinux_file_permission+0x92/0x520 [ 1880.771952] ? security_file_permission+0xb1/0xe0 [ 1880.772511] vfs_write+0x7c0/0xb10 [ 1880.772928] ksys_write+0x12d/0x260 [ 1880.773347] ? __ia32_sys_read+0xb0/0xb0 [ 1880.773819] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1880.774428] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1880.775022] do_syscall_64+0x33/0x40 [ 1880.775458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1880.776043] RIP: 0033:0x7f0e035e8b19 [ 1880.776480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1880.778659] RSP: 002b:00007f0e00b5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1880.779568] RAX: ffffffffffffffda RBX: 00007f0e036fbf60 RCX: 00007f0e035e8b19 [ 1880.780419] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1880.781249] RBP: 00007f0e00b5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1880.782085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1880.782910] R13: 00007fff692ece1f R14: 00007f0e00b5e300 R15: 0000000000022000 02:33:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5412, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:33:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xf7030000, 0x0) 02:33:18 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:33:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x12c02, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x90101, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utimes(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) openat(r2, &(0x7f0000000200)='./file0\x00', 0x40800, 0x188) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}, {@clone_children}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000480), 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000300)=ANY=[@ANYBLOB="010000200000b900df030000", @ANYRES64=r3, @ANYBLOB="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"]) fsmount(r0, 0x1, 0x71) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @empty}}) socket$inet(0x2, 0x1, 0x0) fsmount(0xffffffffffffffff, 0x1, 0x4) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001c00)) openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x940, 0x0) 02:33:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) unshare(0x4a060400) 02:33:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 3) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:33:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0x8c, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421e"}) unshare(0x4a060400) [ 1880.991116] FAULT_INJECTION: forcing a failure. [ 1880.991116] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.992487] CPU: 1 PID: 9546 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1880.993270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1880.994254] Call Trace: [ 1880.994586] dump_stack+0x107/0x167 [ 1880.995015] should_fail.cold+0x5/0xa [ 1880.995483] ? create_object.isra.0+0x3a/0xa20 [ 1880.996034] should_failslab+0x5/0x20 [ 1880.996478] kmem_cache_alloc+0x5b/0x310 [ 1880.996950] create_object.isra.0+0x3a/0xa20 [ 1880.997465] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1880.998056] kmem_cache_alloc_bulk+0x168/0x320 [ 1880.998582] io_submit_sqes+0x6fe6/0x8610 [ 1880.999087] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1880.999668] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1881.000263] ? find_held_lock+0x2c/0x110 [ 1881.000756] ? io_submit_sqes+0x8610/0x8610 [ 1881.001276] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1881.001839] ? wait_for_completion_io+0x270/0x270 [ 1881.002394] ? rcu_read_lock_any_held+0x75/0xa0 [ 1881.002929] ? vfs_write+0x354/0xb10 [ 1881.003357] ? fput_many+0x2f/0x1a0 [ 1881.003775] ? ksys_write+0x1a9/0x260 [ 1881.004215] ? __ia32_sys_read+0xb0/0xb0 [ 1881.004686] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.005291] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.005897] do_syscall_64+0x33/0x40 [ 1881.006326] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1881.006914] RIP: 0033:0x7f67cefd1b19 [ 1881.007340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.009470] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1881.010343] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1881.011159] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1881.011972] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.012785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.013614] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 [ 1881.065754] FAULT_INJECTION: forcing a failure. [ 1881.065754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1881.068698] CPU: 0 PID: 9550 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1881.070270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.072174] Call Trace: [ 1881.072788] dump_stack+0x107/0x167 [ 1881.073635] should_fail.cold+0x5/0xa [ 1881.074515] _copy_from_iter+0x202/0xe80 [ 1881.075454] ? __virt_addr_valid+0x170/0x5d0 [ 1881.076480] ? __check_object_size+0x319/0x440 [ 1881.077548] file_tty_write.constprop.0+0x4d5/0x910 [ 1881.078704] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1881.079862] new_sync_write+0x42c/0x660 [ 1881.080774] ? new_sync_read+0x6f0/0x6f0 [ 1881.081743] ? avc_policy_seqno+0x9/0x70 [ 1881.082667] ? selinux_file_permission+0x92/0x520 [ 1881.083775] ? security_file_permission+0xb1/0xe0 [ 1881.084894] vfs_write+0x7c0/0xb10 [ 1881.085741] ksys_write+0x12d/0x260 [ 1881.086573] ? __ia32_sys_read+0xb0/0xb0 [ 1881.087509] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.088707] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.089897] do_syscall_64+0x33/0x40 [ 1881.090748] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1881.091923] RIP: 0033:0x7f0e035e8b19 [ 1881.092765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.096937] RSP: 002b:00007f0e00b5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1881.098682] RAX: ffffffffffffffda RBX: 00007f0e036fbf60 RCX: 00007f0e035e8b19 [ 1881.100299] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1881.101938] RBP: 00007f0e00b5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.103560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1881.105184] R13: 00007fff692ece1f R14: 00007f0e00b5e300 R15: 0000000000022000 02:33:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xfa010000, 0x0) 02:33:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x46e2, 0x0) r2 = syz_open_dev$sg(0x0, 0x2fe3, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mq_timedsend(r1, &(0x7f0000000600)="8994608f6102ea066f641411aef3746fecd9ecd7c1286c3a07cddd13fba802f3597a539ac9c713938e30fb7e165f1f8e4dae31b4ba230173195ac196e82eabea310b3a93db185f2570d4ff09a389bba2ce966e652a9cbed53d91cad626d27a900a30fff76b35a2ae4a5eae517d5fb7d102094ae65afe8d5e22615290e6374f2db8ab27e91b3fe0a582c6720a362c5e", 0x8f, 0x0, &(0x7f0000000440)={0x0, 0x3938700}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c0000002e00210c000008400000007b76ffffff3800008008000e00", @ANYRES32=r1, @ANYBLOB="04000b00200050002f70726f632f227379737670761245cf6dfa0cf45e1c342f7463", @ANYRES32, @ANYRESDEC=r2], 0x4c}, 0x1, 0x0, 0x0, 0x20048007}, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x13, r3, 0x0) dup2(r1, r3) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000006c0)={0x77, 0x27f2173d, 0x2, "a82470d0b0ec3f34a652b2be30bdfdb367f65ba45b10a21724c3b27ee0915466e62b8a47650ff20c05ab3f1c22f48b0a365a8e8087d95d9538c9dfc97da183913a53dc36c5d59aa98ae34fe542e6f372f4f16ecc2c70bf09ef84eef66ab53bce129d1603d548a4ec4755e09ad65ea3b9316980e99ddb40"}) readlinkat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/224, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) 02:33:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xa3, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c3"}) unshare(0x4a060400) 02:33:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) unshare(0x4a060400) 02:33:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xa3, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c3"}) unshare(0x4a060400) 02:33:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x12c02, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x90101, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utimes(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) openat(r2, &(0x7f0000000200)='./file0\x00', 0x40800, 0x188) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}, {@clone_children}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000480), 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000300)=ANY=[@ANYBLOB="010000200000b900df030000", @ANYRES64=r3, @ANYBLOB="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"]) fsmount(r0, 0x1, 0x71) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @empty}}) socket$inet(0x2, 0x1, 0x0) fsmount(0xffffffffffffffff, 0x1, 0x4) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001c00)) openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x940, 0x0) 02:33:31 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:33:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5413, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:33:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffc, r1, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={0x0, 0xc3, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c3745186a", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 4) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x800000000000202) 02:33:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x13, r4, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r2, @ANYRES16=r0, @ANYRESDEC=r3, @ANYRESOCT=r2, @ANYRESDEC=r4, @ANYRESOCT=r1], 0x98a) 02:33:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x0) [ 1893.979839] FAULT_INJECTION: forcing a failure. [ 1893.979839] name failslab, interval 1, probability 0, space 0, times 0 [ 1893.982420] CPU: 1 PID: 9579 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 1893.983887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1893.985687] Call Trace: [ 1893.986278] dump_stack+0x107/0x167 [ 1893.987084] should_fail.cold+0x5/0xa [ 1893.987919] ? create_object.isra.0+0x3a/0xa20 [ 1893.988901] should_failslab+0x5/0x20 [ 1893.989725] kmem_cache_alloc+0x5b/0x310 [ 1893.990606] create_object.isra.0+0x3a/0xa20 [ 1893.991548] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1893.992643] kmem_cache_alloc_bulk+0x168/0x320 [ 1893.993643] io_submit_sqes+0x6fe6/0x8610 [ 1893.994572] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1893.995675] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1893.996718] ? find_held_lock+0x2c/0x110 [ 1893.997611] ? io_submit_sqes+0x8610/0x8610 [ 1893.998553] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1893.999587] ? wait_for_completion_io+0x270/0x270 [ 1894.000629] ? rcu_read_lock_any_held+0x75/0xa0 [ 1894.001648] ? vfs_write+0x354/0xb10 [ 1894.002486] ? fput_many+0x2f/0x1a0 [ 1894.003287] ? ksys_write+0x1a9/0x260 [ 1894.004101] ? __ia32_sys_read+0xb0/0xb0 [ 1894.004982] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1894.006121] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1894.007246] do_syscall_64+0x33/0x40 [ 1894.008046] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1894.009157] RIP: 0033:0x7f67cefd1b19 [ 1894.009991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1894.013989] RSP: 002b:00007f67cc547188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1894.015651] RAX: ffffffffffffffda RBX: 00007f67cf0e4f60 RCX: 00007f67cefd1b19 [ 1894.017251] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1894.018821] RBP: 00007f67cc5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1894.020386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1894.021896] R13: 00007ffe172b891f R14: 00007f67cc547300 R15: 0000000000022000 [ 1894.027705] FAULT_INJECTION: forcing a failure. [ 1894.027705] name failslab, interval 1, probability 0, space 0, times 0 [ 1894.032595] CPU: 0 PID: 9577 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1894.034193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1894.036125] Call Trace: [ 1894.036730] dump_stack+0x107/0x167 [ 1894.037590] should_fail.cold+0x5/0xa [ 1894.038479] ? tty_buffer_alloc+0x243/0x2b0 [ 1894.039473] should_failslab+0x5/0x20 [ 1894.040351] __kmalloc+0x72/0x390 [ 1894.041178] tty_buffer_alloc+0x243/0x2b0 [ 1894.042167] __tty_buffer_request_room+0x156/0x2a0 [ 1894.043333] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1894.044607] ? n_tty_write+0x1eb/0xfe0 [ 1894.045512] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1894.046888] pty_write+0xe6/0x110 [ 1894.047700] n_tty_write+0xa86/0xfe0 [ 1894.048725] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1894.049891] ? _copy_from_iter+0x37b/0xe80 [ 1894.050870] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1894.052042] ? __virt_addr_valid+0x170/0x5d0 [ 1894.053055] ? __check_object_size+0x319/0x440 [ 1894.054121] file_tty_write.constprop.0+0x529/0x910 [ 1894.055280] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1894.056440] new_sync_write+0x42c/0x660 [ 1894.057363] ? new_sync_read+0x6f0/0x6f0 [ 1894.058342] ? avc_policy_seqno+0x9/0x70 [ 1894.059263] ? selinux_file_permission+0x92/0x520 [ 1894.060385] ? security_file_permission+0xb1/0xe0 [ 1894.061524] vfs_write+0x7c0/0xb10 [ 1894.062353] ksys_write+0x12d/0x260 [ 1894.063198] ? __ia32_sys_read+0xb0/0xb0 [ 1894.064139] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1894.065349] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1894.066547] do_syscall_64+0x33/0x40 [ 1894.067407] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1894.068585] RIP: 0033:0x7f0e035e8b19 [ 1894.069447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1894.073759] RSP: 002b:00007f0e00b5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1894.075534] RAX: ffffffffffffffda RBX: 00007f0e036fbf60 RCX: 00007f0e035e8b19 [ 1894.077210] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1894.078864] RBP: 00007f0e00b5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1894.080529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1894.082189] R13: 00007fff692ece1f R14: 00007f0e00b5e300 R15: 0000000000022000 [ 1894.083925] [ 1894.083936] ====================================================== [ 1894.083945] WARNING: possible circular locking dependency detected [ 1894.083950] 5.10.240 #1 Not tainted [ 1894.083958] ------------------------------------------------------ [ 1894.083966] syz-executor.0/9577 is trying to acquire lock: [ 1894.083972] ffffffff84f0dbe0 (console_owner){-.-.}-{0:0}, at: console_unlock+0x2e1/0xb40 [ 1894.083995] [ 1894.084002] but task is already holding lock: [ 1894.084007] ffff888017f7a158 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 1894.084030] [ 1894.084037] which lock already depends on the new lock. [ 1894.084041] [ 1894.084044] [ 1894.084051] the existing dependency chain (in reverse order) is: [ 1894.084054] [ 1894.084058] -> #2 (&port->lock){-.-.}-{2:2}: [ 1894.084080] _raw_spin_lock_irqsave+0x36/0x60 [ 1894.084086] tty_port_tty_get+0x1f/0x100 [ 1894.084092] tty_port_default_wakeup+0x11/0x40 [ 1894.084099] serial8250_tx_chars+0x51f/0xb00 [ 1894.084106] serial8250_handle_irq+0x4e4/0x660 [ 1894.084113] serial8250_default_handle_irq+0x96/0x210 [ 1894.084119] serial8250_interrupt+0xf4/0x1b0 [ 1894.084126] __handle_irq_event_percpu+0x2ef/0x6d0 [ 1894.084133] handle_irq_event+0xff/0x280 [ 1894.084139] handle_edge_irq+0x249/0xd00 [ 1894.084145] asm_call_irq_on_stack+0x12/0x20 [ 1894.084151] common_interrupt+0xdd/0x1a0 [ 1894.084157] asm_common_interrupt+0x1e/0x40 [ 1894.084162] default_idle+0xe/0x20 [ 1894.084168] default_idle_call+0xbf/0x2c0 [ 1894.084173] do_idle+0x3b3/0x520 [ 1894.084180] cpu_startup_entry+0x14/0x20 [ 1894.084186] secondary_startup_64_no_verify+0xbe/0xcb [ 1894.084189] [ 1894.084193] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 1894.084214] _raw_spin_lock_irqsave+0x36/0x60 [ 1894.084221] serial8250_console_write+0x9f5/0xc60 [ 1894.084227] console_unlock+0x82a/0xb40 [ 1894.084233] register_console+0x40c/0x850 [ 1894.084239] univ8250_console_init+0x3a/0x4a [ 1894.084245] console_init+0x24c/0x356 [ 1894.084251] start_kernel+0x2e6/0x489 [ 1894.084258] secondary_startup_64_no_verify+0xbe/0xcb [ 1894.084261] [ 1894.084265] -> #0 (console_owner){-.-.}-{0:0}: [ 1894.084285] __lock_acquire+0x29e7/0x5b00 [ 1894.084291] lock_acquire+0x197/0x470 [ 1894.084297] console_unlock+0x360/0xb40 [ 1894.084303] vprintk_emit+0x1de/0x4e0 [ 1894.084308] vprintk_func+0x8b/0x140 [ 1894.084314] printk+0xba/0xf1 [ 1894.084320] should_fail+0x47a/0x5a0 [ 1894.084325] should_failslab+0x5/0x20 [ 1894.084331] __kmalloc+0x72/0x390 [ 1894.084337] tty_buffer_alloc+0x243/0x2b0 [ 1894.084344] __tty_buffer_request_room+0x156/0x2a0 [ 1894.084352] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1894.084359] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1894.084365] pty_write+0xe6/0x110 [ 1894.084371] n_tty_write+0xa86/0xfe0 [ 1894.084378] file_tty_write.constprop.0+0x529/0x910 [ 1894.084384] new_sync_write+0x42c/0x660 [ 1894.084390] vfs_write+0x7c0/0xb10 [ 1894.084395] ksys_write+0x12d/0x260 [ 1894.084401] do_syscall_64+0x33/0x40 [ 1894.084408] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1894.084412] [ 1894.084418] other info that might help us debug this: [ 1894.084421] [ 1894.084426] Chain exists of: [ 1894.084429] console_owner --> &port_lock_key --> &port->lock [ 1894.084455] [ 1894.084461] Possible unsafe locking scenario: [ 1894.084464] [ 1894.084470] CPU0 CPU1 [ 1894.084476] ---- ---- [ 1894.084480] lock(&port->lock); [ 1894.084494] lock(&port_lock_key); [ 1894.084507] lock(&port->lock); [ 1894.084519] lock(console_owner); [ 1894.084529] [ 1894.084534] *** DEADLOCK *** [ 1894.084537] [ 1894.084543] 6 locks held by syz-executor.0/9577: [ 1894.084547] #0: ffff88800cfe2098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x90 [ 1894.084573] #1: ffff88800cfe2130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: file_tty_write.constprop.0+0x29f/0x910 [ 1894.084600] #2: ffff88800cfe22e8 (&tty->termios_rwsem){++++}-{3:3}, at: n_tty_write+0x1bf/0xfe0 [ 1894.084626] #3: ffffc90013d75378 (&ldata->output_lock){+.+.}-{3:3}, at: n_tty_write+0xa4d/0xfe0 [ 1894.084652] #4: ffff888017f7a158 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 1894.084679] #5: ffffffff84fedf60 (console_lock){+.+.}-{0:0}, at: vprintk_func+0x8b/0x140 [ 1894.084703] [ 1894.084708] stack backtrace: [ 1894.084716] CPU: 0 PID: 9577 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 1894.084726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1894.084730] Call Trace: [ 1894.084736] dump_stack+0x107/0x167 [ 1894.084741] check_noncircular+0x263/0x2e0 [ 1894.084748] ? stack_trace_consume_entry+0x160/0x160 [ 1894.084754] ? print_circular_bug+0x470/0x470 [ 1894.084759] ? memcpy+0x39/0x60 [ 1894.084764] ? alloc_chain_hlocks+0x342/0x5a0 [ 1894.084770] __lock_acquire+0x29e7/0x5b00 [ 1894.084776] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1894.084781] ? SOFTIRQ_verbose+0x10/0x10 [ 1894.084787] lock_acquire+0x197/0x470 [ 1894.084792] ? console_unlock+0x2e1/0xb40 [ 1894.084798] ? lock_release+0x680/0x680 [ 1894.084803] ? lock_downgrade+0x6d0/0x6d0 [ 1894.084809] ? do_raw_spin_lock+0x121/0x260 [ 1894.084814] ? rwlock_bug.part.0+0x90/0x90 [ 1894.084820] console_unlock+0x360/0xb40 [ 1894.084825] ? console_unlock+0x2e1/0xb40 [ 1894.084831] ? devkmsg_read+0x730/0x730 [ 1894.084836] ? lock_release+0x680/0x680 [ 1894.084842] ? do_raw_spin_unlock+0x4f/0x220 [ 1894.084847] ? vprintk_func+0x8b/0x140 [ 1894.084852] vprintk_emit+0x1de/0x4e0 [ 1894.084857] vprintk_func+0x8b/0x140 [ 1894.084862] printk+0xba/0xf1 [ 1894.084868] ? record_print_text.cold+0x16/0x16 [ 1894.084873] should_fail+0x47a/0x5a0 [ 1894.084879] ? tty_buffer_alloc+0x243/0x2b0 [ 1894.084884] should_failslab+0x5/0x20 [ 1894.084889] __kmalloc+0x72/0x390 [ 1894.084895] tty_buffer_alloc+0x243/0x2b0 [ 1894.084901] __tty_buffer_request_room+0x156/0x2a0 [ 1894.084908] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1894.084914] ? n_tty_write+0x1eb/0xfe0 [ 1894.084921] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1894.084926] pty_write+0xe6/0x110 [ 1894.084931] n_tty_write+0xa86/0xfe0 [ 1894.084938] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1894.084943] ? _copy_from_iter+0x37b/0xe80 [ 1894.084950] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1894.084956] ? __virt_addr_valid+0x170/0x5d0 [ 1894.084962] ? __check_object_size+0x319/0x440 [ 1894.084968] file_tty_write.constprop.0+0x529/0x910 [ 1894.084975] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1894.084981] new_sync_write+0x42c/0x660 [ 1894.084986] ? new_sync_read+0x6f0/0x6f0 [ 1894.084992] ? avc_policy_seqno+0x9/0x70 [ 1894.084998] ? selinux_file_permission+0x92/0x520 [ 1894.085004] ? security_file_permission+0xb1/0xe0 [ 1894.085009] vfs_write+0x7c0/0xb10 [ 1894.085014] ksys_write+0x12d/0x260 [ 1894.085020] ? __ia32_sys_read+0xb0/0xb0 [ 1894.085027] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1894.085034] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1894.085039] do_syscall_64+0x33/0x40 [ 1894.085046] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1894.085051] RIP: 0033:0x7f0e035e8b19 [ 1894.085071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1894.085078] RSP: 002b:00007f0e00b5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1894.085092] RAX: ffffffffffffffda RBX: 00007f0e036fbf60 RCX: 00007f0e035e8b19 [ 1894.085101] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1894.085110] RBP: 00007f0e00b5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1894.085118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1894.085127] R13: 00007fff692ece1f R14: 00007f0e00b5e300 R15: 0000000000022000 02:33:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x2) 02:33:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5414, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:33:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4077, 0x8000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0xd1a, &(0x7f0000000180)='lo\x00', 0x25ba, 0x4, 0x4}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5413, 0x4) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xc2, 0xe8}, &(0x7f0000000480)={'enc=', 'pkcs1', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000280)="55dbb51f1079087bbc360aecd72e1a8d3c58afd5097448c1c001a2205859fb0a9a2d24da9274e02498b7a1382185962d712107729aaaf37f265a94aa45ee42fd89c3bbf4a7ddad5c4d9e2acf344d479ea7b7de4c727801d3ceff410203dd02679ea8b845780a6f27eb912f84786de86dbec143560ca69a7a7e7777a653cd12f455adc18fe159e488e8a969e9c66d0cb638cf5e37e66189ba42a1fb309d28496f20057bf0ccfa368be94f092f3c3fe60638f276e13161757ebd015ebe3f207c374518", &(0x7f0000000380)=""/232) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x800000000000202) 02:33:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x3) 02:33:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, r4, 0x0) unshare(0x4a060400) 02:33:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1, 0xffffffff, 0x4) 02:33:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/kernel', 0x32d02, 0x150) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x1, 0xba, "e98eeab3b9386523f35bd3a090c50a5305f8588515db8c90010f278bd9d01ce72eab8b81ab9d9a7a427d84ddf4622b05f1a8ca7616851bbc61889242123db42a44c0fa7c8abd12c4b9de292729f1326079847bc6262d593034c3203dbe9dd07618c1debe6c8b80d6d1e9ab9f45b4825b0dd2517faa84f5bfb9bbaac3bef9adc3fe51b3039fd655c56d06421eccdb139df3e45aa664de88d7fd49b42b4056f917c0b2c331dba3a4e3aae61efd916ebd3c4f0abd48dcea11a02f6c"}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x10010, 0xffffffffffffffff, 0x800000000000202) unshare(0x4a060400) VM DIAGNOSIS: 02:33:32 Registers: info registers vcpu 0 RAX=000000000000002d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822e2601 RDI=ffffffff879f5140 RBP=ffffffff879f5100 RSP=ffff88806ce09c90 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=000000000000002d R13=000000000000002d R14=ffffffff879f5100 R15=dffffc0000000000 RIP=ffffffff822e2658 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f0e00b5e700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020001000 CR3=00000000482ae000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000dd060a EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=ffffffffffffffffffffffffffffff00 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff8135f826 RDX=ffff888048f30000 RSI=ffffffff8135f814 RDI=0000000000000005 RBP=ffff88800fe1f9e8 RSP=ffff88800fe1f920 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000000000 R13=0000000000000200 R14=1ffff11001fc3f28 R15=0000000000000040 RIP=ffffffff8135f816 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 000055557b14e400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f54e48eaae0 CR3=0000000046920000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000ff0000000000000000 XMM01=62246574697277003233666c655f746d XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000